Cloud storage security : a practical guide /

Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide...

Full description

Saved in:
Bibliographic Details
Main Authors: Wheeler, Aaron (Author), Winburn, Michael (Author)
Format: Electronic eBook
Language:English
Published: Amsterdam, Netherlands : Elsevier, [2015]
Series:Computer science reviews and trends.
Subjects:
Online Access:CONNECT
Table of Contents:
  • Front Cover; Cloud Storage Security; Copyright Page; Contents; 1 Data in the Cloud; 1.1 Definitions and History; 1.1.1 Definitions; 1.1.2 History; 1.2 Privacy and Security Concepts and Issues; 1.2.1 Your Data Versus Other People's Data; 1.2.2 Getting Your Data In and Out of the Cloud; 1.2.3 Legal Versus Criminal Threats; 1.2.3.1 Legal Threats; 1.2.3.2 Criminal Threats; 1.3 Cloud Storage; 1.3.1 What Is It?; 1.3.2 Case Studies: Comparison of Cloud Storage Security; 1.4 Cloud-Based Data Sharing; 1.5 Summary; References; 2 Application Data in the Cloud; 2.1 Applications; 2.1.1 Email.
  • 2.1.2 Background2.1.3 Case Studies: Comparison of Cloud-Based Email Security (Gmail, Outlook.com (Hotmail), Yahoo! Mail); 2.1.3.1 Questions; 2.1.3.2 Security Concepts; 2.1.3.3 Personally Identifiable Information (PII); 2.1.3.4 Methods and Results; 2.1.3.5 Data-in-Motion; 2.1.3.6 Data at Rest; 2.1.3.7 Physical Security; 2.1.3.8 Information Collected by Email Service Providers; 2.1.3.9 From Google's Privacy Policy; 2.1.3.10 How Email Service Providers Use the Information; 2.1.3.11 Where Email Service Providers Differ; 2.1.3.12 From Google's Terms of Service.
  • 2.1.3.13 From Outlook.com Privacy Policy2.1.3.14 From Yahoo! Privacy Policy; 2.1.3.15 Measures That Can Be Taken to Increase Security and Privacy; 2.1.3.16 Conclusion; 2.2 Cloud Backup Services; 2.2.1 Background; 2.2.2 Case Studies: Comparison of Cloud-Based Backup Security; 2.2.2.1 Questions; 2.2.2.2 Security Concepts; 2.2.2.3 Methods and Results; 2.2.2.4 Carbonite; 2.2.2.5 Data-in-Motion; 2.2.2.6 Data-at-Rest; 2.2.2.7 Facility Security; 2.2.2.8 Mozy; 2.2.2.9 Data in Motion and at Rest; 2.2.2.10 Encryption; 2.2.2.11 Privacy; 2.2.2.12 Conclusion; 2.3 Social Media.
  • 2.3.1 Social Media as Cloud Storage2.3.2 Case Studies: Comparison of Social Media Security (Facebook and Twitter); 2.3.2.1 Questions; 2.3.2.2 Security Concepts; 2.3.2.3 Methods and Results; 2.3.2.4 Twitter; 2.3.2.5 Twitter Privacy Policy; 2.3.2.6 Facebook; 2.3.2.7 How Facebook Uses Data They Collect; 2.3.2.8 Conclusion; 2.4 Office Suites; 2.4.1 Background; 2.4.2 Case Studies: Comparison of Cloud-Based Office Suite Security (Microsoft Office 365 and Google Docs); 2.4.2.1 Questions; 2.4.2.2 Security Concepts; 2.4.2.3 Google Docs; 2.4.2.4 Privacy; 2.4.2.5 Microsoft Office 365; 2.4.2.6 Privacy.
  • 2.4.2.7 Conclusion2.5 Health Apps; 2.5.1 Background; 2.5.2 Case Studies; 2.5.2.1 Security Concepts; 2.5.2.2 Questions; 2.5.2.3 Efficacy and Oversight; 2.5.2.4 Privacy and Security; 2.5.2.5 Conclusion; 2.6 Summary; References; 3 Privacy Challenges; 3.1 Who Wants Your Data?; 3.2 Privacy and Security Incidents in the News; 3.3 Legal Issues; 3.3.1 Travel; 3.3.2 Location, Location, Location; 3.3.3 Employers and Insurance Companies; 3.3.4 Litigation and e-Discovery; 3.3.5 Law Enforcement; 3.3.6 Lifestyle and Psychological Profiling; 3.4 Criminals, Authoritarian Governments, and Friends.