|
|
|
|
LEADER |
02997nam a2200517 4500 |
001 |
978-981-13-6089-3 |
003 |
DE-He213 |
005 |
20191026162828.0 |
007 |
cr nn 008mamaa |
008 |
190209s2019 si | s |||| 0|eng d |
020 |
|
|
|a 9789811360893
|9 978-981-13-6089-3
|
024 |
7 |
|
|a 10.1007/978-981-13-6089-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK1-9971
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
072 |
|
7 |
|a TJK
|2 thema
|
082 |
0 |
4 |
|a 621.382
|2 23
|
100 |
1 |
|
|a Deshpande, Prachi S.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Security and Data Storage Aspect in Cloud Computing
|h [electronic resource] /
|c by Prachi S. Deshpande, Subhash C. Sharma, Sateesh K. Peddoju.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XII, 85 p. 39 illus., 24 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Studies in Big Data,
|x 2197-6503 ;
|v 52
|
505 |
0 |
|
|a 1. Introduction -- 2. Host-based Intrusion Detection System -- 3. Network-based Intrusion Detection System -- 4. Data Security and Storage Module in Cloud -- 5. Conclusions and Research Direction.
|
520 |
|
|
|a This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Big data.
|
650 |
1 |
4 |
|a Communications Engineering, Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/T24035
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Big Data.
|0 http://scigraph.springernature.com/things/product-market-codes/I29120
|
700 |
1 |
|
|a Sharma, Subhash C.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Peddoju, Sateesh K.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811360886
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811360909
|
830 |
|
0 |
|a Studies in Big Data,
|x 2197-6503 ;
|v 52
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-13-6089-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|