<p><span>It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud computing offers massive storage, hig
Security and Privacy for Big Data, Cloud Computing and Applications
โ Scribed by Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa
- Publisher
- The Institution of Engineering and Technology
- Year
- 2019
- Tongue
- English
- Leaves
- 330
- Series
- IET Computing 28
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications.
Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.
โฆ Table of Contents
Chapter 1: Privacy preserving in big dataChapter 2: Privacy-preserving analysis for big data using cryptographic toolsChapter 3: Big data security in Internet of ThingsChapter 4: A watermark-based in situ access-control model for image big dataChapter 5: Blockchain-based security and access control for BIM big dataChapter 6: Security of marine-information systemChapter 7: A layered security architecture based on cyber kill chain against advanced persistent threatsChapter 8: Privacy-aware digital forensicsChapter 9: A survey of trust, trustworthiness and trustworthy computing: concepts, models and challengesChapter 10: Software-defined mobile networks securityChapter 11: Dynamic public opinion evolvement modeling and supervision in social networksChapter 12: Privacy verification of PhotoDNA based on machine learningChapter 13: Chaos-based communication systems
โฆ Subjects
Big data -- Security measures;Cloud computing -- Security measures
๐ SIMILAR VOLUMES
<p>This book addresses topics related to cloud and Big Data technologies, architecture and applications including distributed computing and data centers, cloud infrastructure and security, and end-user services. The majority of the book is devoted to the security aspects of cloud computing and Big D
<p>This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics a
<p>Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-
<p><span>Data has revolutionized the digital ecosystem. Readily available large datasets foster AI and machine learning automated solutions. The data generated from diverse and varied sources including IoT, social platforms, healthcare, system logs, bio-informatics, etc. contribute to and define the