Amazon cover image
Image from Amazon.com

Security and privacy trends in cloud computing and big data / edited by Muhammad Imran Tarig, Valentina Emilia Balas and Shahzadi Tayyaba

Material type: TextTextPublication details: Boca Raton, FL : CRC Press, c2022.Description: xv, 216 pages : figures and tables ; 25 cmISBN:
  • 9780367619626
Subject(s): LOC classification:
  • QA76.9.A25 SE44 2022
Contents:
Cover Half Title Title Page Copyright Page Table of Contents Preface Editors Contributors 1 Information security framework for cloud and virtualization security 1.1 Introduction 1.2 Virtualization 1.2.1 Type-I hypervisor 1.2.2 Type-II hypervisor 1.2.3 Virtualization benefits 1.2.3.1 Low cost/save energy 1.2.3.2 Small footprints 1.2.3.3 Fast lab provisioning 1.2.3.4 Abstraction 1.2.3.5 Disaster recovery 1.2.3.6 Application isolation 1.2.3.7 Easy migration to cloud 1.2.3.8 Better testing 1.3 Cloud and security issues in virtualization 1.3.1 Virtualization issues 1.3.1.1 Virtualization based malware 1.3.1.2 Mobility 1.3.1.3 Denial of service attack 1.3.1.4 Communication attack among guest VMs and hosts 1.3.1.5 Virtual machine escape 1.3.1.6 Inter-VM attacks and network blind spots 1.4 Information security framework for cloud computing 1.4.1 User network 1.4.2 Security layer 1.4.3 Private cloud 1.4.3.1 User interface layer 1.4.3.2 Platform layer 1.4.3.3 Software layer 1.4.3.4 Management layer 1.4.4 Public cloud 1.5 Conclusion 2.5.2 Data and computing issues and mitigation 2.6 Software issues and mitigation 2.7 Virtualization issues and mitigation 2.8 Web and services issues and mitigation 2.9 Network issues and solutions 2.10 Cloud security issues and solutions 2.11 Authorized data access issues and solutions 2.12 Legal issues and mitigation 2.13 Discussion and open challenges 2.14 Chapter summary References 3 The ways of networks intrusion their detection and prevention 3.1 Introduction 3.2 Literature review 3.3 Methodology 3.3.1 Plan 3.3.1.1 Old work 3.3.1.2 Research 3.3.1.3 Relevant question 3.3.2 Conduction 3.3.2.1 Find out research 3.3.2.2 Output work 3.3.2.3 Extraction 3.3.2.4 Combine data 3.4 Results 3.4.1 Other articles 3.4.2 Report 3.4.2.1 Dynamic assault 3.4.2.2 Mocking 3.4.2.3 Wormhole 3.4.2.4 Creation 3.4.2.5 Repudiation of organizations 3.4.2.6 Sinkhole 3.4.2.7 Sybil 3.4.2.8 Inactive assault 3.4.2.9 Traffic examination 3.4.2.10 Listening 3.4.2.11 Observing 3.4.3 Advance assaults 3.4.3.1 Hustling attack 3.4.3.2 Replay assault 3.4.3.3 Byzantine assault
Abstract: This book explores the security and privacy issues of Cloud Computing and Big Data, providing essential insights into cloud computing and big data integration.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Barcode
Books Books Philippine Christian University Manila Reserve College QA76.9.A25 SE44 2022 (Browse shelf(Opens below)) Not For Loan 52936

Cover
Half Title
Title Page
Copyright Page
Table of Contents
Preface
Editors
Contributors
1 Information security framework for cloud and virtualization security
1.1 Introduction
1.2 Virtualization
1.2.1 Type-I hypervisor
1.2.2 Type-II hypervisor
1.2.3 Virtualization benefits
1.2.3.1 Low cost/save energy
1.2.3.2 Small footprints
1.2.3.3 Fast lab provisioning
1.2.3.4 Abstraction
1.2.3.5 Disaster recovery
1.2.3.6 Application isolation
1.2.3.7 Easy migration to cloud
1.2.3.8 Better testing 1.3 Cloud and security issues in virtualization
1.3.1 Virtualization issues
1.3.1.1 Virtualization based malware
1.3.1.2 Mobility
1.3.1.3 Denial of service attack
1.3.1.4 Communication attack among guest VMs and hosts
1.3.1.5 Virtual machine escape
1.3.1.6 Inter-VM attacks and network blind spots
1.4 Information security framework for cloud computing
1.4.1 User network
1.4.2 Security layer
1.4.3 Private cloud
1.4.3.1 User interface layer
1.4.3.2 Platform layer
1.4.3.3 Software layer
1.4.3.4 Management layer
1.4.4 Public cloud
1.5 Conclusion 2.5.2 Data and computing issues and mitigation
2.6 Software issues and mitigation
2.7 Virtualization issues and mitigation
2.8 Web and services issues and mitigation
2.9 Network issues and solutions
2.10 Cloud security issues and solutions
2.11 Authorized data access issues and solutions
2.12 Legal issues and mitigation
2.13 Discussion and open challenges
2.14 Chapter summary
References
3 The ways of networks intrusion their detection and prevention
3.1 Introduction
3.2 Literature review
3.3 Methodology
3.3.1 Plan
3.3.1.1 Old work 3.3.1.2 Research
3.3.1.3 Relevant question
3.3.2 Conduction
3.3.2.1 Find out research
3.3.2.2 Output work
3.3.2.3 Extraction
3.3.2.4 Combine data
3.4 Results
3.4.1 Other articles
3.4.2 Report
3.4.2.1 Dynamic assault
3.4.2.2 Mocking
3.4.2.3 Wormhole
3.4.2.4 Creation
3.4.2.5 Repudiation of organizations
3.4.2.6 Sinkhole
3.4.2.7 Sybil
3.4.2.8 Inactive assault
3.4.2.9 Traffic examination
3.4.2.10 Listening
3.4.2.11 Observing
3.4.3 Advance assaults
3.4.3.1 Hustling attack
3.4.3.2 Replay assault
3.4.3.3 Byzantine assault

This book explores the security and privacy issues of Cloud Computing and Big Data, providing essential insights into cloud computing and big data integration.

There are no comments on this title.

to post a comment.
credits

© 2024 PCU Learning Resource Center, All Rights Reserved