Security of Cloud-based systems
- Length: 405 pages
- Edition: 1
- Language: English
- Publisher: Arcler Press
- Publication Date: 2020-11-01
- ISBN-10: 1774077779
- ISBN-13: 9781774077771
- Sales Rank: #0 (See Top 100 Books)
This edition covers different topics from security of cloud-based systems, including: threats detection in cloud environments, frameworks for cloud security, enhancing the security in the cloud systems, and the case studies. Section 1 focuses on threats detection in cloud environments, describing analysis of security threats to virtual machines monitor in cloud computing environment; a review of anomaly detection systems in cloud networks and survey of cloud security measures in cloud storage applications; a survey of cloud computing detection techniques against DDoS attacks; and generation of labelled datasets to quantify the impact of security threats to cloud data centers. Section 2 focuses on frameworks for cloud security, describing a comprehensive security framework of cloud data storage based on multi agent system architecture; control framework for secure cloud computing; security model for preserving privacy over encrypted cloud computing; trusted heartbeat framework for cloud computing; and education technology cloud platform framework establishment and security. Section 3 focuses on enhancing the security in the cloud systems, describing design and development of a novel symmetric algorithm for enhancing data security in cloud computing; enhancing mobile cloud computing security using steganography; data security of mobile cloud computing on cloud server; new proposed robust, scalable and secure network cloud computing storage architecture; and survey on public key cryptography scheme for securing data in cloud computing. Section 4 focuses on case studies, describing cloud security: services, risks, and a case study on amazon cloud services; quick survey on cloud computing and associated security, mobility and IoT issues; block level data integrity assurance using matrix dialing method towards high performance data security on cloud storage; current status of the use of cloud computing in SME-s in the city of Latacunga, Ecuador.
Cover Copyright DECLARATION ABOUT THE EDITOR TABLE OF CONTENTS List of Contributors List of Abbreviations Preface Section 1 Threats Detection in Cloud Environments Chapter 1 Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment Abstract Introduction Fivesaas Security Challenges Security Issues In Cloud Environment Security Threats To Cloud Computing Infrastructures Some Of The Security Techniques For Securing The VCCI Conclusion And Future Work References Chapter 2 A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications Abstract Introduction Concept Of Anomaly Detection Systems Taxonomy Of Anomalies Anomaly Detection In Cloud Networks Comparative Survey Of Cloud Security Measures In Cloud Storage Applications Conclusion References Chapter 3 A Survey of Cloud Computing Detection Techniques Against DDoS Attacks Abstract Introduction Literature Review Analyzing Specific DDoS Detection Techniques Mdra-Based DDoS Detection Technique Contrastive Analysis Conclusions And Future Work Notes References Chapter 4 Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers Abstract Introduction Related Work Overview of Cloud Data Center & Datacenter Services Generation of Normal Cloud Traces Generation of Attack Cloud Traces Ethical Consideration Conclusion & Future Work Acknowledgements References Section 2 Frameworks for Cloud Security Chapter 5 Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture Abstract Introduction Literature Review Methodology Security Framework Mas Architecture Implementation Ganawa Pilot Study Conclusion References Chapter 6 Control Framework for Secure Cloud Computing Abstract Introduction Companies Involved In Cloud Computing Literature Review Governing Body Organization Control Framework Summary And Conclusion References Chapter 7 Security Model for Preserving Privacy over Encrypted Cloud Computing Abstract Introduction Related Work Problem Formulation Precision And Ranked Privacy Performance Analysis Conclusion References Chapter 8 Trusted Heartbeat Framework For Cloud Computing Introduction Background And Related Work Trusted Heartbeat Framework Conclusion References Chapter 9 Education Technology Cloud Platform Framework Establishment and Security Abstract Introduction Problems In The Traditional Information Platform In The Building Of Could Platform, The Work That I Had Done Includes: Cloud Platform Framework Design Objectives Security Issues In The Using Of The Cloud Platform Conclusion Acknowledgements References Section 3 Enhancing Security in the Cloud Chapter 10 Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing Abstract Introduction Literature Review Methodology Research Design And Analysis Result Discussion Conclusions References Chapter 11 Enhancing Mobile Cloud Computing Security Using Steganography Abstract Introduction Background: Cloud And Mobile Computing Related Work Steganography: Background The Method Using Steganography Case Study Conclusion And Future Work References Chapter 12 Data Security of Mobile Cloud Computing on Cloud Server Abstract Introduction Research Background And Overview Research Methodology Previous Work Key Components XML Signature Element Wrapping Mobile Terminal Security Issues Proposed Work Implementation Deployed Application Conclusions Acknowledgements Future Work References Chapter 13 New Proposed Robust, Scalable and Secure Network Cloud Computing Storage Architecture Abstract Introduction Security Issues Analysis Of Our Proposed Scheme Conclusion And Future Directions References Chapter 14 Survey on Public Key Cryptography Scheme for Securing Data in Cloud Computing Abstract Introduction Security Challenges In Cloud Cloud Security Attacks Public Key Cryptography Techniques Digital Signature Results And Discussion Conclusion References Section 4 Case Studies Chapter 15 Cloud Security: Services, Risks, and a Case Study on Amazon Cloud Services Abstract Introduction Amazon’s Cloud Storage Data Security Cloud Risks and API Concerns Service And Account Hijacking The Future Of Cloud Security Conclusion References Chapter 16 A Quick Survey on Cloud Computing and Associated Security, Mobility and IoT Issues Abstract Introduction Cloud Computing General Overview Cloud Computing Security Mobile Cloud Computing Internet Of Things (IoT) Conclusion Acknowledgements References Chapter 17 Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage Abstract Introduction Proposed Methodology Comparison Of Results And Analysis Conclusion References Chapter 18 Current Status of the Use of Cloud Computing in SMEs in the City of Latacunga, Ecuador Abstract Introduction Theoretical Framework Methodology Results Conclusions References Index Back Cover
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.