<b>This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud.</b> <p>Cloud computing has already been adopted by many organizations and people b
Data security in cloud computing
โ Scribed by Kumar, Vimal
- Publisher
- The Institution of Engineering and Technology
- Year
- 2017
- Tongue
- English
- Leaves
- 324
- Series
- Security.
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.
โฆ Table of Contents
""Contents""
""Preface""
""1. A data-centric view of cloud security / Vimal Kumar, Sivadon Chaisiri, and Ryan Ko""
""2. Nomad: a framework for ensuring data confidentiality in mission-critical cloud-based applications / Mamadou H. Diallo, Michael August, Roger Hallman, Megan Kline, Henry Au, and Scott M. Slayback""
""3. Preserving privacy in pre-classification volume ray-casting of 3D images / Manoranjan Mohanty, Muhammad Rizwan Asghar, and Giovanni Russello"" ""4. Multiprocessor system-on-chip for processing data in cloud computing / Arnab Kumar Biswas, S.K. Nandy, and Ranjani Narayan""""5. Distributing encoded data for private processing in the cloud / Mark A. Will and Ryan K.L. Ko""
""6. Data protection and mobility management for cloud / Dat Dang, Doan Hoang, and Priyadarsi Nanda""
""7. Understanding software-defined perimeter / Chenkang Tang, Vimal Kumar, and Sivadon Chaisiri""
""8. Security, trust, and privacy for cloud computing in Transportation Cyber-Physical Systems / Wenjia Li, Jonathan Voris, and N. Sertac Artan"" ""9. Review of data leakage attack techniques in cloud systems / Zirak Allaf and Mo Adda""""10. Cloud computing and personal data processing: sorting-out legal requirements / Ioulia Konstantinou and Irene Kamara""
""11. The Waikato Data Privacy Matrix / Craig Scoon and Ryan K.L. Ko""
""12. Data provenance in cloud / Alan Yu Shyang Tan, Sivadon Chaisiri, Ryan Ko Kok Leong, Geoff Holmes, and Bill Rogers""
""13. Security visualization for cloud computing: an overview / Jeffery Garae, Ryan K.L. Ko, and Mark Apperley""
โฆ Subjects
Cloud computing -- Security measures;COMPUTERS -- Security -- General;cloud computing;cyber-physical systems;data privacy;data visualisation;matrix algebra;security of data
๐ SIMILAR VOLUMES
<p>This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a networ
<p><span>It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud computing offers massive storage, hig
<p>This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and
This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud stora