語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Data security in cloud storage
~
Shen, Xuemin Sherman.
Data security in cloud storage
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Data security in cloud storageby Yuan Zhang, Chunxiang Xu, Xuemin Sherman Shen.
作者:
Zhang, Yuan.
其他作者:
Xu, Chunxiang.
出版者:
Singapore :Springer Singapore :2020.
面頁冊數:
xii, 171 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Cloud computingSecurity measures.
電子資源:
https://doi.org/10.1007/978-981-15-4374-6
ISBN:
9789811543746$q(electronic bk.)
Data security in cloud storage
Zhang, Yuan.
Data security in cloud storage
[electronic resource] /by Yuan Zhang, Chunxiang Xu, Xuemin Sherman Shen. - Singapore :Springer Singapore :2020. - xii, 171 p. :ill., digital ;24 cm. - Wireless networks,2366-1186. - Wireless networks..
Chapter 1. Introduction -- Chapter 2. Basic Techniques for Data Security -- Chapter 3. Cloud Storage Reliability -- Chapter 4. Secure Deduplication -- Chapter 5. Secure Keyword Search -- 6 Secure Data Provenance -- Chapter 7. Secure Data Time-Stamping -- Chapter 8. Summary and Future Research Directions.
This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud storage and how attacks work in real situations, together with the countermeasures used to ensure the security of outsourced data. Furthermore, the book introduces a number of emerging technologies that hold considerable potential - for example, blockchain, trusted execution environment, and indistinguishability obfuscation - and outlines open issues and future research directions in cloud storage security. The topics addressed are important for the academic community, but are also crucial for industry, since cloud storage has become a fundamental component in many applications. The book offers a general introduction for interested readers with a basic modern cryptography background, and a reference guide for researchers and practitioners in the fields of data security and cloud storage. It will also help developers and engineers understand why some current systems are insecure and inefficient, and move them to design and develop improved systems.
ISBN: 9789811543746$q(electronic bk.)
Standard No.: 10.1007/978-981-15-4374-6doiSubjects--Topical Terms:
404090
Cloud computing
--Security measures.
LC Class. No.: QA76.585 / .Z436 2020
Dewey Class. No.: 004.6782
Data security in cloud storage
LDR
:02553nmm a2200349 a 4500
001
579517
003
DE-He213
005
20200601122644.0
006
m
007
cr
008
201229s2020
020
$a
9789811543746$q(electronic bk.)
020
$a
9789811543739$q(paper)
024
7
$a
10.1007/978-981-15-4374-6
$2
doi
035
$a
978-981-15-4374-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.585
$b
.Z436 2020
072
7
$a
UNF
$2
bicssc
072
7
$a
COM030000
$2
bisacsh
072
7
$a
UNF
$2
thema
072
7
$a
UKS
$2
thema
082
0 4
$a
004.6782
$2
23
090
$a
QA76.585
$b
.Z63 2020
100
1
$a
Zhang, Yuan.
$3
868904
245
1 0
$a
Data security in cloud storage
$h
[electronic resource] /
$c
by Yuan Zhang, Chunxiang Xu, Xuemin Sherman Shen.
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
xii, 171 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Wireless networks,
$x
2366-1186
505
0
$a
Chapter 1. Introduction -- Chapter 2. Basic Techniques for Data Security -- Chapter 3. Cloud Storage Reliability -- Chapter 4. Secure Deduplication -- Chapter 5. Secure Keyword Search -- 6 Secure Data Provenance -- Chapter 7. Secure Data Time-Stamping -- Chapter 8. Summary and Future Research Directions.
520
$a
This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud storage and how attacks work in real situations, together with the countermeasures used to ensure the security of outsourced data. Furthermore, the book introduces a number of emerging technologies that hold considerable potential - for example, blockchain, trusted execution environment, and indistinguishability obfuscation - and outlines open issues and future research directions in cloud storage security. The topics addressed are important for the academic community, but are also crucial for industry, since cloud storage has become a fundamental component in many applications. The book offers a general introduction for interested readers with a basic modern cryptography background, and a reference guide for researchers and practitioners in the fields of data security and cloud storage. It will also help developers and engineers understand why some current systems are insecure and inefficient, and move them to design and develop improved systems.
650
0
$a
Cloud computing
$x
Security measures.
$3
404090
650
0
$a
Computer security.
$3
184416
650
0
$a
Information retrieval.
$3
215224
650
1 4
$a
Data Storage Representation.
$3
277024
650
2 4
$a
Security Services.
$3
825729
650
2 4
$a
Mobile and Network Security.
$3
825732
650
2 4
$a
Systems and Data Security.
$3
274481
700
1
$a
Xu, Chunxiang.
$3
868905
700
1
$a
Shen, Xuemin Sherman.
$3
868906
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Wireless networks.
$3
731203
856
4 0
$u
https://doi.org/10.1007/978-981-15-4374-6
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000184103
電子館藏
1圖書
電子書
EB QA76.585 .Z63 2020 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-981-15-4374-6
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入