Data security in cloud computing
This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.
Saved in:
| Other Authors | , , |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
London :
The Institution of Engineering and Technology,
2017.
|
| Series | IET security series ;
5. |
| Subjects | |
| Online Access | Full text |
| ISBN | 9781785612213 1785612212 9781523112555 1523112557 9781785612206 1785612204 |
| Physical Description | 1 online resource : illustrations |
Cover
Table of Contents:
- Contents
- Preface
- 1. A data-centric view of cloud security / Vimal Kumar, Sivadon Chaisiri, and Ryan Ko
- 2. Nomad: a framework for ensuring data confidentiality in mission-critical cloud-based applications / Mamadou H. Diallo, Michael August, Roger Hallman, Megan Kline, Henry Au, and Scott M. Slayback
- 3. Preserving privacy in pre-classification volume ray-casting of 3D images / Manoranjan Mohanty, Muhammad Rizwan Asghar, and Giovanni Russello
- 4. Multiprocessor system-on-chip for processing data in cloud computing / Arnab Kumar Biswas, S.K. Nandy, and Ranjani Narayan5. Distributing encoded data for private processing in the cloud / Mark A. Will and Ryan K.L. Ko
- 6. Data protection and mobility management for cloud / Dat Dang, Doan Hoang, and Priyadarsi Nanda
- 7. Understanding software-defined perimeter / Chenkang Tang, Vimal Kumar, and Sivadon Chaisiri
- 8. Security, trust, and privacy for cloud computing in Transportation Cyber-Physical Systems / Wenjia Li, Jonathan Voris, and N. Sertac Artan
- 9. Review of data leakage attack techniques in cloud systems / Zirak Allaf and Mo Adda10. Cloud computing and personal data processing: sorting-out legal requirements / Ioulia Konstantinou and Irene Kamara
- 11. The Waikato Data Privacy Matrix / Craig Scoon and Ryan K.L. Ko
- 12. Data provenance in cloud / Alan Yu Shyang Tan, Sivadon Chaisiri, Ryan Ko Kok Leong, Geoff Holmes, and Bill Rogers
- 13. Security visualization for cloud computing: an overview / Jeffery Garae, Ryan K.L. Ko, and Mark Apperley