Buy Security Designs for the Cloud, IoT, and Social Networking
close menu
Bookswagon
search
My Account
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Client–Server networking > Security Designs for the Cloud, IoT, and Social Networking
Security Designs for the Cloud, IoT, and Social Networking

Security Designs for the Cloud, IoT, and Social Networking


     0     
5
4
3
2
1



Available


X
About the Book

The book provides cutting-edge research that delivers insights into the tools, opportunities, novel strategies, techniques, and challenges for handling security issues in cloud computing, Internet of Things and social networking.

Due to the rapid growth of all kinds of devices currently being controlled over the Internet, the various products come with security issues. This book examines these issues and vulnerabilities inherent in the products and what can be done to solve them by investigating their roots. Programming and attention to good security practices can combat these problems, which is a result of the lax security processes of the Internet of Things, cloud computing and social media.

The 16 chapters are divided into three groups. Part 1 is on Security Designs for the Cloud Network; Part 2 focuses on Security Designs for the Internet of Things and Social Networks; while the concluding Part looks at Security Designs for Solutions and Applications. Collectively, the chapters

  • Help researchers and practitioners understand the security architectures in IoT and cloud ecosystems, as well as the state-of-the-art in social media security countermeasures
  • Explore how the threats in IoT are different from traditional networks
  • Provide a comprehensive discussion on the security challenges and solutions in IoT, cloud and social media.


Table of Contents:

List of Figures xv
List of Tables xix
Foreword xxi
Preface xxiii
Acknowledgments xxv
Acronyms xxvii

Part I Security Designs for the Cloud Network

1 Encryption Algorithm for Data Security in Cloud Computing 3
Anindita Desarkar, Ajanta Das

1.1 Introduction 4
1.2 Related Work 4
1.3 Cloud Computing - A Brief Overview 5
1.4 Data Security in Cloud Storage 7
1.5 Comparison of Encryption Algorithms 16
1.6 Performance Analysis of Encryption Algorithms in Cloud 16
1.7 Conclusion 17

2 Analysis of Security Issues in Cloud Environment 19
Sushruta Mishra, Nitin Tripathy, Brojo Kishore Mishra, Chandrakanta Mahanty

2.1 An Insight into Cloud Computing 20
2.2 Critical Challenges Concerning Cloud Computing 21
2.3 Basic Models Governing Cloud Computing 22
2.4 Security Countermeasures in Cloud Computing 26
2.5 Discussion of an Implemented SDN Security Framework 29
2.6 Result Analysis 35
2.7 Conclusion 40

3 Security and Challenges in Mobile Cloud Computing 43
Ankur Dumka, Minakshi Memoria, Alaknanda Ashok

3.1 Introduction 44
3.2 Literature Review 46
3.3 Architecture of Integration of Mobile Cloud Computing with IoT 46
3.4 Proposed Preventive Measure for Security in MCC 54
3.5 Conclusion 55

4 Fog Computing and Its Security Issues 59
Jyotir Moy Chatterjee, Ishaani Priyadarshini, Shankeys, and DacNhuong Le

4.1 Introduction 60
4.2 Current Fog Applications 62
4.3 Security and Privacy in Fog Computing 66
4.4 Secure and Private Data Computation 69
4.5 Conclusion 71

5 Application Safety and Service Vulnerability in Cloud Network 77
Sudipta Sahana, Debabrata Sarddar

5.1 Introduction 78
5.2 Security Concerns of Cloud Computing 80
5.3 Security Tools in Cloud 84
5.4 Cloud Service Vulnerabilities 89
5.5 Cloud Computing Security Best Practices 92
5.6 Conclusion 94

Part II Security Designs for the Internet of Things and Social Networks

6 IoT Security and Privacy Preservation 99
Bright Keswan, Tarini Ch. Mishra, Ambarish G. Mohapatra, Poonam Keswani

6.1 Introduction 100
6.2 Review of Existing Technology 101
6.3 Research Design 101
6.4 Methodology 103
6.5 Implication and Findings 106
6.6 Future Scope 108
6.7 Conclusion 108

7 Automation Movie Recommender System Based on Internet of Things and Clustering 113
Lalit Mohan Goyal, Mamta Mittal, Asheesh Sharma

7.1 Introduction 114
7.2 Background 115
7.3 Related Works 122
7.4 Proposed System 123
7.5 Implementation 124
7.6 Conclusion 127

8 Societal Implications of Emerging Technologies (SMAC) and Related Privacy Challenges 129
Manikant Roy, Amar Singh, Sukanta Ghosh, Nisha Sethi

8.1 Introduction to Data Analytics 130
8.2 Privacy Concerns Related to Use of Data Analytics 133
8.3 Issues 137
8.4 Social Media 138
8.5 Conclusion 139

9 Implementation of REST Architecure-Based Energy-Efficient Home Automation System 143
Shankey Garg, Jyotir Moy Chatterjee, Dac-Nhuong Le

9.1 Introduction 144
9.2 Related Work 144
9.3 RESTful Web Server 144
9.4 Why and How REST is More Suitable for IoT 145
9.5 Architecture of Arduino-Based Home Automation System 146
9.6 Implementation Details 146
9.7 Why Arduino? 147
9.8 Result Analysis 147
9.9 Conclusion and Future Scope 150

10 The Vital Role of Fog Computing in Internet of Things 153
Vikram Puri, Jolanda G Tromp, Chung Van Le, Nhu Gia Nguyen, Dac-Nhuong Le

10.1 Introduction 154
10.2 Related Studies 155
10.3 IoT Principles and Applications 156
10.4 Different IoT Domains 157
10.5 Issues in Fog Computing Regarding Security and Privacy 158
10.6 Conclusion 161

Part III Security Designs for Solutions and Applications

11 The Role of Information-Centric Security in the Modern Arena of Information Technology 167
Sushree Bibhuprada, Dac-Nhuong Le, B. Priyadarshini

11.1 Introduction 168
11.2 Complete Solution to Data Security 169
11.3 Intrusion Detection and Security 170
11.4 IPS vs. IDS 173
11.5 Relevant Methods to Increase Data Safety 174
11.6 Conclusion 175

12 Enabling Mobile Technology for Healthcare Service Improvements 179
Bhumi Dobaria, Chintan Bhatt

12.1 Introduction 180
12.2 System Design 182
12.3 Result Analysis 183
12.4 Conclusion 188

13 Optimization of Ontology-Based Clinical Pathways and Incorporating Differential Privacy in the Healthcare System 191
Soumya Banerjee, Rachid Benlamri, Samia Bouzefrane

13.1 Introduction 192
13.2 Ontological Structure of Clinical Pathways 194
13.3 Proposed Model 195
13.4 Conclusion and Further Scope of Research 202

14 Advancements and Applications in Fog Computing 207
Sumit Bansal, Mayank Aggarwal, Himanshu Aggarwal

14.1 Introduction 208
14.2 Fog Computing Architecture 210
14.3 Communication in Fog Computing 214
14.4 Application or Programming Models 218
14.5 Simulation-Based Experiments 221
14.6 Scheduling 225
14.7 Challenges in Fog Computing 227
14.8 Use Case Scenarios 230
14.9 Emerging Trends 236
14.10 Conclusion 236

15 Taxonomy of Cyber-Physical Social Systems in Intelligent Transportation 241
Dhiraj, Anil Saini

15.1 Introduction 242
15.2 General Overview of CPSS in Intelligent Transportation 243
15.3 Conceptual Framework of CPSS in Transportation 244
15.4 Research Challenges 248
15.5 Discussion and Conclusion 248

16 Cyberspace for Smart Parenting with Sensors 253
Alok Ranjan Prusty

16.1 Background 254
16.2 Internet of Things 254
16.3 Project 257
16.4 Steps and Working Principle 259
16.5 Result and Analysis 260
16.6 Conclusions 262

References 262



About the Author :

Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedicine. He has more than 50 publications and edited/authored 15 computer science books.

Chintan Bhatt is an Assistant Professor of U & P U Patel Department of Computer Engineering at Charotar University of Science and Technology, India. He completed his PhD in Computer Science in 2019 and his research interests include data mining, software engineering, networking, big data, Internet of Things (IoT), mobile computing.

Mani Madhukar has 15+ years of experience in computer science with exposure to both IT industry and academia and his current position is as Program Manager-University Relations at IBM India Pvt. Ltd. His education background includes a doctorate in Computer Engineering and Executive program in Management from McIntire School of Commerce, University of Virginia, USA. He has worked in various roles across different technologies including blockchain, cloud, data science, IBM Watson and Internet of Things. He represents IBM in various national and international forums as technical expert /panelist on various technologies.


Best Sellers


Product Details
  • ISBN-13: 9781119592266
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-Scrivener
  • Height: 10 mm
  • No of Pages: 300
  • Returnable: N
  • Weight: 454 gr
  • ISBN-10: 1119592267
  • Publisher Date: 11 Oct 2019
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 10 mm
  • Width: 10 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Security Designs for the Cloud, IoT, and Social Networking
John Wiley & Sons Inc -
Security Designs for the Cloud, IoT, and Social Networking
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security Designs for the Cloud, IoT, and Social Networking

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    Hello, User