This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects.

The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing.

The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology.

chapter 1|16 pages

Security-Enhanced Cloud for Serverless Computing and Its Applications

ByL. Jerart Julus, Krishnan Ayyappan

chapter 2|18 pages

Revealing the Web of Cloud Computing

Threats and Vulnerabilities
ByM. Satheesh Kumar, Jalel Ben-Othman, B. Sheik Mohamed, A. Shenbagavalli

chapter 3|24 pages

Security and Privacy Provocation of Data in Cloud Computing

ByD. Prabakaran, K. Suresh Kumar, R. Senthil Kumaran

chapter 4|22 pages

Networking Security Incitements in Cloud Computing

ByS. Maheswari, A. Ramathilagam, R. Ramani

chapter 5|20 pages

Security Concerns of Virtualization in Cloud Computing

ByDarshana A. Naik, G. Shruthi, A. Ashwitha, Pramod Sunagar

chapter 6|21 pages

Operational Security Agitations in Cloud Computing

ByN. Nithiyanandam, S.P. Priyadharshini, G. Fathima, S. Jeyapriyanga

chapter 7|24 pages

Secure Data Storage and Retrieval Operations Using Attribute-Based Encryption for Mobile Cloud Computing

ByS. Usharani, K. Dhanalakshmi, P. Manju Bala, R. Rajmohan, S. Jayalakshmi

chapter 8|24 pages

Deep Dive on Popular Security Models and Strategies of Cloud Computing

ByK. Venkatesh, R. Velvizhi, K. Selva Banu Priya, N. Sivaranjani

chapter 9|19 pages

Quantum Computing and Quantum Cryptography

ByB. Sheik Mohamed, M. Satheesh Kumar, K.G. Srinivasagan

chapter 10|15 pages

An Extensive Exploration of Privacy and Compliance Considerations for Hybrid Cloud Deployments

ByP. Hemalatha, W.T. Chembian, A. Ranjith Kumar, S. Ramesh, B. Jegajothi

chapter 11|21 pages

Threat Detection and Incident Response in Cloud Security

BySatheeshkumar Rajendran, A. Valarmathi, M. Satheesh Kumar

chapter 12|28 pages

The Cyber Artificial Intelligence Platform for Cloud Security

ByP. Manju Bala, S. Usharani, R. Rajmohan, S. Jayalakshmi, P. Divya

chapter 13|15 pages

Enhanced Hybrid and Highly Secure Cryptosystem for Mitigating Security Issues in Cloud Environments

ByHamid Ali Abed AL-Asadi, Amer S. Elameer