Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments

Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments

Author: Srinivasan, S.

Publisher: IGI Global

Published: 2014-03-31

Total Pages: 325

ISBN-13: 1466657898

DOWNLOAD EBOOK

Emerging as an effective alternative to organization-based information systems, cloud computing has been adopted by many businesses around the world. Despite the increased popularity, there remain concerns about the security of data in the cloud since users have become accustomed to having control over their hardware and software. Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments compiles the research and views of cloud computing from various individuals around the world. Detailing cloud security, regulatory and industry compliance, and trust building in the cloud, this book is an essential reference source for practitioners, professionals, and researchers worldwide, as well as business managers interested in an assembled collection of solutions provided by a variety of cloud users.


Data Privacy and Trust in Cloud Computing

Data Privacy and Trust in Cloud Computing

Author: Theo Lynn

Publisher: Springer Nature

Published: 2020-10-13

Total Pages: 149

ISBN-13: 3030546608

DOWNLOAD EBOOK

This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases over the last few years have demonstrated cloud computing's uneasy relationship with data security and trust. This volume explores the numerous technological, process and regulatory solutions presented in academic literature as mechanisms for building trust in the cloud, including GDPR in Europe. The massive acceleration of digital adoption resulting from the COVID-19 pandemic is introducing new and significant security and privacy threats and concerns. Against this backdrop, this book provides a timely reference and organising framework for considering how we will assure privacy and build trust in such a hyper-connected digitally dependent world. This book presents a framework for assurance and accountability in the cloud and reviews the literature on trust, data privacy and protection, and ethics in cloud computing.


Modern Technologies for Big Data Classification and Clustering

Modern Technologies for Big Data Classification and Clustering

Author: Seetha, Hari

Publisher: IGI Global

Published: 2017-07-12

Total Pages: 381

ISBN-13: 1522528067

DOWNLOAD EBOOK

Data has increased due to the growing use of web applications and communication devices. It is necessary to develop new techniques of managing data in order to ensure adequate usage. Modern Technologies for Big Data Classification and Clustering is an essential reference source for the latest scholarly research on handling large data sets with conventional data mining and provide information about the new technologies developed for the management of large data. Featuring coverage on a broad range of topics such as text and web data analytics, risk analysis, and opinion mining, this publication is ideally designed for professionals, researchers, and students seeking current research on various concepts of big data analytics.


HCI Challenges and Privacy Preservation in Big Data Security

HCI Challenges and Privacy Preservation in Big Data Security

Author: Lopez, Daphne

Publisher: IGI Global

Published: 2017-08-10

Total Pages: 293

ISBN-13: 1522528644

DOWNLOAD EBOOK

Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.


New Threats and Countermeasures in Digital Crime and Cyber Terrorism

New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Author: Dawson, Maurice

Publisher: IGI Global

Published: 2015-04-30

Total Pages: 389

ISBN-13: 1466683465

DOWNLOAD EBOOK

Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.


Network Security Technologies: Design and Applications

Network Security Technologies: Design and Applications

Author: Amine, Abdelmalek

Publisher: IGI Global

Published: 2013-11-30

Total Pages: 348

ISBN-13: 1466647906

DOWNLOAD EBOOK

Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.


Security Breaches and Threat Prevention in the Internet of Things

Security Breaches and Threat Prevention in the Internet of Things

Author: Jeyanthi, N.

Publisher: IGI Global

Published: 2017-02-01

Total Pages: 290

ISBN-13: 1522522972

DOWNLOAD EBOOK

As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.


Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities

Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities

Author: Asharaf, S.

Publisher: IGI Global

Published: 2017-01-31

Total Pages: 135

ISBN-13: 1522521941

DOWNLOAD EBOOK

Recent innovations have created significant developments in data storage and management. These new technologies now allow for greater security in databases and other applications. Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities is a concise and informative source of academic research on the latest developments in block chain innovation and their application in contractual agreements. Highlighting pivotal discussions on topics such as cryptography, programming techniques, and decentralized computing, this book is an ideal publication for researchers, academics, professionals, students, and practitioners seeking content on utilizing block chains with smart contracts.


Securing Government Information and Data in Developing Countries

Securing Government Information and Data in Developing Countries

Author: Zoughbi, Saleem

Publisher: IGI Global

Published: 2017-02-27

Total Pages: 325

ISBN-13: 1522517049

DOWNLOAD EBOOK

The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of socio-economic development within these countries, and strengthens our global economy as a whole. Securing Government Information and Data in Developing Countries provides an informative examination of the latest strategies and methods for protecting government information and data within developing countries. Presenting dynamic topics such as security-critical systems, watermarking authentication, hybrid biometrics, and e-voting systems, this publication is an ideal reference source for practitioners, academicians, students, and researchers who are interested in the emerging trends of data security for governments.


Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities

Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities

Author: Kim, Sungwook

Publisher: IGI Global

Published: 2017-01-06

Total Pages: 235

ISBN-13: 152251953X

DOWNLOAD EBOOK

There is an enhanced level of connectivity available in modern society through the increased usage of various technological devices. Such developments have led to the integration of smart objects into the Internet of Things (IoT), an emerging paradigm in the digital age. Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities examines the latest strategies for the management of IoT systems and the application of theoretical models to enhance real-world applications and improve system efficiency. Highlighting innovative algorithms and methods, as well as coverage on cloud computing, cross-domain applications, and energy control, this book is a pivotal source of information for researchers, practitioners, graduate students, professionals, and academics interested in the game theoretic solutions for IoT applications.