Security Designs for the Cloud, IoT, and Social Networking
Inbunden, Engelska, 2019
3 259 kr
Produktinformation
- Utgivningsdatum2019-10-11
- Mått10 x 10 x 10 mm
- Vikt454 g
- FormatInbunden
- SpråkEngelska
- Antal sidor300
- FörlagJohn Wiley & Sons Inc
- ISBN9781119592266
Tillhör följande kategorier
Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedicine. He has more than 50 publications and edited/authored 15 computer science books. Chintan Bhatt is an Assistant Professor of U & P U Patel Department of Computer Engineering at Charotar University of Science and Technology, India. He completed his PhD in Computer Science in 2019 and his research interests include data mining, software engineering, networking, big data, Internet of Things (IoT), mobile computing. Mani Madhukar has 15+ years of experience in computer science with exposure to both IT industry and academia and his current position is as Program Manager-University Relations at IBM India Pvt. Ltd. His education background includes a doctorate in Computer Engineering and Executive program in Management from McIntire School of Commerce, University of Virginia, USA. He has worked in various roles across different technologies including blockchain, cloud, data science, IBM Watson and Internet of Things. He represents IBM in various national and international forums as technical expert /panelist on various technologies.
- List of Figures xvList of Tables xixForeword xxiPreface xxiiiAcknowledgments xxvAcronyms xxviiPart I Security Designs for the Cloud Network1 Encryption Algorithm for Data Security in Cloud Computing 3Anindita Desarkar, Ajanta Das1.1 Introduction 41.2 Related Work 41.3 Cloud Computing - A Brief Overview 51.3.1 Essential Characteristics 51.3.2 Layers of Cloud Computing 61.3.3 Cloud Deployment Models 71.4 Data Security in Cloud Storage 71.4.1 Security Issues in Cloud 71.4.2 Symmetric Encryption Algori 81.4.3 Asymmetric Encryption Algorithms 121.4.4 Security Enhancement in Cloud Using Encryption Algorithms: Observations 151.5 Comparison of Encryption Algorithms 161.6 Performance Analysis of Encryption Algorithms in Cloud 161.7 Conclusion 17References 172 Analysis of Security Issues in Cloud Environment 19Sushruta Mishra, Nitin Tripathy, Brojo Kishore Mishra, Chandrakanta Mahanty2.1 An Insight into Cloud Computing 202.2 Critical Challenges Concerning Cloud Computing 212.2.1 Data Protection 212.2.2 Data Recovery and Availability 222.2.3 Management Capacities 222.2.4 Regulatory and Compliance Restrictions 222.3 Basic Models Governing Cloud Computing 222.3.1 Cloud Computing Models 232.3.2 Security Concerns of Cloud Computing 232.4 Security Countermeasures in Cloud Computing 262.4.1 Countermeasures for Communication Issues 262.4.2 Countermeasures for Architecture Security 262.4.3 Countermeasures for Challenges Inherited from Network Concepts 272.4.4 Countermeasures for CAS Proposed Threats 282.5 Discussion of an Implemented SDN Security Framework 292.5.1 System Design 292.5.2 Phase 1: User Authentication Phase 302.5.3 Phase 2: Controller Assignment Phase 312.5.4 Phase 3: Communication Phase 332.6 Result Analysis 352.6.1 Simulation Environment 352.6.2 Analysis of Different Attacks 352.6.3 Comparative Analysis 362.7 Conclusion 40References 403 Security and Challenges in Mobile Cloud Computing 43Ankur Dumka, Minakshi Memoria, Alaknanda Ashok3.1 Introduction 443.1.1 Mobile Cloud Computing 443.1.2 Internet of Things and Cloud Computing 463.2 Literature Review 463.3 Architecture of Integration of Mobile Cloud Computing with IoT 463.3.1 Infrastructural or Architectural Issues 493.3.2 Privacy Issues 523.3.3 Compliance Issues 533.4 Proposed Preventive Measure for Security in MCC 543.5 Conclusion 55References 554 Fog Computing and Its Security Issues 59Jyotir Moy Chatterjee, Ishaani Priyadarshini, Shankeys, and DacNhuong Le4.1 Introduction 604.2 Current Fog Applications 624.2.1 Why Do We Need Fog? 624.2.2 What Can We Do with Fog? 634.3 Security and Privacy in Fog Computing 664.3.1 Trust and Authentication 664.3.2 Man-in-the-Middle Attacks (MITM) 664.3.3 Network Security 684.3.4 Secure Data Storage 694.4 Secure and Private Data Computation 694.4.1 Privacy 704.4.2 Access Control 714.4.3 Intrusion Detection 714.5 Conclusion 71References 735 Application Safety and Service Vulnerability in Cloud Network 77Sudipta Sahana, Debabrata Sarddar5.1 Introduction 785.1.1 Introduction to Security Issues in Cloud Service Models 785.1.2 Security Issues in SaaS 785.1.3 Security Issues in PaaS 795.1.4 Security Issues in IaaS 795.2 Security Concerns of Cloud Computing 805.2.1 Data Breaches 805.2.2 Hijacking of Accounts 815.2.3 Insider Threat 815.2.4 Malware Injection 825.2.5 Abuse of Cloud Services 825.2.6 Insecure APIs 825.2.7 Denial of Service Attacks 835.2.8 Insufficient Due Diligence 835.2.9 Shared Vulnerabilities 845.2.10 Data Loss 845.3 Security Tools in Cloud 845.3.1 Qualys 855.3.2 CipherCloud 855.3.3 Okta 865.3.4 Skyline Networks 865.3.5 Bitglass 865.3.6 WhiteHat Security 875.3.7 Proofpoint 875.3.8 docTrackr 875.3.9 Centrify 875.3.10 Vaultive 885.3.11 Zscaler 885.3.12 SilverSky 885.4 Cloud Service Vulnerabilities 895.4.1 Visibility and Control Reduction at the Consumer End 895.4.2 On-Demand SelfService Simplifies Unauthorized Use 895.4.3 Web-Based Organization APIs Can Be Compromised 905.4.4 Separation among Multi-Tenant Fails 905.4.5 Incomplete Data Deletion 905.4.6 Stolen Credentials 905.4.7 Increased Complexity Strains IT Staff 915.4.8 Vendor Lock-In Complicates Moving to Other CSPs 915.4.9 Insiders Abuse Authorized Access 915.4.10 Stored Data is Lost 925.4.11 CSP Supply Chain Can Be Compromised 925.4.12 Inadequate Due Diligence Amplifies Cyber Threat 925.5 Cloud Computing Security Best Practices 925.5.1 Cloud Data Encryption 925.5.2 Identity and Access Management 935.5.3 Network Segmentation 935.5.4 Disaster Recovery 935.5.5 Vulnerability Management 935.5.6 Monitoring, Altering and Reporting 945.6 Conclusion 94References 94Part II Security Designs for the Internet of Things and Social Networks6 IoT Security and Privacy Preservation 99Bright Keswan, Tarini Ch. Mishra, Ambarish G. Mohapatra, Poonam Keswani6.1 Introduction 1006.2 Review of Existing Technology 1016.3 Research Design 1016.4 Methodology 1036.4.1 AWS IoT 1036.4.2 ARM Mbed IoT 1046.4.3 Azure IoT Suite 1066.5 Implication and Findings 1066.5.1 Ethical 1066.5.2 Legal 1076.5.3 Social 1076.6 Future Scope 1086.7 Conclusion 108References 1097 Automation Movie Recommender System Based on Internet of Things and Clustering 113Lalit Mohan Goyal, Mamta Mittal, Asheesh Sharma7.1 Introduction 1147.2 Background 1157.2.1 Characteristics of IoT 1157.2.2 Evolution of IoT 1157.2.3 Trends in IoT 1167.2.4 Requirements of IoT 1167.2.5 IoT Elements 1167.2.6 Architecture of IoT 1177.2.7 Application Domain of IoT 1177.2.8 IoT Technology 1197.2.9 The Present and Future of IoT 1217.2.10 IoT Challenges 1217.2.11 Scope of IoT 1227.3 Related Works 1227.4 Proposed System 1237.5 Implementation 1247.6 Conclusion 127References 1278 Societal Implications of Emerging Technologies (SMAC) and Related Privacy Challenges 129Manikant Roy, Amar Singh, Sukanta Ghosh, Nisha Sethi8.1 Introduction to Data Analytics 1308.1.1 Descriptive Analytics 1318.1.2 Diagnostic Analytics 1318.1.3 Prescriptive Analytics 1318.1.4 Exploratory Analytics 1328.1.5 Predictive Analytics 1338.1.6 Mechanistic, Causal and Inferential Analytics 1338.2 Privacy Concerns Related to Use of Data Analytics 1338.2.1 Immoral Actions Based on Analyses 1338.2.2 Discrimination 1348.2.3 Privacy Breaches 1348.2.4 Inaccuracy of Data Analytics 1348.2.5 E-Discovery Angst 1348.2.6 Understanding Cloud Basics 1348.3 Issues 1378.3.1 Challenges 1378.3.2 Services of Cloud 1378.4 Social Media 1388.4.1 Introduction 1388.4.2 Societal Implication of Social Network 1398.5 Conclusion 139References 1409 Implementation of REST Architecure-Based Energy-Efficient Home Automation System 143Shankey Garg, Jyotir Moy Chatterjee, Dac-Nhuong Le9.1 Introduction 1449.2 Related Work 1449.3 RESTful Web Server 1449.4 Why and How REST is More Suitable for IoT 1459.5 Architecture of Arduino-Based Home Automation System 1469.6 Implementation Details 1469.7 Why Arduino? 1479.8 Result Analysis 1479.8.1 Power Consumption without Automation 1489.8.2 Power Consumption with IoT 1489.8.3 Total Power Consumption Analysis 1499.9 Conclusion and Future Scope 150References 15110 The Vital Role of Fog Computing in Internet of Things 153Vikram Puri, Jolanda G Tromp, Chung Van Le, Nhu Gia Nguyen, Dac-Nhuong Le10.1 Introduction 15410.2 Related Studies 15510.3 IoT Principles and Applications 15610.4 Different IoT Domains 15710.4.1 Autonomous Cars 15710.4.2 Healthcare 15710.4.3 Smart Home 15810.4.4 Industry 4.0 15810.5 Issues in Fog Computing Regarding Security and Privacy 15810.5.1 Authentication 15910.5.2 Trust 16010.5.3 Attacks 16010.5.4 End User Privacy 16010.5.5 Secure Communication between Fog Nodes 16110.6 Conclusion 161References 161Part III Security Designs for Solutions and Applications11 The Role of Information-Centric Security in the Modern Arena of Information Technology 167Sushree Bibhuprada, Dac-Nhuong Le, B. Priyadarshini11.1 Introduction 16811.2 Complete Solution to Data Security 16911.2.1 Confidentiality 16911.2.2 Integrity 16911.2.3 Availability 17011.3 Intrusion Detection and Security 17011.3.1 Divergent Type of Intrusion Detection System 17011.3.2 Potentiality of Intrusion Detection Systems 17211.3.3 Advantage of Intrusion Detection Systems 17311.4 IPS vs. IDS 17311.5 Relevant Methods to Increase Data Safety 17411.5.1 Limit Data Access 17411.5.2 Identification of Sensitive Data 17411.5.3 Pre-Planned Data Security Policy 17511.5.4 Strong and Different Passwords for Every Department 17511.5.5 Regular Data Backup and Update 17511.6 Conclusion 175References 17612 Enabling Mobile Technology for Healthcare Service Improvements 179Bhumi Dobaria, Chintan Bhatt12.1 Introduction 18012.1.1 Healthcare System in India 18012.1.2 What is mHealth? 18012.1.3 Worldwide mHealth Scenario 18112.1.4 mHealth and Its Scope in India 18112.2 System Design 18212.2.1 Application Server 18312.2.2 File System 18312.2.3 Client 18312.3 Result Analysis 18312.4 Conclusion 188References 18913 Optimization of Ontology-Based Clinical Pathways and Incorporating Differential Privacy in the Healthcare System 191Soumya Banerjee, Rachid Benlamri, Samia Bouzefrane13.1 Introduction 19213.2 Ontological Structure of Clinical Pathways 19413.3 Proposed Model 19513.3.1 Elements of Optimization in CP 19613.3.2 Functional Model of Differential Privacy 19613.3.3 About the Data Visualization 19913.3.4 Validation of Results 19913.4 Conclusion and Further Scope of Research 202References 20314 Advancements and Applications in Fog Computing 207Sumit Bansal, Mayank Aggarwal, Himanshu Aggarwal14.1 Introduction 20814.1.1 Cloud Computing 20814.1.2 Internet of Things 20814.1.3 Fog Computing 20914.2 Fog Computing Architecture 21014.2.1 Features of Fog Computing 21014.2.2 Architecture of Fog Computing 21114.2.3 Components of Fog Computing 21214.3 Communication in Fog Computing 21414.3.1 Communication Steps 21414.3.2 Discovery and Detection of ICOs 21414.3.3 Models of Communication 21514.3.4 Communication Protocols 21514.3.5 Communication Protocol Requirements 21614.3.6 Methods of Data Collection 21614.4 Application or Programming Models 21814.4.1 Sense-Process-Actuate Model 21814.4.2 Stream Processing Model 21814.4.3 Benefits of Fog over Cloud Computing 21914.4.4 Simulator Tool 22014.5 Simulation-Based Experiments 22114.6 Scheduling 22514.6.1 Classification of Scheduling 22514.6.2 Need for Scheduling 22514.6.3 Existing Scheduling Algorithms 22614.7 Challenges in Fog Computing 22714.7.1 Connectivity Challenges 22714.7.2 Context Awareness 22714.7.3 Data Handling 22814.7.4 Security 22814.7.5 Privacy 22914.7.6 Pluggable Architecture 22914.7.7 Sustainability 22914.7.8 Network and Storage 23014.8 Use Case Scenarios 23014.8.1 Smart Home 23014.8.2 Smart Rail 23214.8.3 Smart Healthcare 23314.8.4 Smart Agriculture 23414.8.5 Future Applications 23514.9 Emerging Trends 23614.10 Conclusion 236References 23715 Taxonomy of Cyber-Physical Social Systems in Intelligent Transportation 241Dhiraj, Anil Saini15.1 Introduction 24215.2 General Overview of CPSS in Intelligent Transportation 24315.2.1 What is CPS? 24315.2.2 Transition from CPS to CPSS 24315.2.3 CPSS in Transportation 24415.3 Conceptual Framework of CPSS in Transportation 24415.4 Research Challenges 24815.5 Discussion and Conclusion 248References 24916 Cyberspace for Smart Parenting with Sensors 253Alok Ranjan Prusty16.1 Background 25416.2 Internet of Things 25416.2.1 Machine to Machine 25516.2.2 Smart Wearables 25516.2.3 Smart Parenting 25616.2.4 Accelerometer Sensor 25716.2.5 Pulse Sensor 25716.3 Project 25716.4 Steps and Working Principle 25916.5 Result and Analysis 26016.6 Conclusions 262References 262
Du kanske också är intresserad av
Intelligent Renewable Energy Systems
Neeraj Priyadarshi, Akash Kumar Bhoi, Sanjeevikumar Padmanaban, S. Balamurugan, Jens Bo Holm-Nielsen, Denmark) Priyadarshi, Neeraj (Aalborg University, India) Bhoi, Akash Kumar (Sikkim Manipal Institute of Technology (SMIT), Norway) Padmanaban, Sanjeevikumar (University of South-Eastern Norway, India) Balamurugan, S. (Intelligent Research Consultancy Services (iRCS), Denmark) Holm-Nielsen, Jens Bo (Aalborg University, Esbjerg
3 259 kr
Treatment of Skin Disease
Mark Lebwohl, Ian H. Coulson, Dedee Murrell, USA) Lebwohl, Mark (Chairman Emeritus Kimberly and Eric J. Waldman, Department of Dermatology, Dean for Clinical Therapeutics, Icahn School of Medicine, Mount Sinai, New York, NY, UK) Coulson, Ian H., BSc, MB, FRCP (Consultant Dermatologist, The Beardwood Hospital, Blackburn, Lancashire, Australia) Murrell, Dedee, MA, BM, MD, FACD, FRCP (Head, Dept of Dermatology, St George Hospital Campus, Kogarah, Sydney, Warren R. Heymann, USA.) Heymann, Warren R. (Professor of Medicine and Pediatrics, Head, Division of Dermatology, Cooper Medical School of Rowan University, Camden, NJ, USA<br>Clinical Professor of Dermatology, Perelman School of Medicine at the University of Pennsylvania, Philadelphia, PA
3 259 kr