Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Data security in cloud storage
~
Zhang, Yuan.
Linked to FindBook
Google Book
Amazon
博客來
Data security in cloud storage
Record Type:
Electronic resources : Monograph/item
Title/Author:
Data security in cloud storage/ by Yuan Zhang, Chunxiang Xu, Xuemin Sherman Shen.
Author:
Zhang, Yuan.
other author:
Xu, Chunxiang.
Published:
Singapore :Springer Singapore : : 2020.,
Description:
xii, 171 p. :ill., digital ;24 cm.
[NT 15003449]:
Chapter 1. Introduction -- Chapter 2. Basic Techniques for Data Security -- Chapter 3. Cloud Storage Reliability -- Chapter 4. Secure Deduplication -- Chapter 5. Secure Keyword Search -- 6 Secure Data Provenance -- Chapter 7. Secure Data Time-Stamping -- Chapter 8. Summary and Future Research Directions.
Contained By:
Springer eBooks
Subject:
Cloud computing - Security measures. -
Online resource:
https://doi.org/10.1007/978-981-15-4374-6
ISBN:
9789811543746
Data security in cloud storage
Zhang, Yuan.
Data security in cloud storage
[electronic resource] /by Yuan Zhang, Chunxiang Xu, Xuemin Sherman Shen. - Singapore :Springer Singapore :2020. - xii, 171 p. :ill., digital ;24 cm. - Wireless networks,2366-1186. - Wireless networks..
Chapter 1. Introduction -- Chapter 2. Basic Techniques for Data Security -- Chapter 3. Cloud Storage Reliability -- Chapter 4. Secure Deduplication -- Chapter 5. Secure Keyword Search -- 6 Secure Data Provenance -- Chapter 7. Secure Data Time-Stamping -- Chapter 8. Summary and Future Research Directions.
This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud storage and how attacks work in real situations, together with the countermeasures used to ensure the security of outsourced data. Furthermore, the book introduces a number of emerging technologies that hold considerable potential - for example, blockchain, trusted execution environment, and indistinguishability obfuscation - and outlines open issues and future research directions in cloud storage security. The topics addressed are important for the academic community, but are also crucial for industry, since cloud storage has become a fundamental component in many applications. The book offers a general introduction for interested readers with a basic modern cryptography background, and a reference guide for researchers and practitioners in the fields of data security and cloud storage. It will also help developers and engineers understand why some current systems are insecure and inefficient, and move them to design and develop improved systems.
ISBN: 9789811543746
Standard No.: 10.1007/978-981-15-4374-6doiSubjects--Topical Terms:
1375313
Cloud computing
--Security measures.
LC Class. No.: QA76.585 / .Z436 2020
Dewey Class. No.: 004.6782
Data security in cloud storage
LDR
:02611nmm a2200349 a 4500
001
2255009
003
DE-He213
005
20200601122644.0
006
m d
007
cr nn 008maaau
008
220419s2020 si s 0 eng d
020
$a
9789811543746
$q
(electronic bk.)
020
$a
9789811543739
$q
(paper)
024
7
$a
10.1007/978-981-15-4374-6
$2
doi
035
$a
978-981-15-4374-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.585
$b
.Z436 2020
072
7
$a
UNF
$2
bicssc
072
7
$a
COM030000
$2
bisacsh
072
7
$a
UNF
$2
thema
072
7
$a
UKS
$2
thema
082
0 4
$a
004.6782
$2
23
090
$a
QA76.585
$b
.Z63 2020
100
1
$a
Zhang, Yuan.
$3
1928843
245
1 0
$a
Data security in cloud storage
$h
[electronic resource] /
$c
by Yuan Zhang, Chunxiang Xu, Xuemin Sherman Shen.
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
xii, 171 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Wireless networks,
$x
2366-1186
505
0
$a
Chapter 1. Introduction -- Chapter 2. Basic Techniques for Data Security -- Chapter 3. Cloud Storage Reliability -- Chapter 4. Secure Deduplication -- Chapter 5. Secure Keyword Search -- 6 Secure Data Provenance -- Chapter 7. Secure Data Time-Stamping -- Chapter 8. Summary and Future Research Directions.
520
$a
This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud storage and how attacks work in real situations, together with the countermeasures used to ensure the security of outsourced data. Furthermore, the book introduces a number of emerging technologies that hold considerable potential - for example, blockchain, trusted execution environment, and indistinguishability obfuscation - and outlines open issues and future research directions in cloud storage security. The topics addressed are important for the academic community, but are also crucial for industry, since cloud storage has become a fundamental component in many applications. The book offers a general introduction for interested readers with a basic modern cryptography background, and a reference guide for researchers and practitioners in the fields of data security and cloud storage. It will also help developers and engineers understand why some current systems are insecure and inefficient, and move them to design and develop improved systems.
650
0
$a
Cloud computing
$x
Security measures.
$3
1375313
650
0
$a
Computer security.
$3
540555
650
0
$a
Information retrieval.
$3
566853
650
1 4
$a
Data Storage Representation.
$3
892664
650
2 4
$a
Security Services.
$3
3382346
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Systems and Data Security.
$3
898223
700
1
$a
Xu, Chunxiang.
$3
3524310
700
1
$a
Shen, Xuemin Sherman.
$3
3524311
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Wireless networks.
$3
2162432
856
4 0
$u
https://doi.org/10.1007/978-981-15-4374-6
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9410648
電子資源
11.線上閱覽_V
電子書
EB QA76.585 .Z436 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login