High Performance Cloud Auditing and Applications

This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focu...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Han, Keesook J. (Editor, http://id.loc.gov/vocabulary/relators/edt), Choi, Baek-Young. (Editor, http://id.loc.gov/vocabulary/relators/edt), Song, Sejun. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: New York, NY : Springer New York : Imprint: Springer, 2014.
Edition:1st ed. 2014.
Subjects:
Online Access:https://doi.org/10.1007/978-1-4614-3296-8
LEADER 04949nam a22005415i 4500
001 978-1-4614-3296-8
003 DE-He213
005 20210617061851.0
007 cr nn 008mamaa
008 131024s2014 xxu| s |||| 0|eng d
020 |a 9781461432968  |9 978-1-4614-3296-8 
024 7 |a 10.1007/978-1-4614-3296-8  |2 doi 
050 4 |a Q342 
072 7 |a UYQ  |2 bicssc 
072 7 |a TEC009000  |2 bisacsh 
072 7 |a UYQ  |2 thema 
082 0 4 |a 006.3  |2 23 
245 1 0 |a High Performance Cloud Auditing and Applications  |h [electronic resource] /  |c edited by Keesook J. Han, Baek-Young Choi, Sejun Song. 
250 |a 1st ed. 2014. 
264 1 |a New York, NY :  |b Springer New York :  |b Imprint: Springer,  |c 2014. 
300 |a XXIV, 360 p. 89 illus., 62 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a An Overview of Issues and Recent Developments in Cloud Computing and Storage Security -- Moving Target Defense for Cloud Infrastructures: Lessons from Botnets -- Secure Mobile Cloud Computing and Security Issues -- Information Fusion in a Cloud-Enabled Environment -- Diagnosing Vulnerability Patterns in Cloud Audit Logs -- Exploiting Timing Side Channel for Secure Cloud Scheduling -- Federated Cloud Security Architecture for Secure and Agile Clouds.-Trust-Based Access Control for Secure Computing -- Assured Information Sharing (AIS) Using Private Clouds -- GPGPU Computing for Cloud Auditing -- CPU-GPU System Designes for High Performance Cloud Computing -- MapReduce Performance in Federated Cloud Computing Envorionments -- Improving Cloud Performance with Router-based Filtering.                             . 
520 |a This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments.   In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. This work was supported by the United States government funds from the Air Force Office of Scientific Research (AFOSR), the AFOSR Summer Faculty Fellowship Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), the National Science Foundation (NSF) and the National Institute of Health (NIH). All chapters were partially supported by the AFOSR Information Operations and Security Program extramural and intramural funds (AFOSR/RSL Program Manager: Dr. Robert Herklotz).   Key Features: ·         Contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures ·         Presents in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies ·         Outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets                                                                                    . 
650 0 |a Computational intelligence. 
650 0 |a Database management. 
650 0 |a Application software. 
650 0 |a Software engineering. 
650 1 4 |a Computational Intelligence.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/T11014 
650 2 4 |a Database Management.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I18024 
650 2 4 |a Information Systems Applications (incl. Internet).  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I18040 
650 2 4 |a Software Engineering.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I14029 
700 1 |a Han, Keesook J.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Choi, Baek-Young.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Song, Sejun.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781461432951 
776 0 8 |i Printed edition:  |z 9781461432975 
776 0 8 |i Printed edition:  |z 9781493944354 
856 4 0 |u https://doi.org/10.1007/978-1-4614-3296-8 
912 |a ZDB-2-ENG 
912 |a ZDB-2-SXE 
950 |a Engineering (SpringerNature-11647) 
950 |a Engineering (R0) (SpringerNature-43712)