Abstract
This chapter presents a model and step-by-step systematic construction of the cloud storage protection system. The formal model allows to make the whole process of deploying the security system transparent and easily verifiable. The systematic construction methodology aims to optimize the mechanism selection and control the security at all levels. The mechanisms conform to the attacks and vulnerabilities at each step so that the protection of the whole architecture is provided continuously.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
National Institute of Standards and Technology. www.nist.org
International Standardizaation Organization. www.iso.org
Schneier B, Ferguson N (2003) Practical cryptography. Wiley, New York
Common criteria for Information Technology Security Evaluation ISO\IEC 15408 (2005) Common criteria portal. http://www.commoncriteriaportal.org/cc/. Accessed 6 July 2016
ISO/IEC 18014 Information technology – Security techniques – Time-stamping services (2014) International Organization for Standardization. http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=50678. Accessed 6 July 2016
Storgrid secure enterprise share and sync solution. http://www.storgrid.com/. Accessed 6 July 2016
Scoping SIG, Tokenization Taskforce, PCI SSC (2011) Information supplement: PCI DSS tokenization guidelines. PCI Security Standards Council. https://www.pcisecuritystandards.org/documents/Tokenization_Guidelines_Info_Supplement.pdf. Accessed 6 July 2016
Cloud Security Alliance (2010) Guidance for identity & access management: version 2.1. CSA Community. https://cloudsecurityalliance.org/guidance/csaguide-dom12-v2.10.pdf. Accessed 6 July 2016
Bellovin SM, Merritt M (1993) Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. ACM CCS’93: 244–250. doi:10.1145/168588.168618
Skyhigh research and reports (2015) What is cloud access security broker. In: Skyhigh Cloud University. https://www.skyhighnetworks.com/cloud-university/what-is-cloud-access-security-broker/. Cited 01 Feb 2016. Accessed 6 July 2016
Lawson C, MacDonald N, Lowans B (2015) Market guide for cloud access security brokers. Gartner research. http://www.gartner.com/technology/reprints.do?id=1-2RUEH70&ct=151110&st=sb. Cited 01 Feb 2016. Accessed 6 July 2016
Tenorio DF, da Costa JPCL, de Sousa Jr RT (2013) Greatest eigenvalue time vector approach for blind detection of malicious track. ICoFCS’2013: 46–51
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 The Author(s)
About this chapter
Cite this chapter
Galibus, T., Krasnoproshin, V.V., de Oliveira Albuquerque, R., Pignaton de Freitas, E. (2016). Cloud Storage Security Architecture. In: Elements of Cloud Storage Security. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-44962-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-44962-3_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44961-6
Online ISBN: 978-3-319-44962-3
eBook Packages: Computer ScienceComputer Science (R0)