Security and Data Storage Aspect in Cloud Computing / by Prachi S. Deshpande, Subhash C. Sharma, Sateesh K. Peddoju.
Material type: TextSeries: Studies in Big Data ; 52Publication details: Singapore : Springer Singapore : Imprint: Springer, c 2019.Edition: 1st ed. 2019Description: XII, 85 pages.: 39 illustrations, 24 illustrations in color,; 27 cmISBN:- 9789811360893
- 621.382 23 DES-S 2019 791198
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|---|
Books | Faculty of Information Technology Book Cart | Book | 621.382 DES-S 2019 791198 (Browse shelf(Opens below)) | 1 | Available | 791198 | |||
Books | Faculty of Information Technology Book Cart | Book | 621.382 DES-S 2019 791199 (Browse shelf(Opens below)) | 2 | Available | 791199 | |||
Books | Faculty of Information Technology Book Cart | Book | 621.382 DES-S 2019 791200 (Browse shelf(Opens below)) | 3 | Available | 791200 | |||
Books | Faculty of Information Technology Book Cart | Book | 621.382 DES-S 2019 791201 (Browse shelf(Opens below)) | 4 | Available | 791201 | |||
Books | Faculty of Information Technology Book Cart | Book | 621.382 DES-S 2019 791202 (Browse shelf(Opens below)) | 5 | Available | 791202 |
1. Introduction -- 2. Host-based Intrusion Detection System -- 3. Network-based Intrusion Detection System -- 4. Data Security and Storage Module in Cloud -- 5. Conclusions and Research Direction.
This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike.