Cloud Security : Concepts, Applications and Perspectives

個数:1
紙書籍版価格
¥18,878
  • 電子書籍

Cloud Security : Concepts, Applications and Perspectives

  • 著者名:Gupta, Brij B. (EDT)
  • 価格 ¥13,862 (本体¥12,602)
  • CRC Press(2021/05/25発売)
  • ポイント 126pt (実際に付与されるポイントはご注文内容確認画面でご確認下さい)
  • 言語:ENG
  • ISBN:9780367722968
  • eISBN:9781000357363

ファイル: /

Description

Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them.

Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain.

This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.

Table of Contents

Secured IoT devices management in Cloud-Fog Environment using Blockchain

Asutosh Kumar Biswal, Sourav Kanti Addya, Bibhudatta Sahoo and Ashok Kumar Turuk

Integrating Cloud and Health Informatics: Approaches, Applications and Challenges

Sheshang M Ajwalia, Anu Mary Chacko and Madhu Kumar S D

A Flow Based Anomaly Detection System for Slow DDoS Attack on HTTP

Muraleedharan N, and Janet B

Explicating Fog Computing: Key Research Challenges and Solutions

Vipin Singh, John Paul Martin, K. Chandrasekaran, and A Kandasamy

Comparison of Various Techniques for Emergency Vehicle Detection using Audio Processing

Eshwar Prithvi Jonnadula and Pabitra Mohan Khilar

Cryptanalysis of a Robust ECC Based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things

Diksha Rangwani, Dipanwita Sadhukhan, and Sangram Ray

Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment

Dipanwita Sadhukhan and Sangram Ray

Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber Physical Systems

Dr. M. Sangeetha, Mathan Kumar M and Sakthi Kavin S.S.

Active Forgery Detection inGrayscale Images using CRC-8based Fragile Watermarking

Srilekha Paul and Arup Kumar Pal

Android Malware Classification using Ensemble Classifiers

Shivi Garg J.C. Bose, and Niyati Baliyan

Provably Secure Lightweight Key Policy Attribute Based Encryption for Internet of Things

K Sowjanya, and Mou Dasgupta

An Improved Two Factor Authentication Scheme for TMIS based on Dual Biometrics

Aashish Kumar, Preeti Chandrakar, and Rifaqat Ali

Identifying and Mitigating Against XSS Attacks in Web Applications

Shashidhara, and R Madhusudhan

Statistical Analysis Tests Comparison for DES, AES and Rubik’s Cube Encryption Algorithms

Krishna Dharavathu and Dr.M.Satya Anuradha

Cloud based Security Analysis in Body Area Network for Health Care Applications

Dharmendra Dangi, Dheeraj Dixit and Amit Bhagat

Fog Robotics: A New Perspective for Cloud-based Robots

Jaykumar Lachure and Rajesh Doriya

最近チェックした商品