TOP
0
0
三民出版.新書搶先報|最速、最優惠的新鮮貨報給你知!
Architecture For Developing Privacy In Cloud Computing
滿額折

Architecture For Developing Privacy In Cloud Computing

商品資訊

定價
:NT$ 1140 元
無庫存,下單後進貨(到貨天數約30-45天)
下單可得紅利積點:34 點
商品簡介
相關商品

商品簡介

Today, each person is linked by one way or a different to this computerized world, and this is the chief aim

for the escalation of IT. The most vital factor is an accessible environment that may be acquired by everywhere

and anytime. Internet provides a prospect for diverse groups of people, such as businessmen, researchers,

students, etc. to finish their task by providing numerous opportunities to accomplish their goals. Many users

connect to the Web and utilize their IT infrastructure to meet their daily needs. As the necessity of the internet

increases, the amenities given via the internet for instance software, platforms, database services, storage

services, etc. are also escalating. Here the imperative term cloud computing comes into existence. It provides

countless varied facilities to its consumer upon a network. Due to perception "Pay as you Go", customer may

acquire the most out of by means of this facility at a lower price. Cloud Computing may be clarified as an

Internet-dependent computation technology in which on-demand shared resources such as software, platforms,

repositories, and findings are delivered to clients. Cloud Computing is a reserve-distribution IT platform

comprising infrastructure, software, applications and trade method. Cloud Computation is an implicit group

of computing resources. The budding computation prototype targets to seamlessly share storage, computing,

and services among mass users. The main challenges of cloud computing are:

Computational Veracity: Computation outsourcing is a growing trend for customers with limited data for

taking profit of dominant cloud servers. A basic requirement for cloud-based clients is the capability to

confirm outsourced computations and validate the returned results.

Substantiation: The advancement of cloud computing encourages the utilization of devices with

inadequate assets (e.g., PDAs and mobile phones) on the consumer aspect. Instead of storing data over

internal machines and installing software, users authenticate for accessing information and use cloud apps.

This calculation model makes software piracy more difficult and enables centralized monitoring. While the

cloud-based IT architecture boosts user mobility, it increases the requirement of shielded corroboration.

Validating workers by a password is not considered as a real approach for delicate data / strategies therein

the cloud. The use of passwords is a main vulnerability in computer security, as catchwords can often be

easily guessed by automated programs running dictionary attacks. Additionally, users cannot remember

very long passwords and typically use meaningful passwords which are vulnerable to dictionary attacks.

Auditing: The internal operations of the cloud ritual earners are obscure, so the audit procedure is a chief

challenge. Customers having partial IT resources and capacity turn to an external assessment gaiety to

confirm the morality of the agreed information. They have to make sure that even this third party does not

disclose information. The third-party verification process should not create new vulnerabilities to customer

data privacy.

您曾經瀏覽過的商品

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

定價:100 1140
無庫存,下單後進貨
(到貨天數約30-45天)

暢銷榜

客服中心

收藏

會員專區