Поиск по каталогу |
(строгое соответствие)
|
- Профессиональная
- Научно-популярная
- Художественная
- Публицистика
- Детская
- Искусство
- Хобби, семья, дом
- Спорт
- Путеводители
- Блокноты, тетради, открытки
Security and Privacy Challenges in Cloud Computing Environment.
В наличии
Местонахождение: Алматы | Состояние экземпляра: новый |
Бумажная
версия
версия
Автор: Dileep Kumar Murala and Sandeep Kumar Panda
ISBN: 9786204736631
Год издания: 1905
Формат книги: 60×90/16 (145×215 мм)
Количество страниц: 164
Издательство: LAP LAMBERT Academic Publishing
Цена: 46262 тг
Положить в корзину
Способы доставки в город Алматы * комплектация (срок до отгрузки) не более 2 рабочих дней |
Самовывоз из города Алматы (пункты самовывоза партнёра CDEK) |
Курьерская доставка CDEK из города Москва |
Доставка Почтой России из города Москва |
Аннотация: Cloud computing is gaining popularity among different users and organizations and one of the prominent areas of research in the present world. It delivers on- demand computing services including networking, software, storage, etc through the Internet. There are many advantages like cost-saving, flexibility in capacity, availability, etc. those exist in cloud computing but the major drawback is to create a secure cloud storage system. Additionally, cloud environments are controlled by several service providers like Amazon, Microsoft, Google's App Engine, etc. Cloud environment provides security depending upon the centralized third-party provider and hence, the data confidentiality has to be compromised. Data confidentiality and integrity are important concepts that are required to be maintained to preserve security and privacy in the cloud. Confidentiality keeps the sensitive data secure, whereas integrity assures data which improves better data privacy. There are many cryptographic methods available such as symmetric, asymmetric, etc., but every algorithm has its drawbacks in terms of time complexity, various attacks, etc.
Ключевые слова: cloud security, Privacy, Cloud Delivery Models, Deployment Models, ciphertext, symmetric cryptography, Asymmetric Cryptography, virtualization, trust, Access Control, Blockchain, Tamper-proof