cialis daily cheap sildenafil uk kamagra pills south africa viagra standard dosage dapoxetine and sildenafil tablets

immagine esempio

Security for Cloud Computing


This comprehensive resource presents a highly informative overview of cloud computing security issues. This book focuses on relevant approaches aimed at monitoring and protecting computation and data hosted on heterogeneous computing resources. The most critical security aspects are thoroughly discussed, highlighting the importance of reliable secure computation over remote heterogeneous cloud nodes. This book shows that present cloud computing is inherently insecure therefore advanced execution models have to be developed to prevent unauthorized users from accessing or affecting others’ data and computation. The cloud approach enables on-demand scalable services that allow performing large computations without the costs and maintenance/management issues of costly server farms (thus enabling a novel kind of outsourced computing). Essential reading for software and computer engineers as well as data architects and IT professionals to better understand the complexity and heterogeneity of modern cloud- based scenarios.

The Cloud computing paradigm is increasingly successful today, as it enables convenient access to a number of economically viable large computing and storage resources. Clouds offer on-demand scalable services for heavy workload and large computations, saving the maintenance expenses of costly server farms. At the same time, multicore and manycore hardware is flourishing, even allowing massive parallel computing on a single chip. As a further opportunity, mobile devices, permanently connected to the cloud, are now extremely powerful and feature multiple execution cores.

In such novel scenarios it becomes mandatory to provide adequate security and privacy guarantees to both service providers and users. The problem is complex, as present cloud landscape actors have conflicting requirements and objectives. Security concerns over cloud computing resources are often due to virtual machine integrity and privacy issues (possibly due to malware infections). In addition, cloud nodes can deliberately choose to misbehave in order to save resources and thus reduce maintenance costs. As a consequence, availability and correctness of stored data and computed results from remote services can be an issue.

Even network reliability can be an issue, given the increasingly widespread deployment of powerful but potentially dangerous approaches such as software defined networking and network function virtualization. Furthermore, given that cloud nodes are heterogeneous and span from manycore cluster nodes (hosting powerful manycore GPUs) to mobile devices (also featuring manycore GPUs), care must be taken in evaluating and addressing specific security issues of each platform while at the same time keeping in mind that these pervasively-available and constantly-connected resources have a common substrate and common global security issues.

This book surveys security issues of cloud computing over distributed heterogeneous computing and network resources. It investigates different directions and proposes possible approaches in a variety of scenarios. It can be a useful source of information and reference, to better understand the complexity and heterogeneity of modern cloud-based architectures and of related security issues.