Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Handbook of Research on Security Considerations in Cloud Computing

Handbook of Research on Security Considerations in Cloud Computing
Author(s)/Editor(s): Kashif Munir (King Fahd University of Petroleum & Minerals, Saudi Arabia), Mubarak S. Al-Mutairi (King Fahd University of Petroleum & Minerals, Saudi Arabia) and Lawan A. Mohammed (King Fahd University of Petroleum & Minerals, Saudi Arabia)
Copyright: ©2015
DOI: 10.4018/978-1-4666-8387-7
ISBN13: 9781466683877
ISBN10: 1466683872
EISBN13: 9781466683884


View Handbook of Research on Security Considerations in Cloud Computing on the publisher's website for pricing and purchasing information.


Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations.

The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.

Reviews and Testimonials

Researchers from computer and information sciences assess the current approaches and technologies for security in cloud computing and outline the major challenges and future perspectives. Among their topics are the abuse and nefarious use of cloud computing, authentication and error resilience in images transmitted through an open environment, data security issues and solutions in cloud computing, security challenges for cloud computing development framework in Saudi Arabia, and achieving efficient purging in transport per-file secure wiping extensions.

– ProtoView Book Abstracts (formerly Book News, Inc.)

Author's/Editor's Biography

Kashif Munir (Ed.)
Kashif Munir received his BSc degree in Mathematics and Physics from Islamia University Bahawalpur, Pakistan in 1999. He received his MSc degree in Information Technology from University Sains Malaysia in 2001. He also obtained another MS degree in Software Engineering from University of Malaya, Malaysia in 2005. He completed his PhD in Informatics from Malaysia University of Science and Technology, Malaysia. His research interests are in the areas of Cloud Computing Security, Software Engineering, and Project Management. He has published journal, conference papers and book chapters. Kashif Munir has been in the field of higher education since 2002. After an initial teaching experience with courses in Stamford College, Malaysia for around four years, he later relocated to Saudi Arabia. He has been working as lecturer with King Fahd University for 8 years.

Mubarak Al-Mutairi (Ed.)
Mubarak S. Almutairi is currently the Dean of Hafr Albatin Community College, King Fahd University of Petroleum & Minerals (KFUPM). He received the B.Sc. degree in systems engineering from King Fahd University of Petroleum & Minerals, Dhahran, Saudi Arabia, in 1997, the M.A.Sc. degree in industrial and systems engineering from the University of Florida, Gainesville, Florida, USA, in 2003, and the Ph.D. degree in systems design engineering from the University of Waterloo, Waterloo, Canada, in 2007. From 1997 to 2000, he was an industrial engineer with the Saudi Arabia Oil Company (Aramco). He is currently an assistant professor in the computer science and engineering department at Hafr Albatin Community College, Hafr Albatin, Saudi Arabia. His research interests include decision analysis, expert systems, information security, fuzzy logic, trust, and e-commerce. Dr. Almutairi is a recipient of three research grants in the field of ITC. He has edited a book and published journal, conference papers, and book chapters. He is serving as a member of the KFUPM board. He is a member of IEEE (USA), senior member IIE (USA), ASNT (USA), ASEE (USA), and SCE (Saudi Arabia). He is also the recipient of the distinguished teaching award of the University of Waterloo for the year 2007.

Lawan Mohammed (Ed.)
Lawan A. Mohammed received his BSC (ED) degree in Mathematics and Education from Ahmadu Bello University, Zaria, Nigeria. He received his MSc degree in Operational Research from University Putra Malaysia. He also obtained an MSc degree in Computer Science from DeMontfort University, UK. He completed his PhD degree in Computer and Communication Systems Engineering from University Putra Malaysia in 2004. His PhD research area was in the field of secure network communication particularly in the design of authentication protocol for both wired and wireless network.


Body Bottom