Skip to main content

Cloud Storage Security Architecture

  • Chapter
  • First Online:
Elements of Cloud Storage Security

Abstract

This chapter presents a model and step-by-step systematic construction of the cloud storage protection system. The formal model allows to make the whole process of deploying the security system transparent and easily verifiable. The systematic construction methodology aims to optimize the mechanism selection and control the security at all levels. The mechanisms conform to the attacks and vulnerabilities at each step so that the protection of the whole architecture is provided continuously.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. National Institute of Standards and Technology. www.nist.org

  2. International Standardizaation Organization. www.iso.org

  3. Schneier B, Ferguson N (2003) Practical cryptography. Wiley, New York

    Google Scholar 

  4. Common criteria for Information Technology Security Evaluation ISO\IEC 15408 (2005) Common criteria portal. http://www.commoncriteriaportal.org/cc/. Accessed 6 July 2016

  5. ISO/IEC 18014 Information technology – Security techniques – Time-stamping services (2014) International Organization for Standardization. http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=50678. Accessed 6 July 2016

  6. Storgrid secure enterprise share and sync solution. http://www.storgrid.com/. Accessed 6 July 2016

  7. Scoping SIG, Tokenization Taskforce, PCI SSC (2011) Information supplement: PCI DSS tokenization guidelines. PCI Security Standards Council. https://www.pcisecuritystandards.org/documents/Tokenization_Guidelines_Info_Supplement.pdf. Accessed 6 July 2016

  8. Cloud Security Alliance (2010) Guidance for identity & access management: version 2.1. CSA Community. https://cloudsecurityalliance.org/guidance/csaguide-dom12-v2.10.pdf. Accessed 6 July 2016

  9. Bellovin SM, Merritt M (1993) Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. ACM CCS’93: 244–250. doi:10.1145/168588.168618

  10. Skyhigh research and reports (2015) What is cloud access security broker. In: Skyhigh Cloud University. https://www.skyhighnetworks.com/cloud-university/what-is-cloud-access-security-broker/. Cited 01 Feb 2016. Accessed 6 July 2016

  11. Lawson C, MacDonald N, Lowans B (2015) Market guide for cloud access security brokers. Gartner research. http://www.gartner.com/technology/reprints.do?id=1-2RUEH70&ct=151110&st=sb. Cited 01 Feb 2016. Accessed 6 July 2016

  12. Tenorio DF, da Costa JPCL, de Sousa Jr RT (2013) Greatest eigenvalue time vector approach for blind detection of malicious track. ICoFCS’2013: 46–51

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 The Author(s)

About this chapter

Cite this chapter

Galibus, T., Krasnoproshin, V.V., de Oliveira Albuquerque, R., Pignaton de Freitas, E. (2016). Cloud Storage Security Architecture. In: Elements of Cloud Storage Security. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-44962-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44962-3_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44961-6

  • Online ISBN: 978-3-319-44962-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics