Authentication Technologies for Cloud Computing, IoT and Big Data [Kõva köide]

Edited by (University of Windsor, Department of Electrical and Computer Engineering, Canada), Edited by (University Malaysia Pahang (UMP), Faculty of Computer Systems & Software Engineering, Malaysia)
  • Formaat: Hardback, 368 pages, kõrgus x laius: 234x156 mm
  • Sari: Security
  • Ilmumisaeg: 03-May-2019
  • Kirjastus: Institution of Engineering and Technology
  • ISBN-10: 1785615564
  • ISBN-13: 9781785615566
  • Formaat: Hardback, 368 pages, kõrgus x laius: 234x156 mm
  • Sari: Security
  • Ilmumisaeg: 03-May-2019
  • Kirjastus: Institution of Engineering and Technology
  • ISBN-10: 1785615564
  • ISBN-13: 9781785615566

This book covers the state-of-art global research on authentication technologies for security and privacy in information systems, including applications, research challenges and future research directions.



Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.

Chapter 1: Introduction
Chapter 2: Information security
Chapter 3: Data authentication algorithms
Chapter 4: Cryptographic algorithms
Chapter 5: Digital watermarking algorithms for multimedia data
Chapter 6: Biometric authentication
Chapter 7: Lightweight block ciphers with applications in IoT
Chapter 8: Identification schemes in the post-quantum area based on multivariate polynomials with applications in cloud and IoT
Chapter 9: Authentication issues for cloud applications
Chapter 10: The insider threat problem from a cloud computing perspective
Chapter 11: Cryptographic engines for cloud based on FPGA
Chapter 12: Data protection laws
Chapter 13: Conclusion
Dr. Yasser M. Alginahi is a Visiting Scholar at the University of Windsor, Department of Electrical and Computer Engineering, Canada. Previously, he was an Associate Professor at the Department of Computer Science, Taibah University, Saudi Arabia. He is a licensed Professional Engineer and a member of Professional Engineers Canada, a member of IAENG, a senior member of IEEE and IACSIT. His current research interests cover information security, document image analysis, pattern recognition, OCR, modeling and simulation, intelligent systems, and numerical computations. Dr. Muhammad Nomani Kabir is a Senior Lecturer at the Faculty of Computer Systems & Software Engineering, University Malaysia Pahang (UMP), Malaysia. He earned a PhD in Computer Science and an MSc in Computational Sciences in Engineering from the University of Braunschweig, Germany. He is a member of IAENG. His research interests include information security, modelling and simulation, computational methods, image processing and computer networks.