Cloud security : concepts, methodologies, tools, and applications /

"This book explores the difficulties and challenges of securing user data and information on cloud platforms. It also examines the current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting a range of topics such as cloud fo...

Full description

Saved in:
Bibliographic Details
Corporate Authors: IGI Global; Information Resources Management Association.
Published: IGI Global,
Publisher Address: Hershey, Pennsylvania :
Publication Dates: [2019]
Literature type: eBook
Language: English
Subjects:
Online Access: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5
Summary: "This book explores the difficulties and challenges of securing user data and information on cloud platforms. It also examines the current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting a range of topics such as cloud forensics, information privacy, and standardization and security in the cloud"--
Carrier Form: 121 PDFs (4 volumes)
Bibliography: Includes bibliographical references and index.
ISBN: 9781522581772
Access: Restricted to subscribers or individual electronic text purchasers.
Index Number: QA76
CLC: TP393.027
Contents: Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Curtailing the threats to cloud computing in the fourth industrial revolution ; Chapter 2. Role of security mechanisms in the building blocks of the cloud infrastructure ; Chapter 3. A review of intrusion detection systems in cloud computing ; Chapter 4. Cloud-based platforms and infrastructures: provisioning physical and virtual networks ; Chapter 5. A comprehensive survey on trust issue and its deployed models in computing environment ; Chapter 6. Anomaly detection in cloud environments ; Chapter 7. Cloud database security issues and challenges ; Chapter 8. Approaches to cloud computing in the public sector: case studies in UK local government -- Section 2. Development and design methodologies. Chapter 9. A multi-dimensional mean failure cost model to enhance security of cloud computing systems ; Chapter 10. Enterprise security framework for enterprise cloud data centres ; Chapter 11. A security framework for secure cloud computing environments ; Chapter 12. Information security innovation: personalisation of security services in a mobile cloud infrastructure ; Chapter 13. Intelligent techniques for providing effective security to cloud databases ; Chapter 14. A TPM-based secure multi-cloud storage architecture grounded on erasure codes ; Chapter 15. Modeling the ranking of evaluation criteria for cloud services: the government organization perspective in India ; Chapter 16. A framework to secure medical image storage in cloud computing environment ; Chapter 17. A security-by-distribution approach to manage big data in a federation of untrustworthy clouds ; Chapter 18. Enhanced trust path between two entities in cloud computing environment ; Chapter 19. Architectural design of trusted platform for IaaS cloud computing ; Chapter 20. An adaptive enterprise architecture framework and implementation: towards global enterprises in the era of cloud/mobile IT/digital IT ; Chapter 21. An authentication technique for accessing de-duplicated data from private cloud using one time password ; Chapter 22. A comprehensive survey on techniques based on TPM for ensuring the confidentiality in cloud data centers ; Chapter 23. Strategic planning for cloud computing adoption in STEM education: finding best practice solutions ; Chapter 24. The dynamic data privacy protection strategy based on the CAP theory ; Chapter 25. A novel multi-secret sharing approach for secure data warehousing and on-Line analysis processing in the cloud ; Chapter 26. A secured real time scheduling model for cloud hypervisor -- Section 3. Tools and technologies. Chapter 27. CCCE: cryptographic cloud computing environment based on quantum computations -- Volume II. Chapter 28. Role of agents to enhance the security and scalability in cloud environment ; Chapter 29. Runtime reusable weaving model for cloud services using aspect-oriented programming: the security-related aspect ; Chapter 30. Security in ad hoc network and computing paradigms ; Chapter 31. A proactive approach to intrusion detection in cloud software as a service ; Chapter 32. Cryptography in big data security ; Chapter 33. Glorified secure search schema over encrypted secure cloud storage with a hierarchical clustering computation ; Chapter 34. Classification of file data based on confidentiality in cloud computing using K-NN classifier ; Chapter 35. Access control framework for cloud computing ; Chapter 36. Cloud computing data storage security based on different encryption schemes ; Chapter 37. Healthcare saas based on a data model with built-in security and privacy ; Chapter 38. Security model for mobile cloud database as a service (DBaaS) ; Chapter 39. Securely communicating with an optimal cloud for intelligently enhancing a cloud's elasticity ; Chapter 40. Semantic electronic commerce architecture and models in cloud ; Chapter 41. Better security and encryption within cloud computing systems ; Chapter 42. Analyzing virtualization vulnerabilities and design a secure cloud environment to prevent from XSS attack ; Chapter 43. Cloud and cyber security through Crypt-Iris-based authentication approach ; Chapter 44. Trusted cloud- and femtocell-based biometric authentication for mobile networks ; Chapter 45. Modelling of cloud computing enablers using MICMAC analysis and TISM ; Chapter 46. Byzantine fault-tolerant architecture in cloud data management ; Chapter 47. A credible cloud service model based on behavior graphs and tripartite decision-making mechanism ; Chapter 48. Keystroke dynamics authentication in cloud computing: a survey -- Section 4. Utilization and applications. Chapter 49. Cloud computing and cybersecurity issues facing local enterprises ; Chapter 50. Data security and privacy assurance considerations in cloud computing for health insurance providers ; Chapter 51. Identification of various privacy and trust issues in cloud computing environment ; Chapter 52. Cryptographic cloud computing environment a
Legal issues surrounding connected government services: a closer look at g-clouds ; Chapter 89. Investigating the determinants of decision-making on adoption of public cloud computing in e-government ; Chapter 90. Communication privacy management and mobile phone use ; Chapter 91. Benefits and challenges for BPM in the cloud ; Chapter 92. Security and privacy issues in cloud-based e-government ; Chapter 93. Smart healthcare administration over cloud -- Section 7. Critical issues and challenges. Chapter 94. A comparative study of privacy protection practices in the US, Europe, and Asia ; Chapter 95. Survey on ddos attacks and defense mechanisms in cloud and fog computing ; Chapter 96. Multi-aspect DDOS detection system for securing cloud network ; Chapter 97. Session hijacking over cloud environment: a literature survey ; Chapter 98. Impact of big data on security: big data security issues and defense schemes ; Chapter 99. Investigating the determinants of IT professionals' intention to use cloud-based applications and solutions: an extension of the technology acceptance ; Chapter 100. Privacy preserving public auditing in cloud: literature review -- Section 8. Emerging trends. Chapter 101. Advances in information, security, privacy and ethics: use of cloud computing for education ; Chapter 102. On developing fair and orderly cloud markets: qos- and security-aware optimization of cloud collaboration ; Chapter 103. The much needed security and data reforms of cloud computing in medical data storage ; Chapter 104. Deployment and optimization for cloud computing technologies in IoT ; Chapter 105. Trust in an enterprise world: a survey ; Chapter 106. Challenges and opportunities in vehicular cloud computing ; Chapter 107. Future directions to the application of distributed fog computing in smart grid systems ; Chapter 108. Emerging cloud computing services: a brief opinion article.