Cloud Security

  • Chapter
  • First Online:
Essentials of Cloud Computing

Part of the book series: Texts in Computer Science ((TCS))

  • 759 Accesses

Abstract

The objective of this chapter is present security-related concepts in the cloud. The reader will understand how security is provided in different service models, IaaS, PaaS and SaaS. For better understanding different kinds of security threats in cloud are presented. The reader will understand that implementing security is a shared responsibility and the cloud user is responsible for data security, compliance, regulatory and privacy requirements. In addition, the reader will also come to know about the security challenges that occur due to the integration of the IoT with cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mather T, Kumaraswamy S, Latif S (2009) Cloud security and privacy—an enterprise perspective on risk and compliance. O’ Reilly Publishers, USA

    Google Scholar 

  2. Ahmed M, Hossain MA (2014) Cloud computing and security issues in the cloud. Int J Netw Secur Appl (IJNSA) 6(1)

    Google Scholar 

  3. Rittinghouse JW, Ransome JF (2010) Cloud computing implementation, management and security. CRC Press, Boca Raton

    Google Scholar 

  4. Krutz RL, Vines RD (2010) Cloud security a comprehensive guide to secure cloud computing. Wiley Publishing Inc., Hoboken

    Google Scholar 

  5. Akinola KE, Odumosu AA (2015) Threat handling and security issue in cloud computing. Int J Sci Eng Res 6(11)

    Google Scholar 

  6. Saini DK, Kumar K, Gupta P (2022) Security issues in IoT and cloud computing service models with suggested solutions. Secur Commun Netw 2022(Article ID 4943225):9 p. http://doi.org/10.1155/2022/4943225

  7. https://medium.com/seminal/challenges-generated-by-integration-of-cloud-computing-and-iot-99bf0fb39190, accessed on 5th March 2023

  8. https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/a-security-guide-to-iot-cloud-convergence, accessed on 5th March 2023

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Surianarayanan, C., Chelliah, P.R. (2023). Cloud Security. In: Essentials of Cloud Computing. Texts in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-031-32044-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-32044-6_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-32043-9

  • Online ISBN: 978-3-031-32044-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation