PERHAPS A GIFT VOUCHER FOR MUM?: MOTHER'S DAY

Close Notification

Your cart does not contain any items

Cloud Security

Concepts, Applications and Perspectives

Brij B. Gupta (Director, International Center for AI & CCRI)

$131

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
CRC Press
29 May 2023
Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them.

Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain.

This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.

Edited by:  
Imprint:   CRC Press
Country of Publication:   United Kingdom
Dimensions:   Height: 234mm,  Width: 156mm, 
Weight:   458g
ISBN:   9780367722968
ISBN 10:   0367722968
Series:   Cyber Ecosystem and Security
Pages:   250
Publication Date:  
Audience:   College/higher education ,  General/trade ,  Primary ,  ELT Advanced
Format:   Paperback
Publisher's Status:   Active
Secured IoT devices management in Cloud-Fog Environment using Blockchain. Integrating Cloud and Health Informatics: Approaches, Applications and Challenges. A Flow Based Anomaly Detection System for Slow DDoS Attack on HTTP. Explicating Fog Computing: Key Research Challenges and Solutions. Comparison of Various Techniques for Emergency Vehicle Detection using Audio Processing. Cryptanalysis of a Robust ECC Based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things. Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment. Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber Physical Systems. Active Forgery Detection in Grayscale Images using CRC-8based Fragile Watermarking. Android Malware Classification using Ensemble Classifiers. Provably Secure Lightweight Key Policy Attribute Based Encryption for Internet of Things. An Improved Two Factor Authentication Scheme for TMIS based on Dual Biometrics. Identifying and Mitigating Against XSS Attacks in Web Applications. Statistical Analysis Tests Comparison for DES, AES and Rubik’s Cube Encryption Algorithms. Cloud based Security Analysis in Body Area Network for Health Care Applications. Fog Robotics: A New Perspective for Cloud-based Robots.

Brij B. Gupta received a PhD degree from Indian Institute of Technology Roorkee, India. In 2009, he was selected for the Canadian Commonwealth Scholarship awarded by the Government of Canada. He published more than 250 research papers in International Journals and Conferences of high repute. At present, Dr. Gupta is working as an Assistant Professor with National Institute of Technology, Kurukshetra, India. His research interest includes Information Security, Cyber Security, Cloud Computing, Web Securit, and Phishing.

See Also