Description
Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them.
Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain.
This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.
Table of Contents
Secured IoT devices management in Cloud-Fog Environment using Blockchain
Asutosh Kumar Biswal, Sourav Kanti Addya, Bibhudatta Sahoo and Ashok Kumar Turuk
Integrating Cloud and Health Informatics: Approaches, Applications and Challenges
Sheshang M Ajwalia, Anu Mary Chacko and Madhu Kumar S D
A Flow Based Anomaly Detection System for Slow DDoS Attack on HTTP
Muraleedharan N, and Janet B
Explicating Fog Computing: Key Research Challenges and Solutions
Vipin Singh, John Paul Martin, K. Chandrasekaran, and A Kandasamy
Comparison of Various Techniques for Emergency Vehicle Detection using Audio Processing
Eshwar Prithvi Jonnadula and Pabitra Mohan Khilar
Cryptanalysis of a Robust ECC Based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things
Diksha Rangwani, Dipanwita Sadhukhan, and Sangram Ray
Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment
Dipanwita Sadhukhan and Sangram Ray
Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber Physical Systems
Dr. M. Sangeetha, Mathan Kumar M and Sakthi Kavin S.S.
Active Forgery Detection inGrayscale Images using CRC-8based Fragile Watermarking
Srilekha Paul and Arup Kumar Pal
Android Malware Classification using Ensemble Classifiers
Shivi Garg J.C. Bose, and Niyati Baliyan
Provably Secure Lightweight Key Policy Attribute Based Encryption for Internet of Things
K Sowjanya, and Mou Dasgupta
An Improved Two Factor Authentication Scheme for TMIS based on Dual Biometrics
Aashish Kumar, Preeti Chandrakar, and Rifaqat Ali
Identifying and Mitigating Against XSS Attacks in Web Applications
Shashidhara, and R Madhusudhan
Statistical Analysis Tests Comparison for DES, AES and Rubik’s Cube Encryption Algorithms
Krishna Dharavathu and Dr.M.Satya Anuradha
Cloud based Security Analysis in Body Area Network for Health Care Applications
Dharmendra Dangi, Dheeraj Dixit and Amit Bhagat
Fog Robotics: A New Perspective for Cloud-based Robots
Jaykumar Lachure and Rajesh Doriya
-
- 電子書籍
- 初夜の翌日に離婚した没落令嬢ですが、何…
-
- 電子書籍
- 世田谷ライフmagazine No.58
-
- 電子書籍
- 三宮ワケあり不動産調査簿 賃貸マンショ…
-
- 電子書籍
- ジャンプSQ.CROWN 2015 S…