Muutke küpsiste eelistusi

E-raamat: Security Designs for the Cloud, IoT, and Social Networking

Edited by , Edited by , Edited by
  • Formaat: PDF+DRM
  • Ilmumisaeg: 10-Oct-2019
  • Kirjastus: Wiley-Scrivener
  • Keel: eng
  • ISBN-13: 9781119593201
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 232,12 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele
  • Formaat: PDF+DRM
  • Ilmumisaeg: 10-Oct-2019
  • Kirjastus: Wiley-Scrivener
  • Keel: eng
  • ISBN-13: 9781119593201
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media.

List of Figures xv
List of Tables xix
Foreword xxi
Preface xxiii
Acknowledgments xxv
Acronyms xxvii
Part I Security Designs for the Cloud Network
1 Encryption Algorithm for Data Security in Cloud Computing
3(16)
Anindita Desarkar
Ajanta Das
1.1 Introduction
4(1)
1.2 Related Work
4(1)
1.3 Cloud Computing - A Brief Overview
5(2)
1.3.1 Essential Characteristics
5(1)
1.3.2 Layers of Cloud Computing
6(1)
1.3.3 Cloud Deployment Models
7(1)
1.4 Data Security in Cloud Storage
7(9)
1.4.1 Security Issues in Cloud
7(1)
1.4.2 Symmetric Encryption Algori
8(4)
1.4.3 Asymmetric Encryption Algorithms
12(3)
1.4.4 Security Enhancement in Cloud Using Encryption Algorithms: Observations
15(1)
1.5 Comparison of Encryption Algorithms
16(1)
1.6 Performance Analysis of Encryption Algorithms in Cloud
16(1)
1.7 Conclusion
17(1)
References
17(2)
2 Analysis of Security Issues in Cloud Environment
19(24)
Sushruta Mishra
Nitin Tripathy
Brojo Kishore Mishra
Chandrakanta Mahanty
2.1 An Insight into Cloud Computing
20(1)
2.2 Critical Challenges Concerning Cloud Computing
21(1)
2.2.1 Data Protection
21(1)
2.2.2 Data Recovery and Availability
22(1)
2.2.3 Management Capacities
22(1)
2.2.4 Regulatory and Compliance Restrictions
22(1)
2.3 Basic Models Governing Cloud Computing
22(4)
2.3.1 Cloud Computing Models
23(1)
2.3.2 Security Concerns of Cloud Computing
23(3)
2.4 Security Countermeasures in Cloud Computing
26(3)
2.4.1 Countermeasures for Communication Issues
26(1)
2.4.2 Countermeasures for Architecture Security
26(1)
2.4.3 Countermeasures for Challenges Inherited from Network Concepts
27(1)
2.4.4 Countermeasures for CAS Proposed Threats
28(1)
2.5 Discussion of an Implemented SDN Security Framework
29(6)
2.5.1 System Design
29(1)
2.5.2 Phase 1: User Authentication Phase
30(1)
2.5.3 Phase 2: Controller Assignment Phase
31(2)
2.5.4 Phase 3: Communication Phase
33(2)
2.6 Result Analysis
35(5)
2.6.1 Simulation Environment
35(1)
2.6.2 Analysis of Different Attacks
35(1)
2.6.3 Comparative Analysis
36(4)
2.7 Conclusion
40(1)
References
40(3)
3 Security and Challenges in Mobile Cloud Computing
43(16)
Ankur Dumka
Minakshi Memoria
Alaknanda Ashok
3.1 Introduction
44(2)
3.1.1 Mobile Cloud Computing
44(2)
3.1.2 Internet of Things and Cloud Computing
46(1)
3.2 Literature Review
46(1)
3.3 Architecture of Integration of Mobile Cloud Computing with IoT
46(8)
3.3.1 Infrastructural or Architectural Issues
49(3)
3.3.2 Privacy Issues
52(1)
3.3.3 Compliance Issues
53(1)
3.4 Proposed Preventive Measure for Security in MCC
54(1)
3.5 Conclusion
55(1)
References
55(4)
4 Fog Computing and Its Security Issues
59(18)
Jyotir Moy Chatterjee
Ishaani Priyadarshini
Shankeys
DacNhuong Le
4.1 Introduction
60(2)
4.2 Current Fog Applications
62(4)
4.2.1 Why Do We Need Fog?
62(1)
4.2.2 What Can We Do with Fog?
63(3)
4.3 Security and Privacy in Fog Computing
66(3)
4.3.1 Trust and Authentication
66(1)
4.3.2 Man-in-the-Middle Attacks (MITM)
66(2)
4.3.3 Network Security
68(1)
4.3.4 Secure Data Storage
69(1)
4.4 Secure and Private Data Computation
69(2)
4.4.1 Privacy
70(1)
4.4.2 Access Control
71(1)
4.4.3 Intrusion Detection
71(1)
4.5 Conclusion
71(2)
References
73(4)
5 Application Safety and Service Vulnerability in Cloud Network
77(22)
Sudipta Sahana
Debabrata Sarddar
5.1 Introduction
78(2)
5.1.1 Introduction to Security Issues in Cloud Service Models
78(1)
5.1.2 Security Issues in SaaS
78(1)
5.1.3 Security Issues in PaaS
79(1)
5.1.4 Security Issues in IaaS
79(1)
5.2 Security Concerns of Cloud Computing
80(4)
5.2.1 Data Breaches
80(1)
5.2.2 Hijacking of Accounts
81(1)
5.2.3 Insider Threat
81(1)
5.2.4 Malware Injection
82(1)
5.2.5 Abuse of Cloud Services
82(1)
5.2.6 Insecure APIs
82(1)
5.2.7 Denial of Service Attacks
83(1)
5.2.8 Insufficient Due Diligence
83(1)
5.2.9 Shared Vulnerabilities
84(1)
5.2.10 Data Loss
84(1)
5.3 Security Tools in Cloud
84(5)
5.3.1 Qualys
85(1)
5.3.2 CipherCloud
85(1)
5.3.3 Okta
86(1)
5.3.4 Skyline Networks
86(1)
5.3.5 Bitglass
86(1)
5.3.6 WhiteHat Security
87(1)
5.3.7 Proofpoint
87(1)
5.3.8 docTrackr
87(1)
5.3.9 Centrify
87(1)
5.3.10 Vaultive
88(1)
5.3.11 Zscaler
88(1)
5.3.12 SilverSky
88(1)
5.4 Cloud Service Vulnerabilities
89(3)
5.4.1 Visibility and Control Reduction at the Consumer End
89(1)
5.4.2 On-Demand SelfService Simplifies Unauthorized Use
89(1)
5.4.3 Web-Based Organization APIs Can Be Compromised
90(1)
5.4.4 Separation among Multi-Tenant Fails
90(1)
5.4.5 Incomplete Data Deletion
90(1)
5.4.6 Stolen Credentials
90(1)
5.4.7 Increased Complexity Strains IT Staff
91(1)
5.4.8 Vendor Lock-In Complicates Moving to Other CSPs
91(1)
5.4.9 Insiders Abuse Authorized Access
91(1)
5.4.10 Stored Data is Lost
92(1)
5.4.11 CSP Supply Chain Can Be Compromised
92(1)
5.4.12 Inadequate Due Diligence Amplifies Cyber Threat
92(1)
5.5 Cloud Computing Security Best Practices
92(2)
5.5.1 Cloud Data Encryption
92(1)
5.5.2 Identity and Access Management
93(1)
5.5.3 Network Segmentation
93(1)
5.5.4 Disaster Recovery
93(1)
5.5.5 Vulnerability Management
93(1)
5.5.6 Monitoring, Altering and Reporting
94(1)
5.6 Conclusion
94(1)
References
94(5)
Part II Security Designs for the Internet of Things and Social Networks
6 IoT Security and Privacy Preservation
99(14)
Bright Keswan
Tarini Ch. Mishra
Ambarish G. Mohapatra
Poonam Keswani
6.1 Introduction
100(1)
6.2 Review of Existing Technology
101(1)
6.3 Research Design
101(2)
6.4 Methodology
103(3)
6.4.1 AWS IoT
103(1)
6.4.2 ARM Mbed IoT
104(2)
6.4.3 Azure IoT Suite
106(1)
6.5 Implication and Findings
106(2)
6.5.1 Ethical
106(1)
6.5.2 Legal
107(1)
6.5.3 Social
107(1)
6.6 Future Scope
108(1)
6.7 Conclusion
108(1)
References
109(4)
7 Automation Movie Recommender System Based on Internet of Things and Clustering
113(16)
Lalit Mohan Goyal
Mamta Mittal
Asheesh Sharma
7.1 Introduction
114(1)
7.2 Background
115(7)
7.2.1 Characteristics of IoT
115(1)
7.2.2 Evolution of IoT
115(1)
7.2.3 Trends in IoT
116(1)
7.2.4 Requirements of IoT
116(1)
7.2.5 IoT Elements
116(1)
7.2.6 Architecture of IoT
117(1)
7.2.7 Application Domain of IoT
117(2)
7.2.8 IoT Technology
119(2)
7.2.9 The Present and Future of IoT
121(1)
7.2.10 IoT Challenges
121(1)
7.2.11 Scope of IoT
122(1)
7.3 Related Works
122(1)
7.4 Proposed System
123(1)
7.5 Implementation
124(3)
7.6 Conclusion
127(1)
References
127(2)
8 Societal Implications of Emerging Technologies (SMAC) and Related Privacy Challenges
129(14)
Manikant Roy
Amar Singh
Sukanta Ghosh
Nisha Sethi
8.1 Introduction to Data Analytics
130(3)
8.1.1 Descriptive Analytics
131(1)
8.1.2 Diagnostic Analytics
131(1)
8.1.3 Prescriptive Analytics
131(1)
8.1.4 Exploratory Analytics
132(1)
8.1.5 Predictive Analytics
133(1)
8.1.6 Mechanistic, Causal and Inferential Analytics
133(1)
8.2 Privacy Concerns Related to Use of Data Analytics
133(4)
8.2.1 Immoral Actions Based on Analyses
133(1)
8.2.2 Discrimination
134(1)
8.2.3 Privacy Breaches
134(1)
8.2.4 Inaccuracy of Data Analytics
134(1)
8.2.5 E-Discovery Angst
134(1)
8.2.6 Understanding Cloud Basics
134(3)
8.3 Issues
137(1)
8.3.1 Challenges
137(1)
8.3.2 Services of Cloud
137(1)
8.4 Social Media
138(1)
8.4.1 Introduction
138(1)
8.4.2 Societal Implication of Social Network
139(1)
8.5 Conclusion
139(1)
References
140(3)
9 Implementation of REST Architecure-Based Energy-Efficient Home Automation System
143(10)
Shankey Garg
Jyotir Moy Chatterjee
Dac-Nhuong Le
9.1 Introduction
144(1)
9.2 Related Work
144(1)
9.3 RESTful Web Server
144(1)
9.4 Why and How REST is More Suitable for IoT
145(1)
9.5 Architecture of Arduino-Based Home Automation System
146(1)
9.6 Implementation Details
146(1)
9.7 Why Arduino?
147(1)
9.8 Result Analysis
147(3)
9.8.1 Power Consumption without Automation
148(1)
9.8.2 Power Consumption with IoT
148(1)
9.8.3 Total Power Consumption Analysis
149(1)
9.9 Conclusion and Future Scope
150(1)
References
151(2)
10 The Vital Role of Fog Computing in Internet of Things
153(14)
Vikram Puri
Jolanda G Tromp
Chung Van Le
Nhu Gia Nguyen
Dac-Nhuong Le
10.1 Introduction
154(1)
10.2 Related Studies
155(1)
10.3 IoT Principles and Applications
156(1)
10.4 Different IoT Domains
157(1)
10.4.1 Autonomous Cars
157(1)
10.4.2 Healthcare
157(1)
10.4.3 Smart Home
158(1)
10.4.4 Industry 4.0
158(1)
10.5 Issues in Fog Computing Regarding Security and Privacy
158(3)
10.5.1 Authentication
159(1)
10.5.2 Trust
160(1)
10.5.3 Attacks
160(1)
10.5.4 End User Privacy
160(1)
10.5.5 Secure Communication between Fog Nodes
161(1)
10.6 Conclusion
161(1)
References
161(6)
Part III Security Designs for Solutions and Applications
11 The Role of Information-Centric Security in the Modern Arena of Information Technology
167(12)
Sushree Bibhuprada
Dac-Nhuong Le
B. Priyadarshini
11.1 Introduction
168(1)
11.2 Complete Solution to Data Security
169(1)
11.2.1 Confidentiality
169(1)
11.2.2 Integrity
169(1)
11.2.3 Availability
170(1)
11.3 Intrusion Detection and Security
170(3)
11.3.1 Divergent Type of Intrusion Detection System
170(2)
11.3.2 Potentiality of Intrusion Detection Systems
172(1)
11.3.3 Advantage of Intrusion Detection Systems
173(1)
11.4 IPS vs. IDS
173(1)
11.5 Relevant Methods to Increase Data Safety
174(1)
11.5.1 Limit Data Access
174(1)
11.5.2 Identification of Sensitive Data
174(1)
11.5.3 Pre-Planned Data Security Policy
175(1)
11.5.4 Strong and Different Passwords for Every Department
175(1)
11.5.5 Regular Data Backup and Update
175(1)
11.6 Conclusion
175(1)
References
176(3)
12 Enabling Mobile Technology for Healthcare Service Improvements
179(12)
Bhumi Dobaria
Chintan Bhatt
12.1 Introduction
180(2)
12.1.1 Healthcare System in India
180(1)
12.1.2 What is mHealth?
180(1)
12.1.3 Worldwide mHealth Scenario
181(1)
12.1.4 mHealth and Its Scope in India
181(1)
12.2 System Design
182(1)
12.2.1 Application Server
183(1)
12.2.2 File System
183(1)
12.2.3 Client
183(1)
12.3 Result Analysis
183(5)
12.4 Conclusion
188(1)
References
189(2)
13 Optimization of Ontology-Based Clinical Pathways and Incorporating Differential Privacy in the Healthcare System
191(16)
Soumya Banerjee
Rachid Benlamri
Samia Bouzefrane
13.1 Introduction
192(2)
13.2 Ontological Structure of Clinical Pathways
194(1)
13.3 Proposed Model
195(7)
13.3.1 Elements of Optimization in CP
196(1)
13.3.2 Functional Model of Differential Privacy
196(3)
13.3.3 About the Data Visualization
199(1)
13.3.4 Validation of Results
199(3)
13.4 Conclusion and Further Scope of Research
202(1)
References
203(4)
14 Advancements and Applications in Fog Computing
207(34)
Sumit Bonsai
Mayank Aggarwal
Himanshu Aggarwal
14.1 Introduction
208(2)
14.1.1 Cloud Computing
208(1)
14.1.2 Internet of Things
208(1)
14.1.3 Fog Computing
209(1)
14.2 Fog Computing Architecture
210(4)
14.2.1 Features of Fog Computing
210(1)
14.2.2 Architecture of Fog Computing
211(1)
14.2.3 Components of Fog Computing
212(2)
14.3 Communication in Fog Computing
214(4)
14.3.1 Communication Steps
214(1)
14.3.2 Discovery and Detection of ICOs
214(1)
14.3.3 Models of Communication
215(1)
14.3.4 Communication Protocols
215(1)
14.3.5 Communication Protocol Requirements
216(1)
14.3.6 Methods of Data Collection
216(2)
14.4 Application or Programming Models
218(3)
14.4.1 Sense-Process-Actuate Model
218(1)
14.4.2 Stream Processing Model
218(1)
14.4.3 Benefits of Fog over Cloud Computing
219(1)
14.4.4 Simulator Tool
220(1)
14.5 Simulation- Based Experiments
221(4)
14.6 Scheduling
225(2)
14.6.1 Classification of Scheduling
225(1)
14.6.2 Need for Scheduling
225(1)
14.6.3 Existing Scheduling Algorithms
226(1)
14.7 Challenges in Fog Computing
227(3)
14.7.1 Connectivity Challenges
227(1)
14.7.2 Context Awareness
227(1)
14.7.3 Data Handling
228(1)
14.7.4 Security
228(1)
14.7.5 Privacy
229(1)
14.7.6 Pluggable Architecture
229(1)
14.7.7 Sustainability
229(1)
14.7.8 Network and Storage
230(1)
14.8 Use Case Scenarios
230(6)
14.8.1 Smart Home
230(2)
14.8.2 Smart Rail
232(1)
14.8.3 Smart Healthcare
233(1)
14.8.4 Smart Agriculture
234(1)
14.8.5 Future Applications
235(1)
14.9 Emerging Trends
236(1)
14.10 Conclusion
236(1)
References
237(4)
15 Taxonomy of Cyber-Physical Social Systems in Intelligent Transportation
241(12)
Dhiraj
Anil Saini
15.1 Introduction
242(1)
15.2 General Overview of CPSS in Intelligent Transportation
243(1)
15.2.1 What is CPS?
243(1)
15.2.2 Transition from CPS to CPSS
243(1)
15.2.3 CPSS in Transportation
244(1)
15.3 Conceptual Framework of CPSS in Transportation
244(4)
15.4 Research Challenges
248(1)
15.5 Discussion and Conclusion
248(1)
References
249(4)
16 Cyberspace for Smart Parenting with Sensors
253
Alok Ranjan Prusty
16.1 Background
254(1)
16.2 Internet of Things
254(3)
16.2.1 Machine to Machine
255(1)
16.2.2 Smart Wearables
255(1)
16.2.3 Smart Parenting
256(1)
16.2.4 Accelerometer Sensor
257(1)
16.2.5 Pulse Sensor
257(1)
16.3 Project
257(2)
16.4 Steps and Working Principle
259(1)
16.5 Result and Analysis
260(2)
16.6 Conclusions
262(1)
References
262
Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedicine. He has more than 50 publications and edited/authored 15 computer science books.

Chintan Bhatt is an Assistant Professor of U & P U Patel Department of Computer Engineering at Charotar University of Science and Technology, India. He completed his PhD in Computer Science in 2019 and his research interests include data mining, software engineering, networking, big data, Internet of Things (IoT), mobile computing.

Mani Madhukar has 15+ years of experience in computer science with exposure to both IT industry and academia and his current position is as Program Manager-University Relations at IBM India Pvt. Ltd. His education background includes a doctorate in Computer Engineering and Executive program in Management from McIntire School of Commerce, University of Virginia, USA. He has worked in various roles across different technologies including blockchain, cloud, data science, IBM Watson and Internet of Things. He represents IBM in various national and international forums as technical expert /panelist on various technologies.