Grin logo
en de es fr
Shop
GRIN Website
Texte veröffentlichen, Rundum-Service genießen
Zur Shop-Startseite › Informatik - Wirtschaftsinformatik

Cloud Computing. DDoS, Blockchain, Regulation and Compliance

Titel: Cloud Computing. DDoS, Blockchain, Regulation and Compliance

Wissenschaftlicher Aufsatz , 2018 , 29 Seiten , Note: 2.5

Autor:in: Manisha Kumari Deep (Autor:in)

Informatik - Wirtschaftsinformatik
Leseprobe & Details   Blick ins Buch
Zusammenfassung Leseprobe Details

Cloud computing is a promising technology where computational power is provided over internet as per users demand just like the supplies daily utilities of tap water, electricity and gas provided as pay per use. The features of easy accessibility anywhere at any time and almost no burden of on-going operational expenses like running of data-centre makes it one of the fastest growing technologies with the overall business of cloud being anticipated to be above $40 billion by 2012.

Here, cloud computing and its types have been discussed along with two emerging cloud deployment models and two emerging cloud service models. Block chains, Organic Network, Dynamic Trust Management Method (DTMM) and Cloud Compliance have been elaborated. Though data protection laws can be different with change in jurisdiction but here emphasis has been given on data policies existing in India based on IT Act (2000). Finally a reference model has been suggested for avoiding DDoS and Blockchain DDoS Attacks in Cloud Environment. The discussions has been concluded highlighting the recommendations and necessary actions needed for the same.

Other Reads by the Author

The Trial of Hope (Amazon)
An Alien Land (Kobo)
2 Moms (Kobo)
Unfolding Disaster (Kobo)
Walk to School (Kobo)
51 Points in Raising Awesome Kids (Kobo)
Organic IT Infrastructure Planning and Implementation (Amazon)

Grin Books

Positive Employee Recruitment and Retention Vital for Organizations
Digital India Mission. Implications on Social Inclusion and Digital Citizenship
Cloud Computing. DDoS, Blockchain, Regulation and Compliance
Organic eLearning (OE-Learning)
The Way of Prime Minister Narendra Modi's Leadership
Feasibility Study between Continuous Adaptive Risk and Trust Assessment and Organic Networks
I am my supervisor’s slave: Supervisor subordinate relationship is vital for organizational efficiency
Brands and their Shockvertisement Strategies
The Future of Blockchain in Banking
Social Media Marketing: Author’s Quandary Decoded (Amazon)

Leseprobe


Inhaltsverzeichnis (Table of Contents)

  • Cloud
    • DDoS Attacks in Cloud.
    • Blockchain for Cloud...
    • Organic Networks – merger of ‘viral and social networks [20].
    • Using Private Blockchain with DTMM in Cloud Platform…..\nCompliance in Cloud.

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This document aims to address the challenges posed by security, compliance, and threats in the realm of cloud computing, highlighting the potential of blockchain technology to mitigate these issues. It examines the need for secure data management and regulatory compliance within the cloud environment, particularly focusing on the context of India's IT Act (2000). The document delves into the vulnerabilities associated with DDoS attacks and proposes a blockchain-based solution to combat them.

  • Security and compliance in cloud computing
  • DDoS attacks and their impact on cloud infrastructure
  • Blockchain technology as a solution for securing cloud environments
  • Compliance with data protection laws and regulations, particularly the IT Act (2000) in India
  • Dynamic Trust Management Method (DTMM) in the context of cloud and blockchain

Zusammenfassung der Kapitel (Chapter Summaries)

  • Cloud: This section introduces the concept of cloud computing, its benefits, and challenges. It discusses the evolution of cloud technology, the different deployment and service models available, and the importance of understanding data retention policies.
  • DDoS Attacks in Cloud: This chapter highlights the vulnerabilities of cloud environments to DDoS attacks. It provides an overview of the various types of cloud attacks and discusses the growing prevalence of DDoS attacks as a means for cybercriminals.

Schlüsselwörter (Keywords)

Cloud computing, DDoS attacks, blockchain, compliance, data protection, IT Act (2000), DTMM, security, privacy, regulatory requirements, virtualization, deployment models, service models, data retention, data transfer, data storage, data deletion, India.

Ende der Leseprobe aus 29 Seiten  - nach oben

Details

Titel
Cloud Computing. DDoS, Blockchain, Regulation and Compliance
Note
2.5
Autor
Manisha Kumari Deep (Autor:in)
Erscheinungsjahr
2018
Seiten
29
Katalognummer
V416755
ISBN (eBook)
9783668668836
ISBN (Buch)
9783668668843
Sprache
Englisch
Schlagworte
Cloud Cloud Computing Cloud Models Cloud technology complaince DDoS Blockchain Technology trust Dynamic trust DTMM trust management organic organic network regulations IT Act(2000) data protection attacks types of cloud cloud platform
Produktsicherheit
GRIN Publishing GmbH
Arbeit zitieren
Manisha Kumari Deep (Autor:in), 2018, Cloud Computing. DDoS, Blockchain, Regulation and Compliance, München, GRIN Verlag, https://www.grin.com/document/416755
Blick ins Buch
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
Leseprobe aus  29  Seiten
Grin logo
  • Grin.com
  • Zahlung & Versand
  • Impressum
  • Datenschutz
  • AGB
  • Impressum