𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cloud Computing and Big Data: Technologies, Applications and Security

✍ Scribed by Mostapha Zbakh, Mohammed Essaaidi, Pierre Manneback, Chunming Rong


Publisher
Springer International Publishing
Year
2019
Tongue
English
Leaves
406
Series
Lecture Notes in Networks and Systems 49
Edition
1st ed.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book addresses topics related to cloud and Big Data technologies, architecture and applications including distributed computing and data centers, cloud infrastructure and security, and end-user services. The majority of the book is devoted to the security aspects of cloud computing and Big Data.

Cloud computing, which can be seen as any subscription-based or pay-per-use service that extends the Internet’s existing capabilities, has gained considerable attention from both academia and the IT industry as a new infrastructure requiring smaller investments in hardware platforms, staff training, or licensing software tools. It is a new paradigm that has ushered in a revolution in both data storage and computation.

In parallel to this progress, Big Data technologies, which rely heavily on cloud computing platforms for both data storage and processing, have been developed and deployed at breathtaking speed. They are among the most frequently used technologies for developing applications and services in many fields, such as the web, health, and energy.

Accordingly, cloud computing and Big Data technologies are two of the most central current and future research mainstreams. They involve and impact a host of fields, including business, scientific research, and public and private administration.

Gathering extended versions of the best papers presented at the Third International Conference on Cloud Computing Technologies and Applications (CloudTech’17), this book offers a valuable resource for all Information System managers, researchers, students, developers, and policymakers involved in the technological and application aspects of cloud computing and Big Data.

✦ Table of Contents


Front Matter ....Pages i-xiii
Elliptic Curve Qu-Vanstone Based Signcryption Schemes with Proxy Re-encryption for Secure Cloud Data Storage (Placide Shabisha, An Braeken, Abdellah Touhafi, Kris Steenhaut)....Pages 1-18
Cloud Computing: Overview and Risk Identification Based on Classification by Type (Chaimaa Belbergui, Najib Elkamoun, Rachid Hilal)....Pages 19-34
Authentication Model for Mobile Cloud Computing Database Service (Kashif Munir)....Pages 35-48
FADETPM: Novel Approach of File Assured Deletion Based on Trusted Platform Module (Zakaria Igarramen, Mustapha Hedabou)....Pages 49-59
Issues and Threats of Cloud Data Storage (Maryem Berrezzouq, Abdellatif El Ghazi, Zineelabidine Abdelali)....Pages 60-72
Challenges of Crowd Sensing for Cost-Effective Data Management in the Cloud (Aseel Alkhelaiwi, Dan Grigoras)....Pages 73-88
On the Security of Medical Image Processing in Cloud Environment (Mbarek Marwan, Ali Kartit, Hassan Ouahmane)....Pages 89-99
Implementations of Intrusion Detection Architectures in Cloud Computing (Mostapha Derfouf, Mohsine Eleuldj)....Pages 100-124
Privacy in Big Data Through Variable t-Closeness for MSN Attributes (Zakariae El Ouazzani, Hanan El Bakkali)....Pages 125-141
The Big Data-RTAP: Toward a Secured Video Surveillance System in Smart Environment (Abderrahmane Ezzahout, Jawad Oubaha)....Pages 142-149
Optimizations in Fully Homomorphic Encryption (Ahmed El-Yahyaoui, Mohamed Dafir Ech-cherif El Kettani)....Pages 150-166
Support Cloud SLA Establishment Using MDE (Mahmoud El Hamlaoui, Tarik Fissaa, Youness Laghouaouta, Mahmoud Nassar)....Pages 167-184
A New Parallel and Distributed Approach for Large Scale Images Retrieval (Mohammed Amin Belarbi, Sidi Ahmed Mahmoudi, SaΓ―d Mahmoudi, Ghalem Belalem)....Pages 185-201
Classification of Social Network Data Using a Dictionary-Based Approach (Youness Madani, Mohammed Erritali, Jamaa Bengourram)....Pages 202-219
Parallel and Distributed Map-Reduce Models for External Clustering Validation Indexes (Soumeya Zerabi, Souham Meshoul)....Pages 220-240
Workflow Scheduling Issues and Techniques in Cloud Computing: A Systematic Literature Review (Samadi Yassir, Zbakh Mostapha, Tadonki Claude)....Pages 241-263
A Review of Green Cloud Computing Techniques (Hala Zineb Naji, Mostapha Zbakh, Kashif Munir)....Pages 264-283
Towards a Smart Exploitation of GPUs for Low Energy Motion Estimation Using Full HD and 4K Videos (Sidi Ahmed Mahmoudi, Mohammed Amine Belarbi, Pierre Manneback)....Pages 284-300
Machine Learning Applications in Supply Chains: Long Short-Term Memory for Demand Forecasting (Halima Bousqaoui, Said Achchab, Kawtar Tikito)....Pages 301-317
Performance Analysis of Preconditioned Conjugate Gradient Solver on Heterogeneous (Multi-CPUs/Multi-GPUs) Architecture (Najlae Kasmi, Mostapha Zbakh, Amine Haouari)....Pages 318-336
Runtime Prediction of Optimizers Using Improved Support Vector Machine (Abdellatif El Afia, Malek Sarhani)....Pages 337-350
AND/OR Directed Graph for Dynamic Web Service Composition (Hajar Elmaghraoui, Laila Benhlima, Dalila Chiadmi)....Pages 351-368
An NLP Based Text-to-Speech Synthesizer for Moroccan Arabic (Rajae Moumen, Raddouane Chiheb)....Pages 369-379
Context-Aware Routing Protocol for Mobile WSN: Fire Forest Detection (Asmae El Ghazi, Zineb Aarab, BelaΓ―d Ahiod)....Pages 380-391
Back Matter ....Pages 393-394

✦ Subjects


Engineering; Mechatronics; Computational Intelligence


πŸ“œ SIMILAR VOLUMES


Security and Privacy for Big Data, Cloud
✍ Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa πŸ“‚ Library πŸ“… 2019 πŸ› The Institution of Engineering and Technology 🌐 English

As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privac

Authentication Technologies for Cloud Co
✍ Yasser M. Alginahi (editor), Muhammad Nomani Kabir (editor) πŸ“‚ Library πŸ“… 2019 πŸ› INSTITUTION OF ENGINEERING & T 🌐 English

<p>Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-

Security and Privacy Trends in Cloud Com
✍ Muhammad Imran Tariq, Valentina Emilia Balas, Shahzadi Tayyaba πŸ“‚ Library πŸ“… 2022 πŸ› CRC Press 🌐 English

<p><span>It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud computing offers massive storage, hig

Big-Data Analytics and Cloud Computing:
✍ Marcello Trovati, Richard Hill, Ashiq Anjum, Shao Ying Zhu, Lu Liu (eds.) πŸ“‚ Library πŸ“… 2015 πŸ› Springer International Publishing 🌐 English

<p><p>This book reviews the theoretical concepts, leading-edge techniques and practical tools involved in the latest multi-disciplinary approaches addressing the challenges of big data. Illuminating perspectives from both academia and industry are presented by an international selection of experts i

Cloud Computing and Big Data
✍ C. Catlett; W. Gentzsch; L. Grandinetti πŸ“‚ Library πŸ“… 2013 πŸ› IOS Press, Incorporated 🌐 English

Cloud computing offers many advantages to researchers and engineers who need access to high performance computing facilities for solving particular compute-intensive and/or large-scale problems, but whose overall high performance computing (HPC) needs do not justify the acquisition and operation of