Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities /

"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate ev...

Full description

Saved in:
Bibliographic Details
Main Authors: Gunasekhar, T., 1990- (Author)
Corporate Authors: IGI Global
Group Author: Rao, K. Thirupathi; Kiran, P. Sai; Krishna Reddy, V.; Rao, B. Thirumala
Published: IGI Global,
Publisher Address: Hershey, Pennsylvania :
Publication Dates: [2019]
Literature type: eBook
Language: English
Subjects:
Online Access: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3
Summary: "This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"--
Carrier Form: 14 PDFs (113 pages)
Bibliography: Includes bibliographical references and index.
ISBN: 9781522579250
Access: Restricted to subscribers or individual electronic text purchasers.
Index Number: QA76
CLC: TP393.027
Contents: Chapter 1. Security architecture of cloud computing -- Chapter 2. Trusted cloud computing -- Chapter 3. A Survey on insider attacks in IAAS-based cloud -- Chapter 4. Security flaws and design issues in cloud infrastructure -- Chapter 5. Trustworthy framework for insider attack prevention and detection -- Chapter 6. Results and discussions.