Cyber Security and Network Security. Группа авторов

Чтение книги онлайн.

Читать онлайн книгу Cyber Security and Network Security - Группа авторов страница 10

Cyber Security and Network Security - Группа авторов

Скачать книгу

of Technology Haldia, West Bengal, India, and CHRIST (Deemed to be University), Bengaluru, Karnataka India, for their guidance and support.

      We also thank all the authors who have contributed some chapters to this book. This book would not have been possible without their contribution.

      We are also very thankful to the reviewers for reviewing the book chapters. This book would not have been possible without their continuous support and commitment towards completing the chapters’ review on time.

      To all of the team members at Scrivener Publishing, who extended their kind cooperation, timely response, expert comments, and guidance, we are very thankful to them.

      Finally, we sincerely express our special and heartfelt respect, gratitude, and gratefulness to our family members and parents for their endless support and blessings.

       Sabyasachi Pramanik

       Department of Computer Science and Engineering, Haldia Institute of Technology, Haldia, West Bengal, India

      [email protected]

       Department of Computer Science, CHRIST (Deemed to be University) Bengaluru, Karnataka

      [email protected]

       M. Vinay

       Department of Computer Science, CHRIST (Deemed to be University), Bangalore, India

      [email protected]

       Abhijit Guha

       First American India Private Limited, Bangalore, India

      [email protected]

      1

      Securing Cloud-Based Enterprise Applications and Its Data

       Subhradip Debnath*, Aniket Das and Budhaditya Sarkar

       Department of Computer Science, Institute of Engineering and Management, Maulana Abul Kalam Azad University of Technology, Kolkata, West Bengal, India

       Abstract

      Keywords: Enterprise, architecture, secure, application, data, cloud, encryption, threats

      Human life is driven by data. In this century, every business decision that is undertaken is based on derivations of data collected over the years. Data warehouses and databases are overflowing with ever growing data, but the main concern at this point of time is the security of both data in transit, i.e., being sent over the public internet and the security of the data at rest. Security of the data does not only mean about its confidentiality but also its availability and integrity.

      Due to the rapidly growing virtual market, data is at its abundance as starting from the startup companies, companies from the MSME sector and even the traditional core large companies are shifting and changing their business model to adapt to cloud. Thus, security of the applications along with the data has become a necessity rather than a choice.

      Due to the rapidly increasing demands, which are producing a large amount of data, the users are facing problems of securely storing that data in a searchable format. Studies have also suggested that security and privacy are among the major factors of influencing a consumer’s trust [1, 2]. Some researchers have worked upon the concept of securing the data through blockchain. However, blockchain integration makes the computations required, and unnecessarily complex and large computations of the blockchain are quite unnecessary when thinking of saving data that are important but come in too frequently. This concept was not introduced to just storing data cryptographically but from the concept of “transfer of assets from peer to peer”.

      The proposed system has a highly scalable and available architecture. The number of systems provisioned in the architecture can grow/shrink according to the load. The proposed system is developed keeping in mind that the data stored can be queried easily, so that it can serve as a better alternative to the proposed blockchain systems that are being proposed widely. The suggested architecture can also check for intrusion and can perform malware analysis, spam detection, etc.

      Every device produces metadata based on

Скачать книгу