Grin logo
en de es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - Commercial Information Technology

Cloud Computing. DDoS, Blockchain, Regulation and Compliance

Title: Cloud Computing. DDoS, Blockchain, Regulation and Compliance

Scientific Essay , 2018 , 29 Pages , Grade: 2.5

Autor:in: Manisha Kumari Deep (Author)

Computer Science - Commercial Information Technology
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

Cloud computing is a promising technology where computational power is provided over internet as per users demand just like the supplies daily utilities of tap water, electricity and gas provided as pay per use. The features of easy accessibility anywhere at any time and almost no burden of on-going operational expenses like running of data-centre makes it one of the fastest growing technologies with the overall business of cloud being anticipated to be above $40 billion by 2012.

Here, cloud computing and its types have been discussed along with two emerging cloud deployment models and two emerging cloud service models. Block chains, Organic Network, Dynamic Trust Management Method (DTMM) and Cloud Compliance have been elaborated. Though data protection laws can be different with change in jurisdiction but here emphasis has been given on data policies existing in India based on IT Act (2000). Finally a reference model has been suggested for avoiding DDoS and Blockchain DDoS Attacks in Cloud Environment. The discussions has been concluded highlighting the recommendations and necessary actions needed for the same.

Other Reads by the Author

The Trial of Hope (Amazon)
An Alien Land (Kobo)
2 Moms (Kobo)
Unfolding Disaster (Kobo)
Walk to School (Kobo)
51 Points in Raising Awesome Kids (Kobo)
Organic IT Infrastructure Planning and Implementation (Amazon)

Grin Books

Positive Employee Recruitment and Retention Vital for Organizations
Digital India Mission. Implications on Social Inclusion and Digital Citizenship
Cloud Computing. DDoS, Blockchain, Regulation and Compliance
Organic eLearning (OE-Learning)
The Way of Prime Minister Narendra Modi's Leadership
Feasibility Study between Continuous Adaptive Risk and Trust Assessment and Organic Networks
I am my supervisor’s slave: Supervisor subordinate relationship is vital for organizational efficiency
Brands and their Shockvertisement Strategies
The Future of Blockchain in Banking
Social Media Marketing: Author’s Quandary Decoded (Amazon)

Excerpt


Inhaltsverzeichnis (Table of Contents)

  • Cloud
    • DDoS Attacks in Cloud.
    • Blockchain for Cloud...
    • Organic Networks – merger of ‘viral and social networks [20].
    • Using Private Blockchain with DTMM in Cloud Platform…..\nCompliance in Cloud.

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This document aims to address the challenges posed by security, compliance, and threats in the realm of cloud computing, highlighting the potential of blockchain technology to mitigate these issues. It examines the need for secure data management and regulatory compliance within the cloud environment, particularly focusing on the context of India's IT Act (2000). The document delves into the vulnerabilities associated with DDoS attacks and proposes a blockchain-based solution to combat them.

  • Security and compliance in cloud computing
  • DDoS attacks and their impact on cloud infrastructure
  • Blockchain technology as a solution for securing cloud environments
  • Compliance with data protection laws and regulations, particularly the IT Act (2000) in India
  • Dynamic Trust Management Method (DTMM) in the context of cloud and blockchain

Zusammenfassung der Kapitel (Chapter Summaries)

  • Cloud: This section introduces the concept of cloud computing, its benefits, and challenges. It discusses the evolution of cloud technology, the different deployment and service models available, and the importance of understanding data retention policies.
  • DDoS Attacks in Cloud: This chapter highlights the vulnerabilities of cloud environments to DDoS attacks. It provides an overview of the various types of cloud attacks and discusses the growing prevalence of DDoS attacks as a means for cybercriminals.

Schlüsselwörter (Keywords)

Cloud computing, DDoS attacks, blockchain, compliance, data protection, IT Act (2000), DTMM, security, privacy, regulatory requirements, virtualization, deployment models, service models, data retention, data transfer, data storage, data deletion, India.

Excerpt out of 29 pages  - scroll top

Details

Title
Cloud Computing. DDoS, Blockchain, Regulation and Compliance
Grade
2.5
Author
Manisha Kumari Deep (Author)
Publication Year
2018
Pages
29
Catalog Number
V416755
ISBN (eBook)
9783668668836
ISBN (Book)
9783668668843
Language
English
Tags
Cloud Cloud Computing Cloud Models Cloud technology complaince DDoS Blockchain Technology trust Dynamic trust DTMM trust management organic organic network regulations IT Act(2000) data protection attacks types of cloud cloud platform
Product Safety
GRIN Publishing GmbH
Quote paper
Manisha Kumari Deep (Author), 2018, Cloud Computing. DDoS, Blockchain, Regulation and Compliance, Munich, GRIN Verlag, https://www.grin.com/document/416755
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  29  pages
Grin logo
  • Grin.com
  • Payment & Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint