Data Security in Cloud Computing

Author:   Vimal Kumar (Lecturer, University of Waikato, Faculty of Computing & Mathematical Sciences, New Zealand) ,  Ryan Ko (Research Fellow, University of Waikato, Faculty of Computing & Mathematical Sciences, New Zealand) ,  Sivadon Chaisiri (Associate Professor, University of Waikato, Faculty of Computing & Mathematical Sciences, New Zealand)
Publisher:   Institution of Engineering and Technology
ISBN:  

9781785612206


Pages:   328
Publication Date:   31 July 2017
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $284.63 Quantity:  
Add to Cart

Share |

Data Security in Cloud Computing


Add your own review!

Overview

Full Product Details

Author:   Vimal Kumar (Lecturer, University of Waikato, Faculty of Computing & Mathematical Sciences, New Zealand) ,  Ryan Ko (Research Fellow, University of Waikato, Faculty of Computing & Mathematical Sciences, New Zealand) ,  Sivadon Chaisiri (Associate Professor, University of Waikato, Faculty of Computing & Mathematical Sciences, New Zealand)
Publisher:   Institution of Engineering and Technology
Imprint:   Institution of Engineering and Technology
ISBN:  

9781785612206


ISBN 10:   1785612204
Pages:   328
Publication Date:   31 July 2017
Audience:   College/higher education ,  Professional and scholarly ,  Tertiary & Higher Education ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Chapter 1: A data-centric view of cloud security Chapter 2: Nomad: a framework for ensuring data confidentiality in mission-critical cloud-based applications Chapter 3: Preserving privacy in pre-classification volume ray-casting of 3D images Chapter 4: Multiprocessor system-on-chip for processing data in cloud computing Chapter 5: Distributing encoded data for private processing in the cloud Chapter 6: Data protection and mobility management for cloud Chapter 7: Understanding software-defined perimeter Chapter 8: Security, trust, and privacy for cloud computing in Transportation Cyber-Physical Systems Chapter 9: Review of data leakage attack techniques in cloud systems Chapter 10: Cloud computing and personal data processing: sorting-out legal requirements Chapter 11: The Waikato Data Privacy Matrix Chapter 12: Data provenance in cloud Chapter 13: Security visualization for cloud computing: an overview

Reviews

Author Information

Dr Vimal Kumar is a Lecturer at the University of Waikato in New Zealand where his research interests are in the development of secure Wireless Sensor Networks, Sensor Clouds and Internet of Things. He is also interested in solving security challenges in cloud computing and personal wearable devices. Dr Sivadon Chaisiri is currently a Research Fellow at the University of Waikato's Cyber Security Lab and is conducting cyber security research in STRATUS, a cloud security project funded by the Ministry of Business, Innovation and Employment, New Zealand. He was the Principal Investigator of a mobile security project funded by InternetNZ and a privacy management project funded by the Office of Privacy Commissioner, New Zealand. His research interests include Cyber Security Economics, Context-aware Security, and Stochastic Optimisation. Dr Ryan Ko is an Associate Professor at the University of Waikato, New Zealand. He heads the cyber security programme, serves as the Research Adviser for the Cloud Security Alliance's Asia Pacific Region, and is International Faculty Member at Idaho State University, USA. He is Principal Investigator of the 6-year NZD12.23 million MBIE science investment project - STRATUS (Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud), and editor of the ISO/IEC 21878 standard - Security guidelines for the design and implementation of virtualized servers.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List