- литература в один клик

Cloud Security: Techniques and Applications

  • Добавил: literator
  • Дата: 16-07-2021, 17:50
  • Комментариев: 0
Cloud Security: Techniques and ApplicationsНазвание: Cloud Security: Techniques and Applications
Автор: Sirisha Potluri, Katta Subba Rao, Sachi Nandan Mohanty
Издательство: De Gruyter
Год: 2021
Страниц: 212
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

Sustainable computing paradigms like cloud and fog are mining better solutions to handle the issues of security, privacy, performance, storage, processing, maintenance, efficiency, integration, cost, energy and latency. In these evolving days, according to statistics, billions of connected devices are producing enormous amounts of real time data. For complex computation and processing of the collected data in order to make the dynamic decisions these devices are connected over the cloud or fog environment. Best practices and protocols are being implemented by cloud to ensure security and privacy everywhere in the architecture.

This book illuminates some of the best practices and their respective outcomes in cloud environment to preserve privacy and security. This book is aiming to provide next level of security and privacy preserving techniques for dynamic cloud. Innovative techniques and methods for secure cloud are gathered to present advanced and specialized research in the selected area.

Various state-of-the-art and cutting edge methods to achieve security and privacy in cloud computing environment by using Artificial intelligence, Machine learning, Blockchain, IoT, DDoS mitigating practices, Industry 4.0, Cloud manufacturing, Data analytics and Vanet are essential slices of this book.

This book essences on various research issues related to security and privacy preserving approaches and techniques using big data storage and analysis, large scale data processing, knowledge discovery and knowledge management, computational intelligence, data security and privacy, data representation and visualization and data analytics. The featured technology of this book optimizes various industry processes using business intelligence in engineering and technology. This book sheds light on cloud based secure integrated and development practices to increase productivity and reduce the operational cost.

Chapter 1 focuses on AI based advanced technology that helps companies to manage complex operations efficiently and improve productivity. AI-based networks allows to maximize organizational performance but also to evade risks and threats. This chapter focuses on security and privacy related issues and explored effective counter measure to handle such issues. This chapter also provides latest literature on collaboratively secured collections to identify the kind of vulnerability they address and also the form of approach they use to handle it.

Chapter 2 focuses on Blockchain based advanced technology to deliver infrastructure and has been adopted widely due to its performance and availability. Blockchain Technology, one of the emerging technologies can be used to complement the issues concerning cloud users. This technology provides features like decentralization, distribution, authenticity, immutability, trust, etc. that can be used to face the threats of data integrity. This chapter focuses on concerning the security and privacy of the data in the cloud model and how the features of the blockchain technology can enhance the integrity of this model.

Chapter 3 focuses on DDoS attack occurrences, DDoS types and associated security and privacy issues in cloud computing environment. Due to the dynamic behavior, distributed paradigm and heterogeneity present among the processing elements, devices and service oriented pay per use policies; the cloud computing environment is having its availability, security and privacy issues. Among these various issues one of the important issues in cloud computing paradigm is DDoS attack. This chapter put in plain words the DDoS attack, its detection as well as prevention mechanisms in cloud computing environment. This chapter also explains about the effects of DDoS attack on cloud platform and the related defence mechanisms required to be considered...

Скачать Cloud Security: Techniques and Applications

Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.