Security and privacy trends in cloud computing and big data / edited by Muhammad Imran Tarig, Valentina Emilia Balas and Shahzadi Tayyaba
Material type:
- 9780367619626
- QA76.9.A25 SE44 2022
Item type | Current library | Collection | Call number | Status | Barcode | |
---|---|---|---|---|---|---|
![]() |
Philippine Christian University Manila Reserve | College | QA76.9.A25 SE44 2022 (Browse shelf(Opens below)) | Not For Loan | 52936 |
Cover
Half Title
Title Page
Copyright Page
Table of Contents
Preface
Editors
Contributors
1 Information security framework for cloud and virtualization security
1.1 Introduction
1.2 Virtualization
1.2.1 Type-I hypervisor
1.2.2 Type-II hypervisor
1.2.3 Virtualization benefits
1.2.3.1 Low cost/save energy
1.2.3.2 Small footprints
1.2.3.3 Fast lab provisioning
1.2.3.4 Abstraction
1.2.3.5 Disaster recovery
1.2.3.6 Application isolation
1.2.3.7 Easy migration to cloud
1.2.3.8 Better testing 1.3 Cloud and security issues in virtualization
1.3.1 Virtualization issues
1.3.1.1 Virtualization based malware
1.3.1.2 Mobility
1.3.1.3 Denial of service attack
1.3.1.4 Communication attack among guest VMs and hosts
1.3.1.5 Virtual machine escape
1.3.1.6 Inter-VM attacks and network blind spots
1.4 Information security framework for cloud computing
1.4.1 User network
1.4.2 Security layer
1.4.3 Private cloud
1.4.3.1 User interface layer
1.4.3.2 Platform layer
1.4.3.3 Software layer
1.4.3.4 Management layer
1.4.4 Public cloud
1.5 Conclusion 2.5.2 Data and computing issues and mitigation
2.6 Software issues and mitigation
2.7 Virtualization issues and mitigation
2.8 Web and services issues and mitigation
2.9 Network issues and solutions
2.10 Cloud security issues and solutions
2.11 Authorized data access issues and solutions
2.12 Legal issues and mitigation
2.13 Discussion and open challenges
2.14 Chapter summary
References
3 The ways of networks intrusion their detection and prevention
3.1 Introduction
3.2 Literature review
3.3 Methodology
3.3.1 Plan
3.3.1.1 Old work 3.3.1.2 Research
3.3.1.3 Relevant question
3.3.2 Conduction
3.3.2.1 Find out research
3.3.2.2 Output work
3.3.2.3 Extraction
3.3.2.4 Combine data
3.4 Results
3.4.1 Other articles
3.4.2 Report
3.4.2.1 Dynamic assault
3.4.2.2 Mocking
3.4.2.3 Wormhole
3.4.2.4 Creation
3.4.2.5 Repudiation of organizations
3.4.2.6 Sinkhole
3.4.2.7 Sybil
3.4.2.8 Inactive assault
3.4.2.9 Traffic examination
3.4.2.10 Listening
3.4.2.11 Observing
3.4.3 Advance assaults
3.4.3.1 Hustling attack
3.4.3.2 Replay assault
3.4.3.3 Byzantine assault
This book explores the security and privacy issues of Cloud Computing and Big Data, providing essential insights into cloud computing and big data integration.
There are no comments on this title.