附註:Includes bibliographical references and index.
Chapter 1. Securing cloud infrastructure in IaaS and PaaS environments -- Chapter 2. Impact of artificial intelligence and machine learning in cloud security -- Chapter 3. An intelligent data retrieving technique and safety measuresfor sustainable cloud computing -- Chapter 4. Enhancing cloud security: the role of artificial intelligence and machine learning -- Chapter 5. Role-based access control (RBAC) and attribute-based access control (ABAC) -- Chapter 6. Application of artificial intelligence in cybersecurity -- Chapter 7. Accountable malicious entity detection using re-encryption mechanism to share data -- Chapter 8. Balancing innovation and security in the cloud: navigating the risks and rewardsof the digital age -- Chapter 9. Data storage and transmission security in the cloud: the artificial intelligence (AI) edge -- Chapter 10. Privacy and surveillance in digital era: a case for India -- Chapter 11. A model for trust decision,data analysis, and evaluation to identify quality web services.
摘要:"Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike."--