LEADER 03696nam 22006495 450 001 9910410059203321 005 20250820220208.0 010 $a981-15-4374-7 024 7 $a10.1007/978-981-15-4374-6 035 $a(CKB)5280000000218513 035 $a(MiAaPQ)EBC6216610 035 $a(DE-He213)978-981-15-4374-6 035 $a(PPN)24859351X 035 $a(MiAaPQ)EBC6216569 035 $a(EXLCZ)995280000000218513 100 $a20200601d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData Security in Cloud Storage /$fby Yuan Zhang, Chunxiang Xu, Xuemin Sherman Shen 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (180 pages) 225 1 $aWireless Networks,$x2366-1445 311 08$a981-15-4373-9 327 $aChapter 1. Introduction -- Chapter 2. Basic Techniques for Data Security -- Chapter 3. Cloud Storage Reliability -- Chapter 4. Secure Deduplication -- Chapter 5. Secure Keyword Search.-6 Secure Data Provenance -- Chapter 7. Secure Data Time-Stamping -- Chapter 8. Summary and Future Research Directions. 330 $aThis book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud storage and how attacks work in real situations, together with the countermeasures used to ensure the security of outsourced data. Furthermore, the book introduces a number of emerging technologies that hold considerable potential ? for example, blockchain, trusted execution environment, and indistinguishability obfuscation ? and outlines open issues and future research directions in cloud storage security. The topics addressed are important for the academic community, but are also crucial for industry, since cloud storage has become a fundamental component in many applications. The book offers a general introduction for interested readers with a basic modern cryptography background, and a reference guide for researchers and practitioners in the fields of data security and cloud storage. It will also help developers and engineers understand why some current systems are insecure and inefficient, and move them to design and develop improved systems. 410 0$aWireless Networks,$x2366-1445 606 $aInformation retrieval 606 $aComputer architecture 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aData Storage Representation 606 $aSecurity Services 606 $aMobile and Network Security 606 $aData and Information Security 615 0$aInformation retrieval. 615 0$aComputer architecture. 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 14$aData Storage Representation. 615 24$aSecurity Services. 615 24$aMobile and Network Security. 615 24$aData and Information Security. 676 $a004.6782 700 $aZhang$b Yuan$4aut$4http://id.loc.gov/vocabulary/relators/aut$0977659 702 $aXu$b Chunxiang$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aShen$b X$g(Xuemin),$f1958-$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910410059203321 996 $aData Security in Cloud Storage$92227386 997 $aUNINA