Security and Data Storage Aspect in Cloud Computing

This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network b...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Deshpande, Prachi S. (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Sharma, Subhash C. (http://id.loc.gov/vocabulary/relators/aut), Peddoju, Sateesh K. (http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Singapore : Springer Singapore : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:Studies in Big Data, 52
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 02997nam a2200517 4500
001 978-981-13-6089-3
003 DE-He213
005 20191026162828.0
007 cr nn 008mamaa
008 190209s2019 si | s |||| 0|eng d
020 |a 9789811360893  |9 978-981-13-6089-3 
024 7 |a 10.1007/978-981-13-6089-3  |2 doi 
040 |d GrThAP 
050 4 |a TK1-9971 
072 7 |a TJK  |2 bicssc 
072 7 |a TEC041000  |2 bisacsh 
072 7 |a TJK  |2 thema 
082 0 4 |a 621.382  |2 23 
100 1 |a Deshpande, Prachi S.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Security and Data Storage Aspect in Cloud Computing  |h [electronic resource] /  |c by Prachi S. Deshpande, Subhash C. Sharma, Sateesh K. Peddoju. 
250 |a 1st ed. 2019. 
264 1 |a Singapore :  |b Springer Singapore :  |b Imprint: Springer,  |c 2019. 
300 |a XII, 85 p. 39 illus., 24 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Studies in Big Data,  |x 2197-6503 ;  |v 52 
505 0 |a 1. Introduction -- 2. Host-based Intrusion Detection System -- 3. Network-based Intrusion Detection System -- 4. Data Security and Storage Module in Cloud -- 5. Conclusions and Research Direction. 
520 |a This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike. 
650 0 |a Electrical engineering. 
650 0 |a Computer security. 
650 0 |a Big data. 
650 1 4 |a Communications Engineering, Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/T24035 
650 2 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Big Data.  |0 http://scigraph.springernature.com/things/product-market-codes/I29120 
700 1 |a Sharma, Subhash C.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Peddoju, Sateesh K.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9789811360886 
776 0 8 |i Printed edition:  |z 9789811360909 
830 0 |a Studies in Big Data,  |x 2197-6503 ;  |v 52 
856 4 0 |u https://doi.org/10.1007/978-981-13-6089-3  |z Full Text via HEAL-Link 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647)