Full Chapters Due: July 8, 2019 Submission Date: August 21, 2019

Introduction

Cloud computing is a modern emerging trend in the distributed computing technology that is rapidly gaining popularity in the network communication field. Such network communication is an Internet-based computing, where shared resources, software, and information are provided with computers and devices on-demand. They guarantee a way to share distributed resources and services that belong to different organizations. The concept of “cloud computing” is not new, it is undisputable that they have proven a major commercial success over recent times. Cloud computing is the delivery of computing services by shared resources, software and information over the internet (public) or intranet (private). The virtual environment of cloud computing allows users to access computing device that exceed their own physical worlds. In order to enter this virtual environment, cloud users must transfer data throughout the open environment (cloud). However, the improvement of cloud computing is reinforced by the improvement of the security concerns like data security and privacy. Nowadays, data security and privacy in cloud computing have emerged as a significantly important research field that has attracted increasing attention from the industrial companies, academia, and scientific research centers. Consequently, several data security and integrity concerns have arisen, such as key management, access control, cryptographic process, remote integrity checks and proof of ownership in the cloud. Accordingly, various modern encryption algorithms have been developed

Target Audience

The target audience of this book will be composed of professionals and researchers working in the field of computer science, and information technology. Moreover, the book will provide insights and support to enhanced source for the researchers, students and cryptographic application developers and users.

Recommended Topics

- Cloud Computing Security - Cryptographic Algorithms - Cloud secure Transmission - Cloud Key Management - Biometric authentication in cloud environment - Vulnerabilities in biometric authentication in cloud environment - Secure cloud environment based on quantum key distribution

Submission Procedure

Researchers and practitioners are invited to submit on or before Aug 7, 2019, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by Oct 2, 2019 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by Oct 16, 2019, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Trust in Knowledge Management and Systems in Organizations. All manuscripts are accepted based on a double-blind peer review editorial process.

All proposals should be submitted through the eEditorial Discovery®TM online submission manager. Send the chapter proposal through :https://www.igi-global.com/submission/submit-chapter/?projectid=7d2244c6-23f2-4912-9587-9e284490dcdb

Publisher

This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2020.

Inquiries

Omer K. Jasim [email protected] 00964-7812182165

Similar questions and discussions