Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, this can open security, privacy, trust and compliance issues. This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.
Data Security in Cloud Computing covers major aspects of securing data in Cloud Computing. Topics covered include NOMAD: a framework for ensuring data confidentiality in mission-critical cloud based applications; 3DCrypt: privacy-preserving pre-classification volume ray-casting of 3D images in the cloud; multiprocessor system-on-chip for processing data in Cloud Computing; distributing encoded data for private processing in the cloud; data protection and mobility management for cloud; understanding software defined perimeter; security, trust and privacy for Cloud Computing in transportation cyber-physical systems; review of data leakage attack techniques in cloud systems; Cloud Computing and personal data processing: sorting out legal requirements; the Waikato data privacy matrix; provenance reconstruction in clouds; and security visualization for Cloud Computing.
Les mer
This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.
Chapter 1: A data-centric view of cloud securityChapter 2: Nomad: a framework for ensuring data confidentiality in mission-critical cloud-based applicationsChapter 3: Preserving privacy in pre-classification volume ray-casting of 3D imagesChapter 4: Multiprocessor system-on-chip for processing data in cloud computingChapter 5: Distributing encoded data for private processing in the cloudChapter 6: Data protection and mobility management for cloudChapter 7: Understanding software-defined perimeterChapter 8: Security, trust, and privacy for cloud computing in Transportation Cyber-Physical SystemsChapter 9: Review of data leakage attack techniques in cloud systemsChapter 10: Cloud computing and personal data processing: sorting-out legal requirementsChapter 11: The Waikato Data Privacy MatrixChapter 12: Data provenance in cloudChapter 13: Security visualization for cloud computing: an overview
Les mer
Produktdetaljer
ISBN
9781785612206
Publisert
2017-07-31
Utgiver
Vendor
Institution of Engineering and Technology
Høyde
234 mm
Bredde
156 mm
Aldersnivå
U, P, 05, 06
Språk
Product language
Engelsk
Format
Product format
Innbundet
Antall sider
328