logo

Online Public Access Catalogue

Cloud computing and cyber security : (Record no. 22715)

000 -LEADER
fixed length control field 02347nam a22001577a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 978-8195995950
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004
Item number KAL
100 ## - MAIN ENTRY--AUTHOR NAME
Author name Kalyan Kumar, A.S.
245 ## - TITLE STATEMENT
Title Cloud computing and cyber security :
Sub Title a secure crypto-based data outsourcing and sensitive data monitoring in cloud /
Statement of responsibility, etc A.S. Kalyan Kumar, T. Abdul Razak
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Delhi :
Name of publisher Adhyyan Books ,
Year of publication 2022.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 163 pages ;
Other physical details illustrations ;
Dimensions 23 cm.
520 ## - SUMMARY, ETC.
Summary, etc The aim of this book is to meet the brief objective, several sub-objectives are often developed to reinforce the info security and privacy in cloud computing such as (i) to develop a lightweight model for data anonymization and unlikability when data is outsourced to the cloud. () To develop a method using an appropriate encryption algorithm to secure the privacy of sensitive data in the cloud. (iii) To validate the proposed model and the method for security and privacy of data outsourcing in the cloud with recent benchmarks.<br/><br/>The security and privacy may be enhanced by encrypting the user data before sending it to the server in the cloud. The present methodologies have few challenges in terms of security, execution time, forced to take care of an equivalent length of the key and therefore the plain text, more computational cost, and inadequate key generation.<br/><br/>The research provides data anonymity and unlikability to a foreign cloud server, and hence Secure Crypto-based Data Outsourcing Model (SCDOM) has been proposed. For encryption and decryption, the Blowfish technique is used. The Message Authentication Code (MAC) is generated for security, and it avoids the usage of complicated cryptographic key certificates.<br/><br/>The lightweight models are inclined to mitigate the computation complexity, time, and cost. During encryption, 5 keys are generated to enhance privacy. While applying the 1st key, if any unauthorized attack occurs then this key can be rejected and the next key can be considered for verification. The encryption and decryption are done by using the Honeybee algorithm. The proposed methodology mainly stimulates potential security against intruders. It maintains parallelism between the key and length of plain text and mainly mitigates the computational cost and execution time.<br/>
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Subject Cloud computing
700 ## - ADDED ENTRY--PERSONAL NAME
Author 2/ Editor Abdul Razak, T.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Full call number Accession Number Price effective from Koha item type
          Institute of Public Enterprise, Library Institute of Public Enterprise, Library S Campus 09/13/2023 Gifted by Director 004 KAL 47810 09/13/2023 Books