Handbook of Research on Security Considerations in Cloud Computing

Handbook of Research on Security Considerations in Cloud Computing

Kashif Munir (King Fahd University of Petroleum & Minerals, Saudi Arabia), Mubarak S. Al-Mutairi (King Fahd University of Petroleum & Minerals, Saudi Arabia) and Lawan A. Mohammed (King Fahd University of Petroleum & Minerals, Saudi Arabia)
Indexed In: SCOPUS View 2 More Indices
Release Date: July, 2015|Copyright: © 2015 |Pages: 408
DOI: 10.4018/978-1-4666-8387-7
ISBN13: 9781466683877|ISBN10: 1466683872|EISBN13: 9781466683884
Hardcover:
Available
$325.00
TOTAL SAVINGS: $325.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • 20% discount on 5+ titles*
E-Book:
(Multi-User License)
Available
$325.00
TOTAL SAVINGS: $325.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
Hardcover +
E-Book:
(Multi-User License)
Available
$390.00
TOTAL SAVINGS: $390.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
  • 20% discount on 5+ titles*
Description & Coverage
Description:

Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations.

The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Big Data Security
  • Data Engineering
  • Fuzzy Logic in Cloud Computing
  • Governance and Risk Management in the Cloud
  • Multicloud Architecture
  • Networked Multimedia Communication Systems
  • Quality-of-Service in Cloud Computing
  • Secure Wiping Extensions
  • Security Using Data Mining Techniques
Reviews and Testimonials

Researchers from computer and information sciences assess the current approaches and technologies for security in cloud computing and outline the major challenges and future perspectives. Among their topics are the abuse and nefarious use of cloud computing, authentication and error resilience in images transmitted through an open environment, data security issues and solutions in cloud computing, security challenges for cloud computing development framework in Saudi Arabia, and achieving efficient purging in transport per-file secure wiping extensions.

– ProtoView Book Abstracts (formerly Book News, Inc.)
Table of Contents
Search this Book:
Reset
Editor Biographies
Kashif Munir received his BSc degree in Mathematics and Physics from Islamia University Bahawalpur, Pakistan in 1999. He received his MSc degree in Information Technology from University Sains Malaysia in 2001. He also obtained another MS degree in Software Engineering from University of Malaya, Malaysia in 2005. He completed his PhD in Informatics from Malaysia University of Science and Technology, Malaysia. His research interests are in the areas of Cloud Computing Security, Software Engineering, and Project Management. He has published journal, conference papers and book chapters. Kashif Munir has been in the field of higher education since 2002. After an initial teaching experience with courses in Stamford College, Malaysia for around four years, he later relocated to Saudi Arabia. He has been working as lecturer with King Fahd University for 8 years.
Mubarak S. Almutairi is currently the Dean of Hafr Albatin Community College, King Fahd University of Petroleum & Minerals (KFUPM). He received the B.Sc. degree in systems engineering from King Fahd University of Petroleum & Minerals, Dhahran, Saudi Arabia, in 1997, the M.A.Sc. degree in industrial and systems engineering from the University of Florida, Gainesville, Florida, USA, in 2003, and the Ph.D. degree in systems design engineering from the University of Waterloo, Waterloo, Canada, in 2007. From 1997 to 2000, he was an industrial engineer with the Saudi Arabia Oil Company (Aramco). He is currently an assistant professor in the computer science and engineering department at Hafr Albatin Community College, Hafr Albatin, Saudi Arabia. His research interests include decision analysis, expert systems, information security, fuzzy logic, trust, and e-commerce. Dr. Almutairi is a recipient of three research grants in the field of ITC. He has edited a book and published journal, conference papers, and book chapters. He is serving as a member of the KFUPM board. He is a member of IEEE (USA), senior member IIE (USA), ASNT (USA), ASEE (USA), and SCE (Saudi Arabia). He is also the recipient of the distinguished teaching award of the University of Waterloo for the year 2007.
Lawan A. Mohammed received his BSC (ED) degree in Mathematics and Education from Ahmadu Bello University, Zaria, Nigeria. He received his MSc degree in Operational Research from University Putra Malaysia. He also obtained an MSc degree in Computer Science from DeMontfort University, UK. He completed his PhD degree in Computer and Communication Systems Engineering from University Putra Malaysia in 2004. His PhD research area was in the field of secure network communication particularly in the design of authentication protocol for both wired and wireless network.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). Learn More >
Ethics & Malpractice
IGI Global book and journal editors and authors are provided written guidelines and checklists that must be followed to maintain the high value that IGI Global places on the work it publishes. As a full member of the Committee on Publication Ethics (COPE), all editors, authors and reviewers must adhere to specific ethical and quality standards, which includes IGI Global’s full ethics and malpractice guidelines and editorial policies. These apply to all books, journals, chapters, and articles submitted and accepted for publication. To review our full policies, conflict of interest statement, and post-publication corrections, view IGI Global’s Full Ethics and Malpractice Statement.