Overview

Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, this can open security, privacy, trust and compliance issues. This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.

Data Security in Cloud Computing covers major aspects of securing data in Cloud Computing. Topics covered include NOMAD: a framework for ensuring data confidentiality in mission-critical cloud based applications; 3DCrypt: privacy-preserving pre-classification volume ray-casting of 3D images in the cloud; multiprocessor system-on-chip for processing data in Cloud Computing; distributing encoded data for private processing in the cloud; data protection and mobility management for cloud; understanding software defined perimeter; security, trust and privacy for Cloud Computing in transportation cyber-physical systems; review of data leakage attack techniques in cloud systems; Cloud Computing and personal data processing: sorting out legal requirements; the Waikato data privacy matrix; provenance reconstruction in clouds; and security visualization for Cloud Computing.

nding software defined perimeter; security, trust and privacy for Cloud Computing in transportation cyber-physical systems; review of data leakage attack techniques in cloud systems; Cloud Computing and personal data processing: sorting out legal requirements; the Waikato data privacy matrix; provenance reconstruction in clouds; and security visualization for Cloud Computing.nding software defined perimeter; security, trust and privacy for Cloud Computing in transportation cyber-physical systems; review of data leakage attack techniques in cloud systems; Cloud Computing and personal data processing: sorting out legal requirements; the Waikato data privacy matrix; provenance reconstruction in clouds; and security visualization for Cloud Computing.nding software defined perimeter; security, trust and privacy for Cloud Computing in transportation cyber-physical systems; review of data leakage attack techniques in cloud systems; Cloud Computing and personal data processing: sorting out legal requirements; the Waikato data privacy matrix; provenance reconstruction in clouds; and security visualization for Cloud Computing.

ISBN-13

9781785612206

ISBN-10

1785612204

Weight

1.44 Pounds

Dimensions

6.30 x 0.90 x 9.40 In

List Price

$175.00

Format

Hardcover

Language

English

Pages

328 pages

Publisher

The Institution of Engineering and Technology

Published On

2017-08-31



View All Offers

Sort by:

Condition
Seller
Seller Comments
Price
Used, Like New
Seller details
GreatBookPrices-
★★★★☆

Columbia, MD, USA

100% Money Back Guarantee. Brand New, Perfect Condition. We offer expedited shipping to all US locat...
$165.42

 Free delivery by: 30 Mar 2026

Brand New
Seller details
GreatBookPrices-
★★★★☆

Columbia, MD, USA

100% Money Back Guarantee. Brand New, Perfect Condition. We offer expedited shipping to all US locat...
$167.05

 Free delivery by: 30 Mar 2026

Brand New
Seller details
Paperbackshop
★★★★★

Bensenville, IL, USA

New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Please note we cannot of...
$185.57

 Free delivery by: 30 Mar 2026


Bookstores.com relies on cookies to improve your experience.