Data Security in Cloud Computing - Product Image

Data Security in Cloud Computing

  • ID: 4226324
  • Book
  • IET Books
1 of 4

Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, this can open security, privacy, trust and compliance issues. This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.

Data Security in Cloud Computing covers major aspects of securing data in Cloud Computing. Topics covered include NOMAD: a framework for ensuring data confidentiality in mission-critical cloud based applications; 3DCrypt: privacy-preserving pre-classification volume ray-casting of 3D images in the cloud; multiprocessor system-on-chip for processing data in Cloud Computing; distributing encoded data for private processing in the cloud; data protection and mobility management for cloud; understanding software defined perimeter; security, trust and privacy for Cloud Computing in transportation cyber-physical systems; review of data leakage attack techniques in cloud systems; Cloud Computing and personal data processing: sorting out legal requirements; the Waikato data privacy matrix; provenance reconstruction in clouds; and security visualization for Cloud Computing.

Note: Product cover images may vary from those shown
2 of 4
- Chapter 1: A data-centric view of cloud security
- Chapter 2: Nomad: a framework for ensuring data confidentiality in mission-critical cloud-based applications
- Chapter 3: Preserving privacy in pre-classification volume ray-casting of 3D images
- Chapter 4: Multiprocessor system-on-chip for processing data in cloud computing
- Chapter 5: Distributing encoded data for private processing in the cloud
- Chapter 6: Data protection and mobility management for cloud
- Chapter 7: Understanding software-defined perimeter
- Chapter 8: Security, trust, and privacy for cloud computing in Transportation Cyber-Physical Systems
- Chapter 9: Review of data leakage attack techniques in cloud systems
- Chapter 10: Cloud computing and personal data processing: sorting-out legal requirements
- Chapter 11: The Waikato Data Privacy Matrix
- Chapter 12: Data provenance in cloud
- Chapter 13: Security visualization for cloud computing: an overview
Note: Product cover images may vary from those shown
3 of 4

Loading
LOADING...

4 of 4
Vimal Kumar Lecturer.
University of Waikato, Faculty of Computing & Mathematical Sciences, New Zealand.

Dr Vimal Kumar is a Lecturer at the University of Waikato in New Zealand where his research interests are in the development of secure Wireless Sensor Networks, Sensor Clouds and Internet of Things. He is also interested in solving security challenges in cloud computing and personal wearable devices.

Sivadon Chaisiri Research Fellow.
University of Waikato, Faculty of Computing & Mathematical Sciences, New Zealand.

Dr Sivadon Chaisiri is currently a Research Fellow at the University of Waikato's Cyber Security Lab and is conducting cyber security research in STRATUS, a cloud security project funded by the Ministry of Business, Innovation and Employment, New Zealand. He was the Principal Investigator of a mobile security project funded by InternetNZ and a privacy management project funded by the Office of Privacy Commissioner, New Zealand. His research interests include Cyber Security Economics, Context-aware Security, and Stochastic Optimisation.

Ryan Ko Associate Professor.
University of Waikato, Faculty of Computing & Mathematical Sciences, New Zealand.

Dr Ryan Ko is an Associate Professor at the University of Waikato, New Zealand. He heads the cyber security programme, serves as the Research Adviser for the Cloud Security Alliance's Asia Pacific Region, and is International Faculty Member at Idaho State University, USA. He is Principal Investigator of the 6-year NZD12.23 million MBIE science investment project - STRATUS (Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud), and editor of the ISO/IEC 21878 standard - Security guidelines for the design and implementation of virtualized servers.

Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown
Adroll
adroll