Skip to main content

Cloud Security

  • Chapter
  • First Online:
  • 2830 Accesses

Part of the book series: Texts in Computer Science ((TCS))

Abstract

Cloud solutions are third-party solutions available to any enterprise/user. Cloud users avail themselves of a number of different services deployed in the cloud provider’s infrastructure. The initial reaction to this is one of security, which is of course a major concern. The objective of this chapter is to present security-related concepts in the cloud. The reader should get a thorough understanding of how security is provided in different service models such as IaaS, PaaS, and SaaS. By the end of this chapter the reader should also understand that putting security in place is a shared responsibility and that the cloud user is responsible for data security, compliance, and regulatory and privacy requirements. Security is a topic that attracts a lot of attention and users tend to ask the following motivational questions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Mather T, Kumaraswamy S, Latif S (2009) Cloud security and privacy—an enterprise perspective on risk and compliance. O’ Reilly Publishers

    Google Scholar 

  2. Ahmed M, Hossain MA (2014) Cloud computing and security issues in the cloud. Int J Netw Secur Appl (IJNSA) 6(1)

    Google Scholar 

  3. Rittinghouse JW, Ransome JF (2010) Cloud Computing implementation, management and security. CRC Press

    Google Scholar 

  4. Krutz RL, Vines RD (2010) Cloud security a comprehensive guide to secure cloud computing. Wiley Publishing Inc

    Google Scholar 

  5. Akinola Kayode E, Odumosu Adesola A (2015) Threat handling and security issue in cloud computing. Int J Sci Eng Res 6(11)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chellammal Surianarayanan .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Surianarayanan, C., Chelliah, P.R. (2019). Cloud Security. In: Essentials of Cloud Computing. Texts in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-13134-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-13134-0_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-13133-3

  • Online ISBN: 978-3-030-13134-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics