Contents


Preface

*- Anonymous*

**Dr. Dinesh G. Harkut**

Dean and Associate Professor,

Badnera-Amravati, Maharashtra, India

Department of Computer Science and Engineering,

Prof. Ram Mehge College of Engineering and Management,

*As the world is increasingly interconnected,*

security responsibilities.

*Security is always excessive until it is not enough.*

*everyone shares the responsibility of Securing Cyberspace and*

This book is intended to teach you about the most important security controls for your most important assets quickly and correctly, whether you're a security professional who is somewhat new to the cloud, or an architect or developer with

Cloud computing is the third wave of the digital revolution and it is actually a

this book is a comprehensive guide to secure your cloud environments.

I would like to convey our appreciation to all contributors including the accepted chapters' authors. I owe special thanks to Ms. Mia Vulovic, Author Service Manager and Ms. Klara Mestrovic, Commissioning Editor, IntechOpen, London, UK for their kind support and great efforts in bringing the book to fruition. In addition, I also appreciate all those who worked in the background and have assisted in formatting the book.

spectrum of things complementing one another, building on a foundation of sharing. Cloud computing enables simplified functionality of platforms and infrastructure used in IT-enabled industries, so that the end-users can consume what and when they want and pay only for the service they use. Cloud computing can be characterized as Internet-based computing in which many remote networked servers facilitate shared data-processing ventures, centralized storage, and access to services or resources online. With the advent of business process outsourcing of IT and IT-enabled services, cloud computing has gained significant commercial interest. Inherent dualities in the cloud computing phenomenon are spawning divergent strategies for cloud computing success. The public cloud, hybrid clouds, and private clouds now dot the landscape of IT based solutions. Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. In almost all organizations, security has to fight for time and funding, and it often takes a back seat to implementing features and functions. While many of the security controls and principles are similar in cloud and on-premises environments, there are some important practical differences. As the title states,
