Normal view MARC view ISBD view

Security and Data Storage Aspect in Cloud Computing [electronic resource] / by Prachi S. Deshpande, Subhash C. Sharma, Sateesh K. Peddoju.

By: Deshpande, Prachi S [author.].
Contributor(s): Sharma, Subhash C [author.] | Peddoju, Sateesh K [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Studies in Big Data: 52Publisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2019Edition: 1st ed. 2019.Description: XII, 85 p. 39 illus., 24 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9789811360893.Subject(s): Telecommunication | Data protection | Big data | Communications Engineering, Networks | Data and Information Security | Big DataAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 621.382 Online resources: Click here to access online
Contents:
1. Introduction -- 2. Host-based Intrusion Detection System -- 3. Network-based Intrusion Detection System -- 4. Data Security and Storage Module in Cloud -- 5. Conclusions and Research Direction.
In: Springer Nature eBookSummary: This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike.
    average rating: 0.0 (0 votes)
No physical items for this record

1. Introduction -- 2. Host-based Intrusion Detection System -- 3. Network-based Intrusion Detection System -- 4. Data Security and Storage Module in Cloud -- 5. Conclusions and Research Direction.

This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike.

There are no comments for this item.

Log in to your account to post a comment.