Wednesday , January 17 2018
Home / Cloud Computing / Handbook of Research on Security Considerations in Cloud Computing

Handbook of Research on Security Considerations in Cloud Computing

Handbook of Research on Security Considerations in Cloud Computing

Big data is concept more uses from various companies. Some examples are related with oil and gas refineries and mining industries, online social networks, multimedia data and business related transactions. More amount of data collected from different increasingly efficient data storing various devices as well as stored on fast-growing mass storage, people are keep to search to find solutions to collect and process the information more efficiently, and to find various values from the mass at the same time. When referring to big data research strategy problems, people often support the 4 v’s — volume, velocity, variety, and value.

Chapter 1
Security Issues in Cloud Computing
Subhash Chandra Patel, Indian Institute of Technology (BHU), India
R.S. Singh, Indian Institute of Technology (BHU), India
Sumit Jaiswal, Indian Institute of Technology (BHU), India
Chapter 2
Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing
Marwan Omar, Nawroz University, Iraq
Chapter 3
Cloud Security Using Ear Biometrics
Santosh Kumar, Indian Institute of Technology, India
Ali Imam Abidi, Indian Institute of Technology, India
Sanjay Kumar Singh, Indian Institute of Technology, India
Chapter 4
Secure Architecture for Cloud Environment
Kashif Munir, Malaysia University of Science and Technology, Malaysia
Sellapan Palaniappan, Malaysia University of Science and Technology, Malaysia
Chapter 5
Governance and Risk Management in the Cloud with Cloud Controls Matrix V3 and ISO/IEC
38500:2008
Abhik Chaudhuri, Tata Consultancy Services, India
Chapter 6
Authentication and Error Resilience in Images Transmitted through Open Environment
Qurban A Memon, UAE University, UAE
Chapter 7
Trust Calculation Using Fuzzy Logic in Cloud Computing
Rajanpreet Kaur Chahal, Panjab University, India
Sarbjeet Singh, Panjab University, India
Chapter 8
Advances in Information, Security, Privacy & Ethics: Use of Cloud Computing For Education
Joseph M. Woodside, Stetson University, USA
Chapter 9
Networked Multimedia Communication Systems
Piyush Kumar Shukla, University Institute of Technology RGPV, India
Kirti Raj Bhatele, University Institute of Technology RGPV, India
Chapter 10
Data Security Issues and Solutions in Cloud Computing
Abhishek Majumder, Tripura University, India
Sudipta Roy, Assam University, India
Satarupa Biswas, Tripura University, India
Chapter 11
Improving Privacy and Security in Multicloud Architectures
Piyush Kumar Shukla, University Institute of Technology RGPV, India
Mahendra Kumar Ahirwar, University Institute of Technology-RGPV, India
Chapter 12
Hard Clues in Soft Environments: The Cloud’s Influence on Digital Forensics
Andrea Atzeni, Politecnico di Torino, Italy
Paolo Smiraglia, Politecnico di Torino, Italy
Andrea Siringo, Former Student at Politecnico di Torino, Italy
Chapter 13
Security Challenges for Cloud Computing Development Framework in Saudi Arabia
Lawan A. Mohammed, King Fahd University of Petroleum and Minerals, Saudi Arabia
Kashif Munir, King Fahd University of Petroleum and Minerals, Saudi Arabia
Chapter 14
Big Data Security: Challenges, Recommendations and Solutions
Fatima-Zahra Benjelloun, Ibn Tofail University, Morocco
Ayoub Ait Lahcen, Ibn Tofail University, Morocco
Chapter 15
Access Control Framework for Cloud Computing
Kashif Munir, King Fahd University of Petroleum and Minerals, Saudi Arabia
Lawan A. Mohammed, King Fahd University of Petroleum and Minerals, Saudi Arabia
Chapter 16
Big Data: An Emerging Field of Data Engineering
Piyush Kumar Shukla, University Institute of Technology RGPV, India
Madhuvan Dixit, Millennium Institute of Technology, India
Chapter 17
Achieving Efficient Purging in Transparent per-file Secure Wiping Extensions
Wasim Ahmad Bhat, University of Kashmir, India
Chapter 18
Reliability, Fault Tolerance, and Quality-of-Service in Cloud Computing: Analysing
Characteristics
Piyush Kumar Shukla, University Institute of Technology RGPV, India
Gaurav Singh, Motilal Nehru National Institute of Technology, India

Handbook of Research on Security Considerations in Cloud Computing


Top books

About huydam

Check Also

Best online backup images in Google+

Social networking services have become essential tools for anyone wanting to share their photos. Google+ …

Leave a Reply

Your email address will not be published. Required fields are marked *