Book: Data Security in Cloud Storage
Ranging from basic paradigms and principles, to typical security issues and practical security solutions
This is a Press Release edited by StorageNewsletter.com on June 16, 2020 at 2:20 pmSpringer Nature Switzerland AG. has published a book: Data Security in Cloud Storage.
This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud storage and how attacks work in real situations, together with the countermeasures used to ensure the security of outsourced data. Furthermore, the book introduces a number of emerging technologies that hold considerable potential – for example, blockchain, trusted execution environment, and indistinguishability obfuscation – and outlines open issues and future research directions in cloud storage security.
The topics addressed are important for the academic community, but are also crucial for industry, since cloud storage has become a fundamental component in many applications. The book offers a general introduction for interested readers with a basic modern cryptography background, and a reference guide for researchers and practitioners in the fields of data security and cloud storage. It will also help developers and engineers understand why some current systems are insecure and inefficient, and move them to design and develop improved systems.
Authors:
Yuan Zhang, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China, Chunxiang Xu, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China, and Xuemin Sherman Shen, Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada.
-
Table of contents: Front Matter, pages i-xii
-
Introduction, by Yuan Zhang, Chunxiang Xu, and Xuemin Sherman Shen, pages 1-10
-
Basic Techniques for Data Security by Yuan Zhang, Chunxiang Xu, and Xuemin Sherman Shen, pages 11-27
-
Cloud Storage Reliability by Yuan Zhang, Chunxiang Xu, and Xuemin Sherman Shen, pages 29-54
-
Secure Deduplication, by Yuan Zhang, Chunxiang Xu, and Xuemin Sherman Shen, pages 55-86
-
Secure Keyword Search, Yuan Zhang, Chunxiang Xu, and Xuemin Sherman Shen, pages 87-117
-
Secure Data Provenance,Yuan Zhang, Chunxiang Xu, and Xuemin Sherman Shen, pages 119-141
-
Secure Data Time-Stamping, Yuan Zhang, Chunxiang Xu, and Xuemin Sherman Shen, pages 143-166
-
Summary and Future Research Directions,Yuan Zhang, Chunxiang Xu, and Xuemin Sherman Shen, pages 167-171.