Preface |
|
xv | |
Acknowledgement |
|
xvii | |
|
1 Internet of Things: A Key to Unfasten Mundane Repetitive Tasks |
|
|
1 | (24) |
|
|
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (9) |
|
1.3.1 The IoT Policy Domain |
|
|
3 | (2) |
|
1.3.2 The IoT Software Domain |
|
|
5 | (1) |
|
1.3.2.1 IoT in Cloud Computing (CC) |
|
|
5 | (1) |
|
1.3.2.2 IoT in Edge Computing (EC) |
|
|
6 | (4) |
|
1.3.2.3 IoT in Fog Computing (FC) |
|
|
10 | (1) |
|
1.3.2.4 IoT in Telecommuting |
|
|
11 | (1) |
|
1.3.2.5 IoT in Data-Center |
|
|
12 | (1) |
|
1.3.2.6 Virtualization-Based IoT (VBIoT) |
|
|
12 | (1) |
|
1.4 Green Computing (GC) in IoT Framework |
|
|
12 | (1) |
|
|
13 | (8) |
|
1.5.1 Standardization Using oneM2M |
|
|
15 | (3) |
|
1.5.2 Semantic Interoperability (SI) |
|
|
18 | (1) |
|
1.5.3 Semantic Interoperability (SI) |
|
|
19 | (1) |
|
1.5.4 Semantic IoT vs Machine Learning |
|
|
20 | (1) |
|
|
21 | (4) |
|
|
21 | (4) |
|
2 Measures for Improving IoT Security |
|
|
25 | (16) |
|
|
|
|
|
|
25 | (1) |
|
2.2 Perceiving IoT Security |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (2) |
|
2.4.1 Enhancing Personal Data Access in Public Repositories |
|
|
28 | (1) |
|
2.4.2 Develop and Sustain Ethicality |
|
|
28 | (1) |
|
2.4.3 Maximize the Power of IoT Access |
|
|
29 | (1) |
|
2.4.4 Understanding Importance of Firewalls |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (2) |
|
2.6.1 Challenge of Data Management |
|
|
32 | (1) |
|
|
33 | (3) |
|
2.7.1 Ensure User Authentication |
|
|
33 | (1) |
|
2.7.2 Increase User Autonomy |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
2.7.7 Integrity in Service |
|
|
36 | (1) |
|
2.7.8 Sensing of Infringement |
|
|
36 | (1) |
|
2.8 Monitoring of Firewalls and Good Management |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
2.8.3 Secure Firewalls for Private |
|
|
37 | (1) |
|
2.8.4 Business Firewalls for Personal |
|
|
37 | (1) |
|
2.8.5 IoT Security Weaknesses |
|
|
37 | (1) |
|
|
37 | (4) |
|
|
38 | (3) |
|
3 An Efficient Fog-Based Model for Secured Data Communication |
|
|
41 | (16) |
|
|
R. S. M. Lakshmi Patibandla |
|
|
|
41 | (4) |
|
3.1.1 Fog Computing Model |
|
|
42 | (1) |
|
3.1.2 Correspondence in IoT Devices |
|
|
43 | (2) |
|
|
45 | (3) |
|
|
45 | (1) |
|
3.2.2 Man-In-The-Middle Concept |
|
|
45 | (1) |
|
3.2.3 Data and Misrepresentation |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
3.4 Proposed Model for Attack Identification Using Fog Computing |
|
|
49 | (3) |
|
|
52 | (2) |
|
|
54 | (3) |
|
|
54 | (3) |
|
4 An Expert System to Implement Symptom Analysis in Healthcare |
|
|
57 | (14) |
|
|
|
|
57 | (2) |
|
|
59 | (1) |
|
4.3 Proposed Model Description and Flow Chart |
|
|
60 | (2) |
|
4.3.1 Flowchart of the Model |
|
|
60 | (1) |
|
4.3.1.1 Value of Symptoms |
|
|
60 | (1) |
|
4.3.1.2 User Interaction Web Module |
|
|
60 | (1) |
|
|
60 | (1) |
|
4.3.1.4 Convolution Neural Network |
|
|
60 | (1) |
|
4.3.1.5 CNN-Fuzzy Inference Engine |
|
|
61 | (1) |
|
4.4 UML Analysis of Expert Model |
|
|
62 | (4) |
|
4.4.1 Expert Module Activity Diagram |
|
|
63 | (2) |
|
4.4.2 Ontology Class Collaboration Diagram |
|
|
65 | (1) |
|
4.5 Ontology Model of Expert Systems |
|
|
66 | (1) |
|
4.6 Conclusion and Future Scope |
|
|
67 | (4) |
|
|
68 | (3) |
|
5 An IoT-Based Gadget for Visually Impaired People |
|
|
71 | (16) |
|
|
|
|
|
|
|
71 | (2) |
|
|
73 | (1) |
|
|
74 | (8) |
|
5.4 Results and Discussion |
|
|
82 | (2) |
|
|
84 | (1) |
|
|
84 | (3) |
|
|
84 | (3) |
|
6 IoT Protocol for Inferno Calamity in Public Transport |
|
|
87 | (24) |
|
|
|
|
|
87 | (2) |
|
|
89 | (5) |
|
|
94 | (9) |
|
6.3.1 IoT Message Exchange With Cloud MQTT Broker Based on MQTT Protocol |
|
|
98 | (1) |
|
6.3.2 Hardware Requirement |
|
|
98 | (5) |
|
|
103 | (3) |
|
6.4.1 Interfacing Diagram |
|
|
105 | (1) |
|
|
106 | (2) |
|
6.6 Conclusion and Future Work |
|
|
108 | (3) |
|
|
109 | (2) |
|
7 Traffic Prediction Using Machine Learning and IoT |
|
|
111 | (20) |
|
|
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (3) |
|
|
116 | (6) |
|
|
117 | (1) |
|
|
117 | (1) |
|
7.4.3 Simulator Architecture |
|
|
118 | (4) |
|
7.4.4 Workflow in Application |
|
|
122 | (1) |
|
7.4.5 Workflow of Google APIs in the Application |
|
|
122 | (1) |
|
|
122 | (6) |
|
|
122 | (2) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
128 | (1) |
|
7.6 Conclusion and Future Scope |
|
|
128 | (3) |
|
|
129 | (2) |
|
8 Application of Machine Learning in Precision Agriculture |
|
|
131 | (22) |
|
|
|
|
131 | (1) |
|
|
132 | (2) |
|
8.2.1 Supervised Learning |
|
|
133 | (1) |
|
8.2.2 Unsupervised Learning |
|
|
133 | (1) |
|
8.2.3 Reinforcement Learning |
|
|
134 | (1) |
|
|
134 | (1) |
|
8.4 ML Techniques Used in Agriculture |
|
|
135 | (13) |
|
|
135 | (5) |
|
|
140 | (1) |
|
8.4.3 Irrigation/Water Management |
|
|
141 | (2) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (2) |
|
|
147 | (1) |
|
|
148 | (5) |
|
|
149 | (4) |
|
9 An IoT-Based Multi Access Control and Surveillance for Home Security |
|
|
153 | (12) |
|
|
|
|
|
|
|
153 | (2) |
|
|
155 | (1) |
|
|
156 | (5) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (2) |
|
|
161 | (1) |
|
|
162 | (3) |
|
|
162 | (3) |
|
10 Application of IoT in Industry 4.0 for Predictive Analytics |
|
|
165 | (18) |
|
|
|
|
|
165 | (3) |
|
|
168 | (8) |
|
10.2.1 Maintenance-Based Monitoring |
|
|
168 | (1) |
|
10.2.2 Data Driven Approach to RUL Finding in Industry |
|
|
169 | (4) |
|
10.2.3 Philosophy of Industrial-IoT Systems and its Advantages in Different Domain |
|
|
173 | (3) |
|
10.3 Methodology and Results |
|
|
176 | (3) |
|
|
179 | (4) |
|
|
180 | (3) |
|
11 IoT and Its Role in Performance Enhancement in Business Organizations |
|
|
183 | (14) |
|
|
|
|
|
|
183 | (7) |
|
11.1.1 Scientific Issues in IoT |
|
|
184 | (1) |
|
11.1.2 IoT in Organizations |
|
|
185 | (2) |
|
11.1.3 Technology and Business |
|
|
187 | (1) |
|
11.1.4 Rewards of Technology in Business |
|
|
187 | (1) |
|
11.1.5 Shortcomings of Technology in Business |
|
|
188 | (1) |
|
11.1.6 Effect of IoT on Work and Organization |
|
|
188 | (2) |
|
11.2 Technology and Productivity |
|
|
190 | (3) |
|
11.3 Technology and Future of Human Work |
|
|
193 | (1) |
|
11.4 Technology and Employment |
|
|
194 | (1) |
|
|
195 | (2) |
|
|
195 | (2) |
|
12 An Analysis of Cloud Computing Based on Internet of Things |
|
|
197 | (14) |
|
|
|
|
|
|
|
197 | (5) |
|
12.1.1 Generic Architecture |
|
|
199 | (3) |
|
|
202 | (1) |
|
12.3 Technologies Used in IoT |
|
|
203 | (1) |
|
|
203 | (2) |
|
12.4.1 Service Models of Cloud Computing |
|
|
204 | (1) |
|
12.5 Cloud Computing Characteristics |
|
|
205 | (1) |
|
12.6 Applications of Cloud Computing |
|
|
206 | (1) |
|
|
207 | (1) |
|
12.8 Necessity for Fusing IoT and Cloud Computing |
|
|
207 | (1) |
|
12.9 Cloud-Based IoT Architecture |
|
|
208 | (1) |
|
12.10 Applications of Cloud-Based IoT |
|
|
208 | (1) |
|
|
209 | (2) |
|
|
209 | (2) |
|
13 Importance of Fog Computing in Emerging Technologies-IoT |
|
|
211 | (22) |
|
|
|
211 | (1) |
|
|
212 | (15) |
|
13.3 Need of Fog Computing |
|
|
227 | (6) |
|
|
230 | (3) |
|
14 Convergence of Big Data and Cloud Computing Environment |
|
|
233 | (18) |
|
|
|
233 | (1) |
|
14.2 Big Data: Historical View |
|
|
234 | (3) |
|
14.2.1 Big Data: Definition |
|
|
235 | (1) |
|
14.2.2 Big Data Classification |
|
|
236 | (1) |
|
14.2.3 Big Data Analytics |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
238 | (3) |
|
14.4.1 Storage or Collection System |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
14.5 Cloud Computing: History in a Nutshell |
|
|
241 | (1) |
|
14.5.1 View on Cloud Computing and Big Data |
|
|
241 | (1) |
|
14.6 Insight of Big Data and Cloud Computing |
|
|
241 | (4) |
|
14.6.1 Cloud-Based Services |
|
|
242 | (2) |
|
14.6.2 At a Glance: Cloud Services |
|
|
244 | (1) |
|
|
245 | (3) |
|
|
245 | (1) |
|
|
246 | (1) |
|
14.7.2.1 Features of Cassandra |
|
|
246 | (1) |
|
|
247 | (1) |
|
14.7.3.1 A Comparison With Relational Databases and Benefits |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (3) |
|
|
248 | (3) |
|
15 Data Analytics Framework Based on Cloud Environment |
|
|
251 | (26) |
|
|
|
|
251 | (1) |
|
15.2 Focus Areas of the Chapter |
|
|
252 | (1) |
|
|
252 | (11) |
|
15.3.1 Cloud Service Models |
|
|
253 | (1) |
|
15.3.1.1 Software as a Service (SaaS) |
|
|
253 | (1) |
|
15.3.1.2 Platform as a Service (PaaS) |
|
|
254 | (1) |
|
15.3.1.3 Infrastructure as a Service (IaaS) |
|
|
255 | (1) |
|
15.3.1.4 Desktop as a Service (DaaS) |
|
|
256 | (1) |
|
15.3.1.5 Analytics as a Service (AaaS) |
|
|
257 | (1) |
|
15.3.1.6 Artificial Intelligence as a Service (AIaaS) |
|
|
258 | (1) |
|
15.3.2 Cloud Deployment Models |
|
|
259 | (1) |
|
15.3.3 Virtualization of Resources |
|
|
260 | (1) |
|
15.3.4 Cloud Data Centers |
|
|
261 | (2) |
|
|
263 | (3) |
|
15.4.1 Data Analytics Types |
|
|
263 | (1) |
|
15.4.1.1 Descriptive Analytics |
|
|
263 | (1) |
|
15.4.1.2 Diagnostic Analytics |
|
|
264 | (1) |
|
15.4.1.3 Predictive Analytics |
|
|
265 | (1) |
|
15.4.1.4 Prescriptive Analytics |
|
|
265 | (1) |
|
15.4.1.5 Big Data Analytics |
|
|
265 | (1) |
|
15.4.1.6 Augmented Analytics |
|
|
266 | (1) |
|
|
266 | (1) |
|
15.4.1.8 Streaming Analytics |
|
|
266 | (1) |
|
15.4.2 Data Analytics Tools |
|
|
266 | (1) |
|
15.5 Real-Time Data Analytics Support in Cloud |
|
|
266 | (2) |
|
15.6 Framework for Data Analytics in Cloud |
|
|
268 | (1) |
|
15.6.1 Data Analysis Software as a Service (DASaaS) |
|
|
268 | (1) |
|
15.6.2 Data Analysis Platform as a Service (DAPaaS) |
|
|
268 | (1) |
|
15.6.3 Data Analysis Infrastructure as a Service (DAIaaS) |
|
|
269 | (1) |
|
15.7 Data Analytics Work-Flow |
|
|
269 | (1) |
|
15.8 Cloud-Based Data Analytics Tools |
|
|
270 | (2) |
|
15.8.1 Amazon Kinesis Services |
|
|
271 | (1) |
|
15.8.2 Amazon Kinesis Data Firehose |
|
|
271 | (1) |
|
15.8.3 Amazon Kinesis Data Streams |
|
|
271 | (1) |
|
|
271 | (1) |
|
15.8.5 Azure Stream Analytics |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (5) |
|
|
274 | (3) |
|
16 Neural Networks for Big Data Analytics |
|
|
277 | (22) |
|
|
|
277 | (1) |
|
16.2 Neural Networks---An Overview |
|
|
278 | (1) |
|
16.3 Why Study Neural Networks? |
|
|
279 | (1) |
|
16.4 Working of Artificial Neural Networks |
|
|
279 | (9) |
|
16.4.1 Single-Layer Perceptron |
|
|
279 | (1) |
|
16.4.2 Multi-Layer Perceptron |
|
|
280 | (1) |
|
16.4.3 Training a Neural Network |
|
|
281 | (1) |
|
16.4.4 Gradient Descent Algorithm |
|
|
282 | (2) |
|
16.4.5 Activation Functions |
|
|
284 | (4) |
|
16.5 Innovations in Neural Networks |
|
|
288 | (4) |
|
16.5.1 Convolutional Neural Network (ConvNet) |
|
|
288 | (1) |
|
16.5.2 Recurrent Neural Network |
|
|
289 | (2) |
|
|
291 | (1) |
|
16.6 Applications of Deep Learning Neural Networks |
|
|
292 | (1) |
|
16.7 Practical Application of Neural Networks Using Computer Codes |
|
|
293 | (1) |
|
16.8 Opportunities and Challenges of Using Neural Networks |
|
|
293 | (3) |
|
|
296 | (3) |
|
|
296 | (3) |
|
17 Meta-Heuristic Algorithms for Best IoT Cloud Service Platform Selection |
|
|
299 | (20) |
|
|
|
|
Mahendra Kumar Gourisaria |
|
|
|
|
299 | (2) |
|
17.2 Selection of a Cloud Provider in Federated Cloud |
|
|
301 | (6) |
|
17.3 Algorithmic Solution |
|
|
307 | (7) |
|
17.3.1 TLBO Algorithm (Teaching-Learning-Based Optimization Algorithm) |
|
|
307 | (1) |
|
17.3.1.1 Teacher Phase: Generation of a New Solution |
|
|
308 | (1) |
|
17.3.1.2 Learner Phase: Generation of New Solution |
|
|
309 | (1) |
|
17.3.1.3 Representation of the Solution |
|
|
309 | (1) |
|
|
309 | (2) |
|
17.3.2.1 Representation of the Solution |
|
|
311 | (1) |
|
17.3.3 Bird Swarm Algorithm |
|
|
311 | (2) |
|
17.3.3.1 Forging Behavior |
|
|
313 | (1) |
|
17.3.3.2 Vigilance Behavior |
|
|
313 | (1) |
|
|
313 | (1) |
|
17.3.3.4 Representation of the Solution |
|
|
313 | (1) |
|
17.4 Analyzing the Algorithms |
|
|
314 | (2) |
|
|
316 | (3) |
|
|
316 | (3) |
|
18 Legal Entanglements of Cloud Computing In India |
|
|
319 | (24) |
|
|
|
18.1 Cloud Computing Technology |
|
|
319 | (3) |
|
18.2 Cyber Security in Cloud Computing |
|
|
322 | (1) |
|
18.3 Security Threats in Cloud Computing |
|
|
323 | (2) |
|
|
323 | (1) |
|
18.3.2 Denial of Service (DoS) |
|
|
323 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
324 | (1) |
|
18.3.6 Hijacking Accounts |
|
|
324 | (1) |
|
18.3.7 Insecure Applications |
|
|
324 | (1) |
|
18.3.8 Inadequate Training |
|
|
325 | (1) |
|
18.3.9 General Vulnerabilities |
|
|
325 | (1) |
|
18.4 Cloud Security Probable Solutions |
|
|
325 | (2) |
|
18.4.1 Appropriate Cloud Model for Business |
|
|
325 | (1) |
|
18.4.2 Dedicated Security Policies Plan |
|
|
325 | (1) |
|
18.4.3 Multifactor Authentication |
|
|
325 | (1) |
|
18.4.4 Data Accessibility |
|
|
326 | (1) |
|
18.4.5 Secure Data Destruction |
|
|
326 | (1) |
|
18.4.6 Encryption of Backups |
|
|
326 | (1) |
|
18.4.7 Regulatory Compliance |
|
|
326 | (1) |
|
18.4.8 External Third-Party Contracts and Agreements |
|
|
327 | (1) |
|
18.5 Cloud Security Standards |
|
|
327 | (1) |
|
18.6 Cyber Security Legal Framework in India |
|
|
327 | (2) |
|
18.7 Privacy in Cloud Computing---Data Protection Standards |
|
|
329 | (1) |
|
18.8 Recognition of Right to Privacy |
|
|
330 | (2) |
|
18.9 Government Surveillance Power vs Privacy of Individuals |
|
|
332 | (1) |
|
18.10 Data Ownership and Intellectual Property Rights |
|
|
333 | (2) |
|
18.11 Cloud Service Provider as an Intermediary |
|
|
335 | (2) |
|
18.12 Challenges in Cloud Computing |
|
|
337 | (2) |
|
18.12.1 Classification of Data |
|
|
337 | (1) |
|
18.12.2 Jurisdictional Issues |
|
|
337 | (1) |
|
18.12.3 Interoperability of the Cloud |
|
|
338 | (1) |
|
18.12.4 Vendor Agreements |
|
|
339 | (1) |
|
|
339 | (4) |
|
|
341 | (2) |
|
19 Securing the Pharma Supply Chain Using Blockchain |
|
|
343 | (15) |
|
|
|
|
|
343 | (2) |
|
|
345 | (4) |
|
|
346 | (1) |
|
|
347 | (2) |
|
|
349 | (5) |
|
|
354 | (4) |
|
19.5 Conclusion and Future Scope |
|
|
358 | (1) |
References |
|
358 | (3) |
Index |
|
361 | |