Document Type
|
:
|
BL
|
Record Number
|
:
|
891141
|
Main Entry
|
:
|
Deshpande, Prachi S.
|
Title & Author
|
:
|
Security and data storage aspect in cloud computing /\ Prachi S. Deshpande, Subhash C. Sharma, Sateesh K. Peddoju.
|
Publication Statement
|
:
|
Singapore :: Springer,, 2019.
|
Series Statement
|
:
|
Studies in big data,; volume 52
|
Page. NO
|
:
|
1 online resource
|
ISBN
|
:
|
9789811360886
|
|
:
|
: 9789811360893
|
|
:
|
: 9789811360909
|
|
:
|
: 981136088X
|
|
:
|
: 9811360898
|
|
:
|
: 9811360901
|
|
:
|
9789811360886
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references.
|
Contents
|
:
|
Intro; Preface; Contents; About the Authors; 1 Introduction; 1.1 Overview; 1.2 Evolution of Cloud Paradigm; 1.3 Classification of Cloud; 1.3.1 Cloud Features; 1.3.2 Open-Source Platforms for Cloud Setup; 1.4 Threat Assessment in Cloud; 1.5 Security Attacks on the Cloud; 1.6 Motivation and Organization of the Book; 1.7 Conclusions; References; 2 A Host-Based Intrusion Detection System; 2.1 Introduction; 2.2 Present Scenario of HIDS; 2.3 Architecture of HIDS in Cloud Environment; 2.4 Deployment of the HIDS Framework; 2.4.1 Data Logging Module (DLM); 2.4.2 Preprocessing Module
|
|
:
|
2.4.3 Analysis and Decision Engine (ADE)2.4.4 Management Module; 2.4.5 Execution of the Module; 2.5 Results and Analysis; 2.6 Conclusions; References; 3 A Network-Based Intrusion Detection System; 3.1 Introduction; 3.2 Present Scenario of NIDS; 3.3 Deployment of NIDS Framework; 3.3.1 Profile Generator; 3.3.2 Packet Filter; 3.3.3 Adaptive Profile Generator; 3.3.4 Node Monitor; 3.4 Results and Analysis; 3.4.1 Experimentation in Cloud Environment; 3.4.2 Performance Analysis Using DARPA Data set; 3.5 Conclusions; References; 4 Data Security and Storage Module in Cloud; 4.1 Introduction
|
|
:
|
4.2 Data Security Issues in Cloud4.2.1 The Related Work; 4.2.2 The Methodology; 4.2.3 Results and Discussion; 4.3 Data Storage Issues in Cloud; 4.3.1 The Related Work; 4.3.2 The Module Development; 4.3.3 Results and Discussion; 4.4 Conclusions; References; 5 Predictive and Prescriptive Analytics in Big-data Era; 5.1 Introduction and Driving Force; 5.1.1 Classification Data in Big-data Era; 5.1.2 Data Processing in Big-data Regime; 5.2 The Predictive and Prescriptive Analytics in Big-data; 5.2.1 The Predictive Analytics; 5.2.2 The Prescriptive Analytics
|
|
:
|
5.2.3 The Prescriptive Analytics Platforms5.3 The Open Research Issues Predictive and Prescriptive Analytics; 5.4 Conclusions; References; 6 Conclusions and Future Work; 6.1 Conclusions; 6.2 Future Work; 6.2.1 Cooperative IDS; 6.2.2 Adaptive WCDM for Data Storage
|
Abstract
|
:
|
This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike.
|
Subject
|
:
|
Cloud computing-- Security measures.
|
Subject
|
:
|
Cloud computing.
|
Subject
|
:
|
Cloud computing.
|
Subject
|
:
|
COMPUTERS-- Computer Literacy.
|
Subject
|
:
|
COMPUTERS-- Computer Science.
|
Subject
|
:
|
COMPUTERS-- Data Processing.
|
Subject
|
:
|
COMPUTERS-- Hardware-- General.
|
Subject
|
:
|
COMPUTERS-- Information Technology.
|
Subject
|
:
|
COMPUTERS-- Machine Theory.
|
Subject
|
:
|
COMPUTERS-- Reference.
|
Dewey Classification
|
:
|
004.67/82
|
LC Classification
|
:
|
QA76.585
|
Added Entry
|
:
|
Poju, Sateesh K.
|
|
:
|
Sharma, Subhash C.
|