Improving security, privacy, and trust in cloud computing:
"Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud se...
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
2024.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike."-- |
Beschreibung: | 21 PDFs (299 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9798369314326 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00328093 | ||
003 | IGIG | ||
005 | 20240209134413.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 240209s2024 pau fob 001 0 eng d | ||
020 | |a 9798369314326 |q PDF | ||
020 | |z 9798369314319 |q print | ||
024 | 7 | |a 10.4018/979-8-3693-1431-9 |2 doi | |
035 | |a (CaBNVSL)slc00005537 | ||
035 | |a (OCoLC)1420825161 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.585 |b .I47 2024e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Improving security, privacy, and trust in cloud computing |c Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c 2024. | |
300 | |a 21 PDFs (299 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Securing cloud infrastructure in IaaS and PaaS environments -- Chapter 2. Impact of artificial intelligence and machine learning in cloud security -- Chapter 3. An intelligent data retrieving technique and safety measures for sustainable cloud computing -- Chapter 4. Enhancing cloud security: the role of artificial intelligence and machine learning -- Chapter 5. Role-based access control (RBAC) and attribute-based access control (ABAC) -- Chapter 6. Application of artificial intelligence in cybersecurity -- Chapter 7. Accountable malicious entity detection using re-encryption mechanism to share data -- Chapter 8. Balancing innovation and security in the cloud: navigating the risks and rewards of the digital age -- Chapter 9. Data storage and transmission security in the cloud: the artificial intelligence (AI) edge -- Chapter 10. Privacy and surveillance in digital era: a case for India -- Chapter 11. A model for trust decision, data analysis, and evaluation to identify quality web services. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike."-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 02/09/2024). | ||
650 | 0 | |a Cloud computing |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data protection. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Agarwal, Sanyam, |e editor. | |
700 | 1 | |a Goel, Pawan Kumar, |e editor. | |
700 | 1 | |a Pandey, Hari Mohan, |e editor. | |
700 | 1 | |a Singhal, Amit, |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 9798369314319 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-1431-9 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00328093 |
---|---|
_version_ | 1804751466477387776 |
adam_text | |
any_adam_object | |
author2 | Agarwal, Sanyam Goel, Pawan Kumar Pandey, Hari Mohan Singhal, Amit |
author2_role | edt edt edt edt |
author2_variant | s a sa p k g pk pkg h m p hm hmp a s as |
author_facet | Agarwal, Sanyam Goel, Pawan Kumar Pandey, Hari Mohan Singhal, Amit |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 .I47 2024e |
callnumber-search | QA76.585 .I47 2024e |
callnumber-sort | QA 276.585 I47 42024E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Securing cloud infrastructure in IaaS and PaaS environments -- Chapter 2. Impact of artificial intelligence and machine learning in cloud security -- Chapter 3. An intelligent data retrieving technique and safety measures for sustainable cloud computing -- Chapter 4. Enhancing cloud security: the role of artificial intelligence and machine learning -- Chapter 5. Role-based access control (RBAC) and attribute-based access control (ABAC) -- Chapter 6. Application of artificial intelligence in cybersecurity -- Chapter 7. Accountable malicious entity detection using re-encryption mechanism to share data -- Chapter 8. Balancing innovation and security in the cloud: navigating the risks and rewards of the digital age -- Chapter 9. Data storage and transmission security in the cloud: the artificial intelligence (AI) edge -- Chapter 10. Privacy and surveillance in digital era: a case for India -- Chapter 11. A model for trust decision, data analysis, and evaluation to identify quality web services. |
ctrlnum | (CaBNVSL)slc00005537 (OCoLC)1420825161 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04348nam a2200493 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00328093</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20240209134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">240209s2024 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369314326</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9798369314319</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-1431-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00005537</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1420825161</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield><subfield code="b">.I47 2024e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Improving security, privacy, and trust in cloud computing </subfield><subfield code="c">Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">2024.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">21 PDFs (299 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Securing cloud infrastructure in IaaS and PaaS environments -- Chapter 2. Impact of artificial intelligence and machine learning in cloud security -- Chapter 3. An intelligent data retrieving technique and safety measures for sustainable cloud computing -- Chapter 4. Enhancing cloud security: the role of artificial intelligence and machine learning -- Chapter 5. Role-based access control (RBAC) and attribute-based access control (ABAC) -- Chapter 6. Application of artificial intelligence in cybersecurity -- Chapter 7. Accountable malicious entity detection using re-encryption mechanism to share data -- Chapter 8. Balancing innovation and security in the cloud: navigating the risks and rewards of the digital age -- Chapter 9. Data storage and transmission security in the cloud: the artificial intelligence (AI) edge -- Chapter 10. Privacy and surveillance in digital era: a case for India -- Chapter 11. A model for trust decision, data analysis, and evaluation to identify quality web services.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike."--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 02/09/2024).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agarwal, Sanyam,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goel, Pawan Kumar,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pandey, Hari Mohan,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singhal, Amit,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9798369314319</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-1431-9</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00328093 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:52:00Z |
institution | BVB |
isbn | 9798369314326 |
language | English |
oclc_num | 1420825161 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 21 PDFs (299 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global, |
record_format | marc |
spelling | Improving security, privacy, and trust in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, 2024. 21 PDFs (299 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Securing cloud infrastructure in IaaS and PaaS environments -- Chapter 2. Impact of artificial intelligence and machine learning in cloud security -- Chapter 3. An intelligent data retrieving technique and safety measures for sustainable cloud computing -- Chapter 4. Enhancing cloud security: the role of artificial intelligence and machine learning -- Chapter 5. Role-based access control (RBAC) and attribute-based access control (ABAC) -- Chapter 6. Application of artificial intelligence in cybersecurity -- Chapter 7. Accountable malicious entity detection using re-encryption mechanism to share data -- Chapter 8. Balancing innovation and security in the cloud: navigating the risks and rewards of the digital age -- Chapter 9. Data storage and transmission security in the cloud: the artificial intelligence (AI) edge -- Chapter 10. Privacy and surveillance in digital era: a case for India -- Chapter 11. A model for trust decision, data analysis, and evaluation to identify quality web services. Restricted to subscribers or individual electronic text purchasers. "Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike."-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 02/09/2024). Cloud computing Security measures. Computer networks Security measures. Computer security. Data protection. Electronic books. Agarwal, Sanyam, editor. Goel, Pawan Kumar, editor. Pandey, Hari Mohan, editor. Singhal, Amit, editor. IGI Global, publisher. Print version: 9798369314319 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-1431-9 Volltext |
spellingShingle | Improving security, privacy, and trust in cloud computing Chapter 1. Securing cloud infrastructure in IaaS and PaaS environments -- Chapter 2. Impact of artificial intelligence and machine learning in cloud security -- Chapter 3. An intelligent data retrieving technique and safety measures for sustainable cloud computing -- Chapter 4. Enhancing cloud security: the role of artificial intelligence and machine learning -- Chapter 5. Role-based access control (RBAC) and attribute-based access control (ABAC) -- Chapter 6. Application of artificial intelligence in cybersecurity -- Chapter 7. Accountable malicious entity detection using re-encryption mechanism to share data -- Chapter 8. Balancing innovation and security in the cloud: navigating the risks and rewards of the digital age -- Chapter 9. Data storage and transmission security in the cloud: the artificial intelligence (AI) edge -- Chapter 10. Privacy and surveillance in digital era: a case for India -- Chapter 11. A model for trust decision, data analysis, and evaluation to identify quality web services. Cloud computing Security measures. Computer networks Security measures. Computer security. Data protection. |
title | Improving security, privacy, and trust in cloud computing |
title_auth | Improving security, privacy, and trust in cloud computing |
title_exact_search | Improving security, privacy, and trust in cloud computing |
title_full | Improving security, privacy, and trust in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
title_fullStr | Improving security, privacy, and trust in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
title_full_unstemmed | Improving security, privacy, and trust in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
title_short | Improving security, privacy, and trust in cloud computing |
title_sort | improving security privacy and trust in cloud computing |
topic | Cloud computing Security measures. Computer networks Security measures. Computer security. Data protection. |
topic_facet | Cloud computing Security measures. Computer networks Security measures. Computer security. Data protection. Electronic books. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-1431-9 |
work_keys_str_mv | AT agarwalsanyam improvingsecurityprivacyandtrustincloudcomputing AT goelpawankumar improvingsecurityprivacyandtrustincloudcomputing AT pandeyharimohan improvingsecurityprivacyandtrustincloudcomputing AT singhalamit improvingsecurityprivacyandtrustincloudcomputing AT igiglobal improvingsecurityprivacyandtrustincloudcomputing |