• Complain

Sirisha Potluri - Cloud Security

Here you can read online Sirisha Potluri - Cloud Security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: De Gruyter, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover

Cloud Security: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cloud Security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Sirisha Potluri: author's other books


Who wrote Cloud Security? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cloud Security — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cloud Security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Smart Computing Applications Edited by Prasenjit Chatterjee Dilbagh Panchal - photo 1

Smart Computing Applications

Edited by

Prasenjit Chatterjee
Dilbagh Panchal
Dragan Pamucar
Sharfaraz Ashemkhani Zolfani

ISBN 9783110737509

e-ISBN (PDF) 9783110732573

e-ISBN (EPUB) 9783110732702

Bibliographic information published by the Deutsche Nationalbibliothek

The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available on the Internet at http://dnb.dnb.de.

2021 Walter de Gruyter GmbH, Berlin/Boston

Sirisha Potluri, Katta Subba Rao, Sachi Nandan Mohanty (Eds.)

Cloud Security

De Gruyter Series on Smart Computing Applications

Cloud Security - image 2

Edited by Prasenjit Chatterjee, Dilbagh Panchal, Dragan Pamucar, Sarfaraz Hashemkhani Zolfani

Volume 1

Cloud Security

Techniques and Applications

Edited by Sirisha Potluri, Katta Subba Rao, Sachi Nandan Mohanty

Editors

Asst.Prof. Sirisha Potluri

ICFAI Foundation for Higher Education

Department of CSE, IcfaiTech

Faculty of Science and Technology

Donthanpally Shankarpalli Road

Telangana-501203

India

Dr. Katta Subba Rao

B.V.Raju Institute of Technology

Department of CSE

Medak District

Telangana-502313

India

subbarao.k@bvrit.ac.in

Dr. Sachi Nandan Mohanty

College of Engineering Pune

Department of Computer Engineering

Wellesley Road, Shivajinagar, Pune

Maharashtra-411005

India

ISBN 978-3-11-073750-9

e-ISBN (PDF) 978-3-11-073257-3

e-ISBN (EPUB) 978-3-11-073270-2

ISSN 2700-6239

Library of Congress Control Number: 2021939885

Bibliographic information published by the Deutsche Nationalbibliothek

The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available on the Internet at http://dnb.dnb.de.

2021 Walter de Gruyter GmbH, Berlin/Boston

Cover image: monsitj / iStock / Getty Images Plus

www.degruyter.com

Cloud Security - image 3

This book is humbly dedicated in honour of Shri N. J. Yasaswy, Finance and investment writer and founder of ICFAI University and Shri E. N. Murthy, Member Secretary, The ICFAI Society, whose support, encouragement and blessings made us to get this effort and work.

Aforesaid volume contains the devotion with great love and affection In memory of my beloved father Shri Potluri. Rama Mohana Rao, whose foundation, inspiration and benediction made me to achieve this great career and life.

Preface

Sustainable computing paradigms like cloud and fog are mining better solutions to handle the issues of security, privacy, performance, storage, processing, maintenance, efficiency, integration, cost, energy and latency. In these evolving days, according to statistics, billions of connected devices are producing enormous amounts of real time data. For complex computation and processing of the collected data in order to make the dynamic decisions these devices are connected over the cloud or fog environment. Best practices and protocols are being implemented by cloud to ensure security and privacy everywhere in the architecture.

This book illuminates some of the best practices and their respective outcomes in cloud environment to preserve privacy and security. This book is aiming to provide next level of security and privacy preserving techniques for dynamic cloud. Innovative techniques and methods for secure cloud are gathered to present advanced and specialized research in the selected area.

Various state-of-the-art and cutting edge methods to achieve security and privacy in cloud computing environment by using Artificial intelligence, Machine learning, Blockchain, IoT, DDoS mitigating practices, Industry 4.0, Cloud manufacturing, Data analytics and Vanet are essential slices of this book.

This book essences on various research issues related to security and privacy preserving approaches and techniques using big data storage and analysis, large scale data processing, knowledge discovery and knowledge management, computational intelligence, data security and privacy, data representation and visualization and data analytics. The featured technology of this book optimizes various industry processes using business intelligence in engineering and technology. This book sheds light on cloud based secure integrated and development practices to increase productivity and reduce the operational cost.

focuses on AI based advanced technology that helps companies to manage complex operations efficiently and improve productivity. AI-based networks allows to maximize organizational performance but also to evade risks and threats. This chapter focuses on security and privacy related issues and explored effective counter measure to handle such issues. This chapter also provides latest literature on collaboratively secured collections to identify the kind of vulnerability they address and also the form of approach they use to handle it.

and privacy of the data in the cloud model and how the features of the blockchain technology can enhance the integrity of this model.

focuses on DDoS attack occurrences, DDoS types and associated security and privacy issues in cloud computing environment. Due to the dynamic behavior, distributed paradigm and heterogeneity present among the processing elements, devices and service oriented pay per use policies; the cloud computing environment is having its availability, security and privacy issues. Among these various issues one of the important issues in cloud computing paradigm is DDoS attack. This chapter put in plain words the DDoS attack, its detection as well as prevention mechanisms in cloud computing environment. This chapter also explains about the effects of DDoS attack on cloud platform and the related defence mechanisms required to be considered.

focuses on secure cloud based healthcare application to handle big data of healthcare industry. Handling and processing such huge chunks of data can be a daunting task. To avoid scenarios of this type, many of the healthcare sectors have adapted cloud computing as the solution. This chapter explains privacy related issues and security related concerns, dynamically acceptable storage, regulatory issues, electronic documents containing patients data, handwritten medical editions, various images such as X-ray, MRI scan and radiology images analysis.

focuses on secure IoT frameworks, methods, security arrangements, and the best protection models are important and suitable for the various layers of IoT operated applications. This chapter also proposed embossed IoT model: standard and expanded with security and safety components and layers of physical evidence. This chapter also explains about perceived security vulnerabilities and best security measures to combat network security risks in all layers of cloud, edge, and IoT.

focuses on efficient marketing strategies for business to business marketing and business to customer marketing are greatly heightened by using cloud based marketing automation solutions. Cloud governance ensure to meet business desires and needs through professional practices. Significant factors to ensure security in cloud marketing are embedded in each phase of marketing life cycle. This chapter explains about various cloud based secure marketing solutions to meet next generation marketing needs.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cloud Security»

Look at similar books to Cloud Security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cloud Security»

Discussion, reviews of the book Cloud Security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.