Data security in cloud computing

This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.

Saved in:
Bibliographic Details
Other Authors Kumar, Vimal (Editor), Chaisiri, Sivadon (Editor), Ko, Ryan (Editor)
Format Electronic eBook
LanguageEnglish
Published London : The Institution of Engineering and Technology, 2017.
SeriesIET security series ; 5.
Subjects
Online AccessFull text
ISBN9781785612213
1785612212
9781523112555
1523112557
9781785612206
1785612204
Physical Description1 online resource : illustrations

Cover

Table of Contents:
  • Contents
  • Preface
  • 1. A data-centric view of cloud security / Vimal Kumar, Sivadon Chaisiri, and Ryan Ko
  • 2. Nomad: a framework for ensuring data confidentiality in mission-critical cloud-based applications / Mamadou H. Diallo, Michael August, Roger Hallman, Megan Kline, Henry Au, and Scott M. Slayback
  • 3. Preserving privacy in pre-classification volume ray-casting of 3D images / Manoranjan Mohanty, Muhammad Rizwan Asghar, and Giovanni Russello
  • 4. Multiprocessor system-on-chip for processing data in cloud computing / Arnab Kumar Biswas, S.K. Nandy, and Ranjani Narayan5. Distributing encoded data for private processing in the cloud / Mark A. Will and Ryan K.L. Ko
  • 6. Data protection and mobility management for cloud / Dat Dang, Doan Hoang, and Priyadarsi Nanda
  • 7. Understanding software-defined perimeter / Chenkang Tang, Vimal Kumar, and Sivadon Chaisiri
  • 8. Security, trust, and privacy for cloud computing in Transportation Cyber-Physical Systems / Wenjia Li, Jonathan Voris, and N. Sertac Artan
  • 9. Review of data leakage attack techniques in cloud systems / Zirak Allaf and Mo Adda10. Cloud computing and personal data processing: sorting-out legal requirements / Ioulia Konstantinou and Irene Kamara
  • 11. The Waikato Data Privacy Matrix / Craig Scoon and Ryan K.L. Ko
  • 12. Data provenance in cloud / Alan Yu Shyang Tan, Sivadon Chaisiri, Ryan Ko Kok Leong, Geoff Holmes, and Bill Rogers
  • 13. Security visualization for cloud computing: an overview / Jeffery Garae, Ryan K.L. Ko, and Mark Apperley