語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Data Security in Cloud Storage
~
Zhang, Yuan.
Data Security in Cloud Storage
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Data Security in Cloud Storage/ by Yuan Zhang, Chunxiang Xu, Xuemin Sherman Shen.
作者:
Zhang, Yuan.
其他作者:
Shen, Xuemin Sherman.
面頁冊數:
XII, 171 p. 53 illus., 47 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Systems and Data Security. -
電子資源:
https://doi.org/10.1007/978-981-15-4374-6
ISBN:
9789811543746
Data Security in Cloud Storage
Zhang, Yuan.
Data Security in Cloud Storage
[electronic resource] /by Yuan Zhang, Chunxiang Xu, Xuemin Sherman Shen. - 1st ed. 2020. - XII, 171 p. 53 illus., 47 illus. in color.online resource. - Wireless Networks,2366-1186. - Wireless Networks,.
Chapter 1. Introduction -- Chapter 2. Basic Techniques for Data Security -- Chapter 3. Cloud Storage Reliability -- Chapter 4. Secure Deduplication -- Chapter 5. Secure Keyword Search.-6 Secure Data Provenance -- Chapter 7. Secure Data Time-Stamping -- Chapter 8. Summary and Future Research Directions.
This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud storage and how attacks work in real situations, together with the countermeasures used to ensure the security of outsourced data. Furthermore, the book introduces a number of emerging technologies that hold considerable potential – for example, blockchain, trusted execution environment, and indistinguishability obfuscation – and outlines open issues and future research directions in cloud storage security. The topics addressed are important for the academic community, but are also crucial for industry, since cloud storage has become a fundamental component in many applications. The book offers a general introduction for interested readers with a basic modern cryptography background, and a reference guide for researchers and practitioners in the fields of data security and cloud storage. It will also help developers and engineers understand why some current systems are insecure and inefficient, and move them to design and develop improved systems.
ISBN: 9789811543746
Standard No.: 10.1007/978-981-15-4374-6doiSubjects--Topical Terms:
677062
Systems and Data Security.
LC Class. No.: QA76.9.D35
Dewey Class. No.: 004.5
Data Security in Cloud Storage
LDR
:02976nam a22004215i 4500
001
1020136
003
DE-He213
005
20200629173034.0
007
cr nn 008mamaa
008
210318s2020 si | s |||| 0|eng d
020
$a
9789811543746
$9
978-981-15-4374-6
024
7
$a
10.1007/978-981-15-4374-6
$2
doi
035
$a
978-981-15-4374-6
050
4
$a
QA76.9.D35
072
7
$a
UNF
$2
bicssc
072
7
$a
COM030000
$2
bisacsh
072
7
$a
UNF
$2
thema
072
7
$a
UKS
$2
thema
082
0 4
$a
004.5
$2
23
100
1
$a
Zhang, Yuan.
$e
editor.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1284491
245
1 0
$a
Data Security in Cloud Storage
$h
[electronic resource] /
$c
by Yuan Zhang, Chunxiang Xu, Xuemin Sherman Shen.
250
$a
1st ed. 2020.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
XII, 171 p. 53 illus., 47 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Wireless Networks,
$x
2366-1186
505
0
$a
Chapter 1. Introduction -- Chapter 2. Basic Techniques for Data Security -- Chapter 3. Cloud Storage Reliability -- Chapter 4. Secure Deduplication -- Chapter 5. Secure Keyword Search.-6 Secure Data Provenance -- Chapter 7. Secure Data Time-Stamping -- Chapter 8. Summary and Future Research Directions.
520
$a
This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud storage and how attacks work in real situations, together with the countermeasures used to ensure the security of outsourced data. Furthermore, the book introduces a number of emerging technologies that hold considerable potential – for example, blockchain, trusted execution environment, and indistinguishability obfuscation – and outlines open issues and future research directions in cloud storage security. The topics addressed are important for the academic community, but are also crucial for industry, since cloud storage has become a fundamental component in many applications. The book offers a general introduction for interested readers with a basic modern cryptography background, and a reference guide for researchers and practitioners in the fields of data security and cloud storage. It will also help developers and engineers understand why some current systems are insecure and inefficient, and move them to design and develop improved systems.
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Security Services.
$3
1211616
650
1 4
$a
Data Storage Representation.
$3
669777
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer security.
$3
557122
650
0
$a
Data structures (Computer science).
$3
680370
700
1
$a
Shen, Xuemin Sherman.
$e
author.
$1
https://orcid.org/0000-0002-4140-287X
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1315549
700
1
$a
Xu, Chunxiang.
$e
editor.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1279790
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811543739
776
0 8
$i
Printed edition:
$z
9789811543753
776
0 8
$i
Printed edition:
$z
9789811543760
830
0
$a
Wireless Networks,
$x
2366-1186
$3
1258208
856
4 0
$u
https://doi.org/10.1007/978-981-15-4374-6
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入