Handbook of Research on Security Considerations in Cloud Computing

Handbook of Research on Security Considerations in Cloud Computing

Indexed In: SCOPUS View 2 More Indices
Release Date: July, 2015|Copyright: © 2015 |Pages: 408
DOI: 10.4018/978-1-4666-8387-7
ISBN13: 9781466683877|ISBN10: 1466683872|EISBN13: 9781466683884
Hardcover:
Available
$325.00
TOTAL SAVINGS: $325.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$325.00
TOTAL SAVINGS: $325.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$325.00
TOTAL SAVINGS: $325.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$325.00
TOTAL SAVINGS: $325.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$390.00
TOTAL SAVINGS: $390.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$390.00
TOTAL SAVINGS: $390.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations.

The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Big Data Security
  • Data Engineering
  • Fuzzy Logic in Cloud Computing
  • Governance and Risk Management in the Cloud
  • Multicloud Architecture
  • Networked Multimedia Communication Systems
  • Quality-of-Service in Cloud Computing
  • Secure Wiping Extensions
  • Security Using Data Mining Techniques
Reviews & Statements

Researchers from computer and information sciences assess the current approaches and technologies for security in cloud computing and outline the major challenges and future perspectives. Among their topics are the abuse and nefarious use of cloud computing, authentication and error resilience in images transmitted through an open environment, data security issues and solutions in cloud computing, security challenges for cloud computing development framework in Saudi Arabia, and achieving efficient purging in transport per-file secure wiping extensions.

– ProtoView Book Abstracts (formerly Book News, Inc.)
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Kashif Munir received his BSc degree in Mathematics and Physics from Islamia University Bahawalpur, Pakistan in 1999. He received his MSc degree in Information Technology from University Sains Malaysia in 2001. He also obtained another MS degree in Software Engineering from University of Malaya, Malaysia in 2005. He completed his PhD in Informatics from Malaysia University of Science and Technology, Malaysia. His research interests are in the areas of Cloud Computing Security, Software Engineering, and Project Management. He has published journal, conference papers and book chapters. Kashif Munir has been in the field of higher education since 2002. After an initial teaching experience with courses in Stamford College, Malaysia for around four years, he later relocated to Saudi Arabia. He has been working as lecturer with King Fahd University for 8 years.
Mubarak S. Almutairi is currently the Dean of Hafr Albatin Community College, King Fahd University of Petroleum & Minerals (KFUPM). He received the B.Sc. degree in systems engineering from King Fahd University of Petroleum & Minerals, Dhahran, Saudi Arabia, in 1997, the M.A.Sc. degree in industrial and systems engineering from the University of Florida, Gainesville, Florida, USA, in 2003, and the Ph.D. degree in systems design engineering from the University of Waterloo, Waterloo, Canada, in 2007. From 1997 to 2000, he was an industrial engineer with the Saudi Arabia Oil Company (Aramco). He is currently an assistant professor in the computer science and engineering department at Hafr Albatin Community College, Hafr Albatin, Saudi Arabia. His research interests include decision analysis, expert systems, information security, fuzzy logic, trust, and e-commerce. Dr. Almutairi is a recipient of three research grants in the field of ITC. He has edited a book and published journal, conference papers, and book chapters. He is serving as a member of the KFUPM board. He is a member of IEEE (USA), senior member IIE (USA), ASNT (USA), ASEE (USA), and SCE (Saudi Arabia). He is also the recipient of the distinguished teaching award of the University of Waterloo for the year 2007.
Lawan A. Mohammed received his BSC (ED) degree in Mathematics and Education from Ahmadu Bello University, Zaria, Nigeria. He received his MSc degree in Operational Research from University Putra Malaysia. He also obtained an MSc degree in Computer Science from DeMontfort University, UK. He completed his PhD degree in Computer and Communication Systems Engineering from University Putra Malaysia in 2004. His PhD research area was in the field of secure network communication particularly in the design of authentication protocol for both wired and wireless network.
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.