Big Data

Big Data
Author: Fei Hu
Publisher: CRC Press
Total Pages: 449
Release: 2016-04-27
Genre: Computers
ISBN: 1498734871

Although there are already some books published on Big Data, most of them only cover basic concepts and society impacts and ignore the internal implementation details-making them unsuitable to R&D people. To fill such a need, Big Data: Storage, Sharing, and Security examines Big Data management from an R&D perspective. It covers the 3S desi

Elements of Cloud Storage Security

Elements of Cloud Storage Security
Author: Tatiana Galibus
Publisher: Springer
Total Pages: 112
Release: 2016-10-03
Genre: Computers
ISBN: 3319449621

This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industry inspired the authors to attempt to conceptualize the common processes and strategies in cloud security, in order to make security system deployment as simple and transparent as possible. The deployment is broken into several essential steps that allow the functionality of security architecture for any cloud to be split into a set of modules. The continuous verification of security support on all levels (data, processes and communication channels) helps to avoid common security breaches and protect against the most dangerous attacks. Additionally, performing the proposed optimization of the selected set of mechanisms will enhance the efficiency of the security system.

Cloud Security and Privacy

Cloud Security and Privacy
Author: Tim Mather
Publisher: "O'Reilly Media, Inc."
Total Pages: 338
Release: 2009-09-04
Genre: Computers
ISBN: 1449379516

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security

Cloud Storage Security

Cloud Storage Security
Author: Aaron Wheeler
Publisher: Elsevier
Total Pages: 145
Release: 2015-07-06
Genre: Computers
ISBN: 0128029315

Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information. - Describes the history and the evolving nature of cloud storage and security - Explores the threats to privacy and security when using free social media applications that use cloud storage - Covers legal issues and laws that govern privacy, compliance, and legal responsibility for enterprise users - Provides guidelines and a security checklist for selecting a cloud-storage service provider - Includes case studies and best practices for securing data in the cloud - Discusses the future of cloud computing

Data Security in Cloud Storage

Data Security in Cloud Storage
Author: Yuan Zhang
Publisher: Springer Nature
Total Pages: 180
Release: 2020-06-01
Genre: Computers
ISBN: 9811543747

This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud storage and how attacks work in real situations, together with the countermeasures used to ensure the security of outsourced data. Furthermore, the book introduces a number of emerging technologies that hold considerable potential – for example, blockchain, trusted execution environment, and indistinguishability obfuscation – and outlines open issues and future research directions in cloud storage security. The topics addressed are important for the academic community, but are also crucial for industry, since cloud storage has become a fundamental component in many applications. The book offers a general introduction for interested readers with a basic modern cryptography background, and a reference guide for researchers and practitioners in the fields of data security and cloud storage. It will also help developers and engineers understand why some current systems are insecure and inefficient, and move them to design and develop improved systems.

IBM Storage Virtualize, IBM Storage FlashSystem, and IBM SAN Volume Controller Security Feature Checklist

IBM Storage Virtualize, IBM Storage FlashSystem, and IBM SAN Volume Controller Security Feature Checklist
Author: Bill Scales
Publisher: IBM Redbooks
Total Pages: 36
Release: 2023-07-03
Genre: Computers
ISBN: 0738461245

IBM® Storage Virtualize based storage systems are secure storage platforms that implement various security-related features, in terms of system-level access controls and data-level security features. This document outlines the available security features and options of IBM Storage Virtualize based storage systems. It is not intended as a "how to" or best practice document. Instead, it is a checklist of features that can be reviewed by a user security team to aid in the definition of a policy to be followed when implementing IBM FlashSystem®, IBM SAN Volume Controller, and IBM Storage Virtualize for Public Cloud. IBM Storage Virtualize features the following levels of security to protect against threats and to keep the attack surface as small as possible: The first line of defense is to offer strict verification features that stop unauthorized users from using login interfaces and gaining access to the system and its configuration. The second line of defense is to offer least privilege features that restrict the environment and limit any effect if a malicious actor does access the system configuration. The third line of defense is to run in a minimal, locked down, mode to prevent damage spreading to the kernel and rest of the operating system. The fourth line of defense is to protect the data at rest that is stored on the system from theft, loss, or corruption (malicious or accidental). The topics that are discussed in this paper can be broadly split into two categories: System security: This type of security encompasses the first three lines of defense that prevent unauthorized access to the system, protect the logical configuration of the storage system, and restrict what actions users can perform. It also ensures visibility and reporting of system level events that can be used by a Security Information and Event Management (SIEM) solution, such as IBM QRadar®. Data security: This type of security encompasses the fourth line of defense. It protects the data that is stored on the system against theft, loss, or attack. These data security features include Encryption of Data At Rest (EDAR) or IBM Safeguarded Copy (SGC). This document is correct as of IBM Storage Virtualize 8.5.3.

Security, Privacy and Anonymity in Computation, Communication and Storage

Security, Privacy and Anonymity in Computation, Communication and Storage
Author: Guojun Wang
Publisher: Springer
Total Pages: 408
Release: 2016-11-09
Genre: Computers
ISBN: 3319491458

This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016: the 7th International Workshop on Trust, Security and Privacy for Big Data, TrustData 2016; the 6th International Symposium on Trust, Security and Privacy for Emerging Applications, TSP 2016; the 4th International Workshop on Network Optimization and Performance Evaluation, NOPE 2016; the Second International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys 2016; the Annual Big Data Security, Privacy and Trust Workshop, BigDataSPT 2016; and the First International Workshop on Cloud Storage Service and Computing, WCSSC 2016. The 37 full papers presented were carefully reviewed and selected from 95 submissions. The papers deal with research findings, ideas and emerging trends in information security research and cover a broad range of topics in security, privacy and anonymity in computation, communication and storage.

Security of Radioactive Material in Use and Storage and of Associated Facilities

Security of Radioactive Material in Use and Storage and of Associated Facilities
Author: IAEA
Publisher: International Atomic Energy Agency
Total Pages: 101
Release: 2020-01-22
Genre: Technology & Engineering
ISBN: 920444021X

This revision provides guidance to States and their competent authorities on how to establish or improve, implement, maintain and sustain the elements of the nuclear security regime related to radioactive material, associated facilities and activities, with particular emphasis on the development of regulatory requirements. The publication applies to the security of radioactive material in use or in storage, as well as associated facilities and associated activities, and assists Member States in their regimes against unauthorized removal of the radioactive material or sabotage performed with the intent to cause harmful radiological consequences.

Security Management of Radioactive Material in Use and Storage and of Associated Facilities

Security Management of Radioactive Material in Use and Storage and of Associated Facilities
Author: IAEA
Publisher: International Atomic Energy Agency
Total Pages: 79
Release: 2022-03-25
Genre: Business & Economics
ISBN: 9201184212

Security management for radioactive material in use, storage and associated facilities includes the establishment and implementation of policies, plans, procedures and processes for the security of radioactive material. Security management assists to ensure that the security systems are effective, reliably operated and maintained with the necessary resources. Based on extensive input from technical and legal experts, this publication sets forth security management as an essential tool to verify that personnel, procedures and equipment operate interdependently and in an integrated manner, and that the leadership and personnel responsible for security demonstrate the highest commitment towards promoting a robust nuclear security culture within the organization. This Technical Guidance references and takes into account other IAEA Nuclear Security Series publications that provide guidance relating to security management. The document further provides guidance , including on the development of a security plan for radioactive material in use and in storage and for associated facilities. The Security Plan is an essential component of an operators licensing submission package. This Technical Guidance takes into account other IAEA Nuclear Security Series publications that provide guidance relating to security management and relating to security plans.

IBM XIV Storage System Architecture and Implementation

IBM XIV Storage System Architecture and Implementation
Author: Bertrand Dufrasne
Publisher: IBM Redbooks
Total Pages: 470
Release: 2017-11-03
Genre: Computers
ISBN: 0738440167

Not a new version - included warning for self signed X509 certificates - see section 5.2 This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM XIV® Storage System. The XIV Storage System is a scalable enterprise storage system that is based on a grid array of hardware components. It can attach to both Fibre Channel Protocol (FCP) and IP network Small Computer System Interface (iSCSI) capable hosts. This system is a good fit for clients who want to be able to grow capacity without managing multiple tiers of storage. The XIV Storage System is suited for mixed or random access workloads, including online transaction processing, video streamings, images, email, and emerging workload areas, such as Web 2.0 and cloud storage. The focus of this edition is on the XIV Gen3 running Version 11.5.x of the XIV system software, which brings enhanced value for the XIV Storage System in cloud environments. It offers multitenancy support, VMware vCloud Suite integration, more discrete performance classes, and RESTful API enhancements that expand cloud automation integration. Version 11.5 introduces support for three-site mirroring to provide high availability and disaster recovery. It also enables capacity planning through the Hyper-Scale Manager, mobile push notifications for real-time alerts, and enhanced security. Version 11.5.1 supports 6TB drives and VMware vSphere Virtual Volumes (VVOL). In the first few chapters of this book, we describe many of the unique and powerful concepts that form the basis of the XIV Storage System logical and physical architecture. We explain how the system eliminates direct dependencies between the hardware elements and the software that governs the system. In subsequent chapters, we explain the planning and preparation tasks that are required to deploy the system in your environment by using the intuitive yet powerful XIV Storage Manager GUI or the XIV command-line interface. We also describe the performance characteristics of the XIV Storage System and present options for alerting and monitoring, including enhanced secure remote support. This book is for IT professionals who want an understanding of the XIV Storage System. It is also for readers who need detailed advice on how to configure and use the system.