Sirisha Potluri - Cloud Security
Here you can read online Sirisha Potluri - Cloud Security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: De Gruyter, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Romance novel
Science fiction
Adventure
Detective
Science
History
Home and family
Prose
Art
Politics
Computer
Non-fiction
Religion
Business
Children
Humor
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
- Book:Cloud Security
- Author:
- Publisher:De Gruyter
- Genre:
- Year:2021
- Rating:4 / 5
- Favourites:Add to favourites
- Your mark:
- 80
- 1
- 2
- 3
- 4
- 5
Cloud Security: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cloud Security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
Cloud Security — read online for free the complete book (whole text) full work
Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cloud Security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.
Font size:
Interval:
Bookmark:
Smart Computing Applications
Edited by
ISBN 9783110737509
e-ISBN (PDF) 9783110732573
e-ISBN (EPUB) 9783110732702
Bibliographic information published by the Deutsche Nationalbibliothek
The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available on the Internet at http://dnb.dnb.de.
2021 Walter de Gruyter GmbH, Berlin/Boston
Sirisha Potluri, Katta Subba Rao, Sachi Nandan Mohanty (Eds.)
Cloud Security
De Gruyter Series on Smart Computing Applications
Edited by Prasenjit Chatterjee, Dilbagh Panchal, Dragan Pamucar, Sarfaraz Hashemkhani Zolfani
Volume 1
Cloud Security
Techniques and Applications
Edited by Sirisha Potluri, Katta Subba Rao, Sachi Nandan Mohanty
Editors
Asst.Prof. Sirisha Potluri
ICFAI Foundation for Higher Education
Department of CSE, IcfaiTech
Faculty of Science and Technology
Donthanpally Shankarpalli Road
Telangana-501203
India
Dr. Katta Subba Rao
B.V.Raju Institute of Technology
Department of CSE
Medak District
Telangana-502313
India
subbarao.k@bvrit.ac.in
Dr. Sachi Nandan Mohanty
College of Engineering Pune
Department of Computer Engineering
Wellesley Road, Shivajinagar, Pune
Maharashtra-411005
India
ISBN 978-3-11-073750-9
e-ISBN (PDF) 978-3-11-073257-3
e-ISBN (EPUB) 978-3-11-073270-2
ISSN 2700-6239
Library of Congress Control Number: 2021939885
Bibliographic information published by the Deutsche Nationalbibliothek
The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available on the Internet at http://dnb.dnb.de.
2021 Walter de Gruyter GmbH, Berlin/Boston
Cover image: monsitj / iStock / Getty Images Plus
www.degruyter.com
This book is humbly dedicated in honour of Shri N. J. Yasaswy, Finance and investment writer and founder of ICFAI University and Shri E. N. Murthy, Member Secretary, The ICFAI Society, whose support, encouragement and blessings made us to get this effort and work.
Aforesaid volume contains the devotion with great love and affection In memory of my beloved father Shri Potluri. Rama Mohana Rao, whose foundation, inspiration and benediction made me to achieve this great career and life.
Sustainable computing paradigms like cloud and fog are mining better solutions to handle the issues of security, privacy, performance, storage, processing, maintenance, efficiency, integration, cost, energy and latency. In these evolving days, according to statistics, billions of connected devices are producing enormous amounts of real time data. For complex computation and processing of the collected data in order to make the dynamic decisions these devices are connected over the cloud or fog environment. Best practices and protocols are being implemented by cloud to ensure security and privacy everywhere in the architecture.
This book illuminates some of the best practices and their respective outcomes in cloud environment to preserve privacy and security. This book is aiming to provide next level of security and privacy preserving techniques for dynamic cloud. Innovative techniques and methods for secure cloud are gathered to present advanced and specialized research in the selected area.
Various state-of-the-art and cutting edge methods to achieve security and privacy in cloud computing environment by using Artificial intelligence, Machine learning, Blockchain, IoT, DDoS mitigating practices, Industry 4.0, Cloud manufacturing, Data analytics and Vanet are essential slices of this book.
This book essences on various research issues related to security and privacy preserving approaches and techniques using big data storage and analysis, large scale data processing, knowledge discovery and knowledge management, computational intelligence, data security and privacy, data representation and visualization and data analytics. The featured technology of this book optimizes various industry processes using business intelligence in engineering and technology. This book sheds light on cloud based secure integrated and development practices to increase productivity and reduce the operational cost.
focuses on AI based advanced technology that helps companies to manage complex operations efficiently and improve productivity. AI-based networks allows to maximize organizational performance but also to evade risks and threats. This chapter focuses on security and privacy related issues and explored effective counter measure to handle such issues. This chapter also provides latest literature on collaboratively secured collections to identify the kind of vulnerability they address and also the form of approach they use to handle it.
and privacy of the data in the cloud model and how the features of the blockchain technology can enhance the integrity of this model.
focuses on DDoS attack occurrences, DDoS types and associated security and privacy issues in cloud computing environment. Due to the dynamic behavior, distributed paradigm and heterogeneity present among the processing elements, devices and service oriented pay per use policies; the cloud computing environment is having its availability, security and privacy issues. Among these various issues one of the important issues in cloud computing paradigm is DDoS attack. This chapter put in plain words the DDoS attack, its detection as well as prevention mechanisms in cloud computing environment. This chapter also explains about the effects of DDoS attack on cloud platform and the related defence mechanisms required to be considered.
focuses on secure cloud based healthcare application to handle big data of healthcare industry. Handling and processing such huge chunks of data can be a daunting task. To avoid scenarios of this type, many of the healthcare sectors have adapted cloud computing as the solution. This chapter explains privacy related issues and security related concerns, dynamically acceptable storage, regulatory issues, electronic documents containing patients data, handwritten medical editions, various images such as X-ray, MRI scan and radiology images analysis.
focuses on secure IoT frameworks, methods, security arrangements, and the best protection models are important and suitable for the various layers of IoT operated applications. This chapter also proposed embossed IoT model: standard and expanded with security and safety components and layers of physical evidence. This chapter also explains about perceived security vulnerabilities and best security measures to combat network security risks in all layers of cloud, edge, and IoT.
focuses on efficient marketing strategies for business to business marketing and business to customer marketing are greatly heightened by using cloud based marketing automation solutions. Cloud governance ensure to meet business desires and needs through professional practices. Significant factors to ensure security in cloud marketing are embedded in each phase of marketing life cycle. This chapter explains about various cloud based secure marketing solutions to meet next generation marketing needs.
Font size:
Interval:
Bookmark:
Similar books «Cloud Security»
Look at similar books to Cloud Security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.
Discussion, reviews of the book Cloud Security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.