Zetech University Library - Online Catalog

Mobile: +254-705278678

Whatsapp: +254-706622557

Feedback/Complaints/Suggestions

library@zetech.ac.ke

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary

Security of cloud-based systems / edited by Jovan Pehcevski.

Contributor(s): Material type: TextTextPublication details: Burlington, ON : Arcler Press, 2021.Description: 1 online resource (434 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 1774079801
  • 9781774079805
Subject(s): Additional physical formats: Print version:: Security of Cloud-based systems.DDC classification:
  • 004.67/82 23
LOC classification:
  • QA76.585 .S43 2021
Online resources:
Contents:
Cover -- Copyright -- DECLARATION -- ABOUT THE EDITOR -- TABLE OF CONTENTS -- List of Contributors -- List of Abbreviations -- Preface -- Section 1 Threats Detection in Cloud Environments -- Chapter 1 Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment -- Abstract -- Introduction -- Fivesaas Security Challenges -- Security Issues In Cloud Environment -- Security Threats To Cloud Computing Infrastructures -- Some Of The Security Techniques For Securing The VCCI -- Conclusion And Future Work -- References
Chapter 2 A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications -- Abstract -- Introduction -- Concept Of Anomaly Detection Systems -- Taxonomy Of Anomalies -- Anomaly Detection In Cloud Networks -- Comparative Survey Of Cloud Security Measures In Cloud Storage Applications -- Conclusion -- References -- Chapter 3 A Survey of Cloud Computing Detection Techniques Against DDoS Attacks -- Abstract -- Introduction -- Literature Review -- Analyzing Specific DDoS Detection Techniques -- Mdra-Based DDoS Detection Technique
Contrastive Analysis -- Conclusions And Future Work -- Notes -- References -- Chapter 4 Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers -- Abstract -- Introduction -- Related Work -- Overview of Cloud Data Center & Datacenter Services -- Generation of Normal Cloud Traces -- Generation of Attack Cloud Traces -- Ethical Consideration -- Conclusion & Future Work -- Acknowledgements -- References -- Section 2 Frameworks for Cloud Security
Chapter 5 Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture -- Abstract -- Introduction -- Literature Review -- Methodology -- Security Framework -- Mas Architecture -- Implementation Ganawa -- Pilot Study -- Conclusion -- References -- Chapter 6 Control Framework for Secure Cloud Computing -- Abstract -- Introduction -- Companies Involved In Cloud Computing -- Literature Review -- Governing Body -- Organization Control Framework -- Summary And Conclusion -- References
Chapter 7 Security Model for Preserving Privacy over Encrypted Cloud Computing -- Abstract -- Introduction -- Related Work -- Problem Formulation -- Precision And Ranked Privacy -- Performance Analysis -- Conclusion -- References -- Chapter 8 Trusted Heartbeat Framework For Cloud Computing -- Introduction -- Background And Related Work -- Trusted Heartbeat Framework -- Conclusion -- References -- Chapter 9 Education Technology Cloud Platform Framework Establishment and Security -- Abstract -- Introduction -- Problems In The Traditional Information Platform
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Print version record.

Includes bibliographical references and index.

Cover -- Copyright -- DECLARATION -- ABOUT THE EDITOR -- TABLE OF CONTENTS -- List of Contributors -- List of Abbreviations -- Preface -- Section 1 Threats Detection in Cloud Environments -- Chapter 1 Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment -- Abstract -- Introduction -- Fivesaas Security Challenges -- Security Issues In Cloud Environment -- Security Threats To Cloud Computing Infrastructures -- Some Of The Security Techniques For Securing The VCCI -- Conclusion And Future Work -- References

Chapter 2 A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications -- Abstract -- Introduction -- Concept Of Anomaly Detection Systems -- Taxonomy Of Anomalies -- Anomaly Detection In Cloud Networks -- Comparative Survey Of Cloud Security Measures In Cloud Storage Applications -- Conclusion -- References -- Chapter 3 A Survey of Cloud Computing Detection Techniques Against DDoS Attacks -- Abstract -- Introduction -- Literature Review -- Analyzing Specific DDoS Detection Techniques -- Mdra-Based DDoS Detection Technique

Contrastive Analysis -- Conclusions And Future Work -- Notes -- References -- Chapter 4 Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers -- Abstract -- Introduction -- Related Work -- Overview of Cloud Data Center & Datacenter Services -- Generation of Normal Cloud Traces -- Generation of Attack Cloud Traces -- Ethical Consideration -- Conclusion & Future Work -- Acknowledgements -- References -- Section 2 Frameworks for Cloud Security

Chapter 5 Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture -- Abstract -- Introduction -- Literature Review -- Methodology -- Security Framework -- Mas Architecture -- Implementation Ganawa -- Pilot Study -- Conclusion -- References -- Chapter 6 Control Framework for Secure Cloud Computing -- Abstract -- Introduction -- Companies Involved In Cloud Computing -- Literature Review -- Governing Body -- Organization Control Framework -- Summary And Conclusion -- References

Chapter 7 Security Model for Preserving Privacy over Encrypted Cloud Computing -- Abstract -- Introduction -- Related Work -- Problem Formulation -- Precision And Ranked Privacy -- Performance Analysis -- Conclusion -- References -- Chapter 8 Trusted Heartbeat Framework For Cloud Computing -- Introduction -- Background And Related Work -- Trusted Heartbeat Framework -- Conclusion -- References -- Chapter 9 Education Technology Cloud Platform Framework Establishment and Security -- Abstract -- Introduction -- Problems In The Traditional Information Platform

In The Building Of Could Platform, The Work That I Had Done Includes: Cloud Platform Framework Design Objectives.

Added to collection customer.56279.3

There are no comments on this title.

to post a comment.