List of Figures |
|
xv | |
List of Tables |
|
xix | |
Foreword |
|
xxi | |
Preface |
|
xxiii | |
Acknowledgments |
|
xxv | |
Acronyms |
|
xxvii | |
Part I Security Designs for the Cloud Network |
|
|
1 Encryption Algorithm for Data Security in Cloud Computing |
|
|
3 | (16) |
|
|
|
|
4 | (1) |
|
|
4 | (1) |
|
1.3 Cloud Computing - A Brief Overview |
|
|
5 | (2) |
|
1.3.1 Essential Characteristics |
|
|
5 | (1) |
|
1.3.2 Layers of Cloud Computing |
|
|
6 | (1) |
|
1.3.3 Cloud Deployment Models |
|
|
7 | (1) |
|
1.4 Data Security in Cloud Storage |
|
|
7 | (9) |
|
1.4.1 Security Issues in Cloud |
|
|
7 | (1) |
|
1.4.2 Symmetric Encryption Algori |
|
|
8 | (4) |
|
1.4.3 Asymmetric Encryption Algorithms |
|
|
12 | (3) |
|
1.4.4 Security Enhancement in Cloud Using Encryption Algorithms: Observations |
|
|
15 | (1) |
|
1.5 Comparison of Encryption Algorithms |
|
|
16 | (1) |
|
1.6 Performance Analysis of Encryption Algorithms in Cloud |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (2) |
|
2 Analysis of Security Issues in Cloud Environment |
|
|
19 | (24) |
|
|
|
|
|
2.1 An Insight into Cloud Computing |
|
|
20 | (1) |
|
2.2 Critical Challenges Concerning Cloud Computing |
|
|
21 | (1) |
|
|
21 | (1) |
|
2.2.2 Data Recovery and Availability |
|
|
22 | (1) |
|
2.2.3 Management Capacities |
|
|
22 | (1) |
|
2.2.4 Regulatory and Compliance Restrictions |
|
|
22 | (1) |
|
2.3 Basic Models Governing Cloud Computing |
|
|
22 | (4) |
|
2.3.1 Cloud Computing Models |
|
|
23 | (1) |
|
2.3.2 Security Concerns of Cloud Computing |
|
|
23 | (3) |
|
2.4 Security Countermeasures in Cloud Computing |
|
|
26 | (3) |
|
2.4.1 Countermeasures for Communication Issues |
|
|
26 | (1) |
|
2.4.2 Countermeasures for Architecture Security |
|
|
26 | (1) |
|
2.4.3 Countermeasures for Challenges Inherited from Network Concepts |
|
|
27 | (1) |
|
2.4.4 Countermeasures for CAS Proposed Threats |
|
|
28 | (1) |
|
2.5 Discussion of an Implemented SDN Security Framework |
|
|
29 | (6) |
|
|
29 | (1) |
|
2.5.2 Phase 1: User Authentication Phase |
|
|
30 | (1) |
|
2.5.3 Phase 2: Controller Assignment Phase |
|
|
31 | (2) |
|
2.5.4 Phase 3: Communication Phase |
|
|
33 | (2) |
|
|
35 | (5) |
|
2.6.1 Simulation Environment |
|
|
35 | (1) |
|
2.6.2 Analysis of Different Attacks |
|
|
35 | (1) |
|
2.6.3 Comparative Analysis |
|
|
36 | (4) |
|
|
40 | (1) |
|
|
40 | (3) |
|
3 Security and Challenges in Mobile Cloud Computing |
|
|
43 | (16) |
|
|
|
|
|
44 | (2) |
|
3.1.1 Mobile Cloud Computing |
|
|
44 | (2) |
|
3.1.2 Internet of Things and Cloud Computing |
|
|
46 | (1) |
|
|
46 | (1) |
|
3.3 Architecture of Integration of Mobile Cloud Computing with IoT |
|
|
46 | (8) |
|
3.3.1 Infrastructural or Architectural Issues |
|
|
49 | (3) |
|
|
52 | (1) |
|
|
53 | (1) |
|
3.4 Proposed Preventive Measure for Security in MCC |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (4) |
|
4 Fog Computing and Its Security Issues |
|
|
59 | (18) |
|
|
|
|
|
|
60 | (2) |
|
4.2 Current Fog Applications |
|
|
62 | (4) |
|
4.2.1 Why Do We Need Fog? |
|
|
62 | (1) |
|
4.2.2 What Can We Do with Fog? |
|
|
63 | (3) |
|
4.3 Security and Privacy in Fog Computing |
|
|
66 | (3) |
|
4.3.1 Trust and Authentication |
|
|
66 | (1) |
|
4.3.2 Man-in-the-Middle Attacks (MITM) |
|
|
66 | (2) |
|
|
68 | (1) |
|
4.3.4 Secure Data Storage |
|
|
69 | (1) |
|
4.4 Secure and Private Data Computation |
|
|
69 | (2) |
|
|
70 | (1) |
|
|
71 | (1) |
|
4.4.3 Intrusion Detection |
|
|
71 | (1) |
|
|
71 | (2) |
|
|
73 | (4) |
|
5 Application Safety and Service Vulnerability in Cloud Network |
|
|
77 | (22) |
|
|
|
|
78 | (2) |
|
5.1.1 Introduction to Security Issues in Cloud Service Models |
|
|
78 | (1) |
|
5.1.2 Security Issues in SaaS |
|
|
78 | (1) |
|
5.1.3 Security Issues in PaaS |
|
|
79 | (1) |
|
5.1.4 Security Issues in IaaS |
|
|
79 | (1) |
|
5.2 Security Concerns of Cloud Computing |
|
|
80 | (4) |
|
|
80 | (1) |
|
5.2.2 Hijacking of Accounts |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
5.2.5 Abuse of Cloud Services |
|
|
82 | (1) |
|
|
82 | (1) |
|
5.2.7 Denial of Service Attacks |
|
|
83 | (1) |
|
5.2.8 Insufficient Due Diligence |
|
|
83 | (1) |
|
5.2.9 Shared Vulnerabilities |
|
|
84 | (1) |
|
|
84 | (1) |
|
5.3 Security Tools in Cloud |
|
|
84 | (5) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
5.4 Cloud Service Vulnerabilities |
|
|
89 | (3) |
|
5.4.1 Visibility and Control Reduction at the Consumer End |
|
|
89 | (1) |
|
5.4.2 On-Demand SelfService Simplifies Unauthorized Use |
|
|
89 | (1) |
|
5.4.3 Web-Based Organization APIs Can Be Compromised |
|
|
90 | (1) |
|
5.4.4 Separation among Multi-Tenant Fails |
|
|
90 | (1) |
|
5.4.5 Incomplete Data Deletion |
|
|
90 | (1) |
|
|
90 | (1) |
|
5.4.7 Increased Complexity Strains IT Staff |
|
|
91 | (1) |
|
5.4.8 Vendor Lock-In Complicates Moving to Other CSPs |
|
|
91 | (1) |
|
5.4.9 Insiders Abuse Authorized Access |
|
|
91 | (1) |
|
5.4.10 Stored Data is Lost |
|
|
92 | (1) |
|
5.4.11 CSP Supply Chain Can Be Compromised |
|
|
92 | (1) |
|
5.4.12 Inadequate Due Diligence Amplifies Cyber Threat |
|
|
92 | (1) |
|
5.5 Cloud Computing Security Best Practices |
|
|
92 | (2) |
|
5.5.1 Cloud Data Encryption |
|
|
92 | (1) |
|
5.5.2 Identity and Access Management |
|
|
93 | (1) |
|
5.5.3 Network Segmentation |
|
|
93 | (1) |
|
|
93 | (1) |
|
5.5.5 Vulnerability Management |
|
|
93 | (1) |
|
5.5.6 Monitoring, Altering and Reporting |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
94 | (5) |
Part II Security Designs for the Internet of Things and Social Networks |
|
|
6 IoT Security and Privacy Preservation |
|
|
99 | (14) |
|
|
|
|
|
|
100 | (1) |
|
6.2 Review of Existing Technology |
|
|
101 | (1) |
|
|
101 | (2) |
|
|
103 | (3) |
|
|
103 | (1) |
|
|
104 | (2) |
|
|
106 | (1) |
|
6.5 Implication and Findings |
|
|
106 | (2) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (4) |
|
7 Automation Movie Recommender System Based on Internet of Things and Clustering |
|
|
113 | (16) |
|
|
|
|
|
114 | (1) |
|
|
115 | (7) |
|
7.2.1 Characteristics of IoT |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
7.2.4 Requirements of IoT |
|
|
116 | (1) |
|
|
116 | (1) |
|
7.2.6 Architecture of IoT |
|
|
117 | (1) |
|
7.2.7 Application Domain of IoT |
|
|
117 | (2) |
|
|
119 | (2) |
|
7.2.9 The Present and Future of IoT |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
124 | (3) |
|
|
127 | (1) |
|
|
127 | (2) |
|
8 Societal Implications of Emerging Technologies (SMAC) and Related Privacy Challenges |
|
|
129 | (14) |
|
|
|
|
|
8.1 Introduction to Data Analytics |
|
|
130 | (3) |
|
8.1.1 Descriptive Analytics |
|
|
131 | (1) |
|
8.1.2 Diagnostic Analytics |
|
|
131 | (1) |
|
8.1.3 Prescriptive Analytics |
|
|
131 | (1) |
|
8.1.4 Exploratory Analytics |
|
|
132 | (1) |
|
8.1.5 Predictive Analytics |
|
|
133 | (1) |
|
8.1.6 Mechanistic, Causal and Inferential Analytics |
|
|
133 | (1) |
|
8.2 Privacy Concerns Related to Use of Data Analytics |
|
|
133 | (4) |
|
8.2.1 Immoral Actions Based on Analyses |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
8.2.4 Inaccuracy of Data Analytics |
|
|
134 | (1) |
|
|
134 | (1) |
|
8.2.6 Understanding Cloud Basics |
|
|
134 | (3) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
8.4.2 Societal Implication of Social Network |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
140 | (3) |
|
9 Implementation of REST Architecure-Based Energy-Efficient Home Automation System |
|
|
143 | (10) |
|
|
|
|
|
144 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
9.4 Why and How REST is More Suitable for IoT |
|
|
145 | (1) |
|
9.5 Architecture of Arduino-Based Home Automation System |
|
|
146 | (1) |
|
9.6 Implementation Details |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (3) |
|
9.8.1 Power Consumption without Automation |
|
|
148 | (1) |
|
9.8.2 Power Consumption with IoT |
|
|
148 | (1) |
|
9.8.3 Total Power Consumption Analysis |
|
|
149 | (1) |
|
9.9 Conclusion and Future Scope |
|
|
150 | (1) |
|
|
151 | (2) |
|
10 The Vital Role of Fog Computing in Internet of Things |
|
|
153 | (14) |
|
|
|
|
|
|
|
154 | (1) |
|
|
155 | (1) |
|
10.3 IoT Principles and Applications |
|
|
156 | (1) |
|
10.4 Different IoT Domains |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
10.5 Issues in Fog Computing Regarding Security and Privacy |
|
|
158 | (3) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
10.5.5 Secure Communication between Fog Nodes |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
161 | (6) |
Part III Security Designs for Solutions and Applications |
|
|
11 The Role of Information-Centric Security in the Modern Arena of Information Technology |
|
|
167 | (12) |
|
|
|
|
|
168 | (1) |
|
11.2 Complete Solution to Data Security |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
11.3 Intrusion Detection and Security |
|
|
170 | (3) |
|
11.3.1 Divergent Type of Intrusion Detection System |
|
|
170 | (2) |
|
11.3.2 Potentiality of Intrusion Detection Systems |
|
|
172 | (1) |
|
11.3.3 Advantage of Intrusion Detection Systems |
|
|
173 | (1) |
|
|
173 | (1) |
|
11.5 Relevant Methods to Increase Data Safety |
|
|
174 | (1) |
|
|
174 | (1) |
|
11.5.2 Identification of Sensitive Data |
|
|
174 | (1) |
|
11.5.3 Pre-Planned Data Security Policy |
|
|
175 | (1) |
|
11.5.4 Strong and Different Passwords for Every Department |
|
|
175 | (1) |
|
11.5.5 Regular Data Backup and Update |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (3) |
|
12 Enabling Mobile Technology for Healthcare Service Improvements |
|
|
179 | (12) |
|
|
|
|
180 | (2) |
|
12.1.1 Healthcare System in India |
|
|
180 | (1) |
|
|
180 | (1) |
|
12.1.3 Worldwide mHealth Scenario |
|
|
181 | (1) |
|
12.1.4 mHealth and Its Scope in India |
|
|
181 | (1) |
|
|
182 | (1) |
|
12.2.1 Application Server |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (5) |
|
|
188 | (1) |
|
|
189 | (2) |
|
13 Optimization of Ontology-Based Clinical Pathways and Incorporating Differential Privacy in the Healthcare System |
|
|
191 | (16) |
|
|
|
|
|
192 | (2) |
|
13.2 Ontological Structure of Clinical Pathways |
|
|
194 | (1) |
|
|
195 | (7) |
|
13.3.1 Elements of Optimization in CP |
|
|
196 | (1) |
|
13.3.2 Functional Model of Differential Privacy |
|
|
196 | (3) |
|
13.3.3 About the Data Visualization |
|
|
199 | (1) |
|
13.3.4 Validation of Results |
|
|
199 | (3) |
|
13.4 Conclusion and Further Scope of Research |
|
|
202 | (1) |
|
|
203 | (4) |
|
14 Advancements and Applications in Fog Computing |
|
|
207 | (34) |
|
|
|
|
|
208 | (2) |
|
|
208 | (1) |
|
14.1.2 Internet of Things |
|
|
208 | (1) |
|
|
209 | (1) |
|
14.2 Fog Computing Architecture |
|
|
210 | (4) |
|
14.2.1 Features of Fog Computing |
|
|
210 | (1) |
|
14.2.2 Architecture of Fog Computing |
|
|
211 | (1) |
|
14.2.3 Components of Fog Computing |
|
|
212 | (2) |
|
14.3 Communication in Fog Computing |
|
|
214 | (4) |
|
14.3.1 Communication Steps |
|
|
214 | (1) |
|
14.3.2 Discovery and Detection of ICOs |
|
|
214 | (1) |
|
14.3.3 Models of Communication |
|
|
215 | (1) |
|
14.3.4 Communication Protocols |
|
|
215 | (1) |
|
14.3.5 Communication Protocol Requirements |
|
|
216 | (1) |
|
14.3.6 Methods of Data Collection |
|
|
216 | (2) |
|
14.4 Application or Programming Models |
|
|
218 | (3) |
|
14.4.1 Sense-Process-Actuate Model |
|
|
218 | (1) |
|
14.4.2 Stream Processing Model |
|
|
218 | (1) |
|
14.4.3 Benefits of Fog over Cloud Computing |
|
|
219 | (1) |
|
|
220 | (1) |
|
14.5 Simulation- Based Experiments |
|
|
221 | (4) |
|
|
225 | (2) |
|
14.6.1 Classification of Scheduling |
|
|
225 | (1) |
|
14.6.2 Need for Scheduling |
|
|
225 | (1) |
|
14.6.3 Existing Scheduling Algorithms |
|
|
226 | (1) |
|
14.7 Challenges in Fog Computing |
|
|
227 | (3) |
|
14.7.1 Connectivity Challenges |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
14.7.6 Pluggable Architecture |
|
|
229 | (1) |
|
|
229 | (1) |
|
14.7.8 Network and Storage |
|
|
230 | (1) |
|
|
230 | (6) |
|
|
230 | (2) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
14.8.5 Future Applications |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
237 | (4) |
|
15 Taxonomy of Cyber-Physical Social Systems in Intelligent Transportation |
|
|
241 | (12) |
|
|
|
|
242 | (1) |
|
15.2 General Overview of CPSS in Intelligent Transportation |
|
|
243 | (1) |
|
|
243 | (1) |
|
15.2.2 Transition from CPS to CPSS |
|
|
243 | (1) |
|
15.2.3 CPSS in Transportation |
|
|
244 | (1) |
|
15.3 Conceptual Framework of CPSS in Transportation |
|
|
244 | (4) |
|
|
248 | (1) |
|
15.5 Discussion and Conclusion |
|
|
248 | (1) |
|
|
249 | (4) |
|
16 Cyberspace for Smart Parenting with Sensors |
|
|
253 | |
|
|
|
254 | (1) |
|
|
254 | (3) |
|
16.2.1 Machine to Machine |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
16.2.4 Accelerometer Sensor |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
257 | (2) |
|
16.4 Steps and Working Principle |
|
|
259 | (1) |
|
|
260 | (2) |
|
|
262 | (1) |
|
|
262 | |