The book provides cutting-edge research that delivers insights into the tools, opportunities, novel strategies, techniques, and challenges for handling security issues in cloud computing, Internet of Things and social networking.
Due to the rapid growth of all kinds of devices currently being controlled over the Internet, the various products come with security issues. This book examines these issues and vulnerabilities inherent in the products and what can be done to solve them by investigating their roots. Programming and attention to good security practices can combat these problems, which is a result of the lax security processes of the Internet of Things, cloud computing and social media.
The 16 chapters are divided into three groups. Part 1 is on Security Designs for the Cloud Network; Part 2 focuses on Security Designs for the Internet of Things and Social Networks; while the concluding Part looks at Security Designs for Solutions and Applications. Collectively, the chapters
- Help researchers and practitioners understand the security architectures in IoT and cloud ecosystems, as well as the state-of-the-art in social media security countermeasures
- Explore how the threats in IoT are different from traditional networks
- Provide a comprehensive discussion on the security challenges and solutions in IoT, cloud and social media.
Table of Contents:
List of Figures xv
List of Tables xix
Foreword xxi
Preface xxiii
Acknowledgments xxv
Acronyms xxvii
Part I Security Designs for the Cloud Network
1 Encryption Algorithm for Data Security in Cloud Computing 3
Anindita Desarkar, Ajanta Das
1.1 Introduction 4
1.2 Related Work 4
1.3 Cloud Computing - A Brief Overview 5
1.4 Data Security in Cloud Storage 7
1.5 Comparison of Encryption Algorithms 16
1.6 Performance Analysis of Encryption Algorithms in Cloud 16
1.7 Conclusion 17
2 Analysis of Security Issues in Cloud Environment 19
Sushruta Mishra, Nitin Tripathy, Brojo Kishore Mishra, Chandrakanta Mahanty
2.1 An Insight into Cloud Computing 20
2.2 Critical Challenges Concerning Cloud Computing 21
2.3 Basic Models Governing Cloud Computing 22
2.4 Security Countermeasures in Cloud Computing 26
2.5 Discussion of an Implemented SDN Security Framework 29
2.6 Result Analysis 35
2.7 Conclusion 40
3 Security and Challenges in Mobile Cloud Computing 43
Ankur Dumka, Minakshi Memoria, Alaknanda Ashok
3.1 Introduction 44
3.2 Literature Review 46
3.3 Architecture of Integration of Mobile Cloud Computing with IoT 46
3.4 Proposed Preventive Measure for Security in MCC 54
3.5 Conclusion 55
4 Fog Computing and Its Security Issues 59
Jyotir Moy Chatterjee, Ishaani Priyadarshini, Shankeys, and DacNhuong Le
4.1 Introduction 60
4.2 Current Fog Applications 62
4.3 Security and Privacy in Fog Computing 66
4.4 Secure and Private Data Computation 69
4.5 Conclusion 71
5 Application Safety and Service Vulnerability in Cloud Network 77
Sudipta Sahana, Debabrata Sarddar
5.1 Introduction 78
5.2 Security Concerns of Cloud Computing 80
5.3 Security Tools in Cloud 84
5.4 Cloud Service Vulnerabilities 89
5.5 Cloud Computing Security Best Practices 92
5.6 Conclusion 94
Part II Security Designs for the Internet of Things and Social Networks
6 IoT Security and Privacy Preservation 99
Bright Keswan, Tarini Ch. Mishra, Ambarish G. Mohapatra, Poonam Keswani
6.1 Introduction 100
6.2 Review of Existing Technology 101
6.3 Research Design 101
6.4 Methodology 103
6.5 Implication and Findings 106
6.6 Future Scope 108
6.7 Conclusion 108
7 Automation Movie Recommender System Based on Internet of Things and Clustering 113
Lalit Mohan Goyal, Mamta Mittal, Asheesh Sharma
7.1 Introduction 114
7.2 Background 115
7.3 Related Works 122
7.4 Proposed System 123
7.5 Implementation 124
7.6 Conclusion 127
8 Societal Implications of Emerging Technologies (SMAC) and Related Privacy Challenges 129
Manikant Roy, Amar Singh, Sukanta Ghosh, Nisha Sethi
8.1 Introduction to Data Analytics 130
8.2 Privacy Concerns Related to Use of Data Analytics 133
8.3 Issues 137
8.4 Social Media 138
8.5 Conclusion 139
9 Implementation of REST Architecure-Based Energy-Efficient Home Automation System 143
Shankey Garg, Jyotir Moy Chatterjee, Dac-Nhuong Le
9.1 Introduction 144
9.2 Related Work 144
9.3 RESTful Web Server 144
9.4 Why and How REST is More Suitable for IoT 145
9.5 Architecture of Arduino-Based Home Automation System 146
9.6 Implementation Details 146
9.7 Why Arduino? 147
9.8 Result Analysis 147
9.9 Conclusion and Future Scope 150
10 The Vital Role of Fog Computing in Internet of Things 153
Vikram Puri, Jolanda G Tromp, Chung Van Le, Nhu Gia Nguyen, Dac-Nhuong Le
10.1 Introduction 154
10.2 Related Studies 155
10.3 IoT Principles and Applications 156
10.4 Different IoT Domains 157
10.5 Issues in Fog Computing Regarding Security and Privacy 158
10.6 Conclusion 161
Part III Security Designs for Solutions and Applications
11 The Role of Information-Centric Security in the Modern Arena of Information Technology 167
Sushree Bibhuprada, Dac-Nhuong Le, B. Priyadarshini
11.1 Introduction 168
11.2 Complete Solution to Data Security 169
11.3 Intrusion Detection and Security 170
11.4 IPS vs. IDS 173
11.5 Relevant Methods to Increase Data Safety 174
11.6 Conclusion 175
12 Enabling Mobile Technology for Healthcare Service Improvements 179
Bhumi Dobaria, Chintan Bhatt
12.1 Introduction 180
12.2 System Design 182
12.3 Result Analysis 183
12.4 Conclusion 188
13 Optimization of Ontology-Based Clinical Pathways and Incorporating Differential Privacy in the Healthcare System 191
Soumya Banerjee, Rachid Benlamri, Samia Bouzefrane
13.1 Introduction 192
13.2 Ontological Structure of Clinical Pathways 194
13.3 Proposed Model 195
13.4 Conclusion and Further Scope of Research 202
14 Advancements and Applications in Fog Computing 207
Sumit Bansal, Mayank Aggarwal, Himanshu Aggarwal
14.1 Introduction 208
14.2 Fog Computing Architecture 210
14.3 Communication in Fog Computing 214
14.4 Application or Programming Models 218
14.5 Simulation-Based Experiments 221
14.6 Scheduling 225
14.7 Challenges in Fog Computing 227
14.8 Use Case Scenarios 230
14.9 Emerging Trends 236
14.10 Conclusion 236
15 Taxonomy of Cyber-Physical Social Systems in Intelligent Transportation 241
Dhiraj, Anil Saini
15.1 Introduction 242
15.2 General Overview of CPSS in Intelligent Transportation 243
15.3 Conceptual Framework of CPSS in Transportation 244
15.4 Research Challenges 248
15.5 Discussion and Conclusion 248
16 Cyberspace for Smart Parenting with Sensors 253
Alok Ranjan Prusty
16.1 Background 254
16.2 Internet of Things 254
16.3 Project 257
16.4 Steps and Working Principle 259
16.5 Result and Analysis 260
16.6 Conclusions 262
References 262
About the Author :
Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedicine. He has more than 50 publications and edited/authored 15 computer science books.
Chintan Bhatt is an Assistant Professor of U & P U Patel Department of Computer Engineering at Charotar University of Science and Technology, India. He completed his PhD in Computer Science in 2019 and his research interests include data mining, software engineering, networking, big data, Internet of Things (IoT), mobile computing.
Mani Madhukar has 15+ years of experience in computer science with exposure to both IT industry and academia and his current position is as Program Manager-University Relations at IBM India Pvt. Ltd. His education background includes a doctorate in Computer Engineering and Executive program in Management from McIntire School of Commerce, University of Virginia, USA. He has worked in various roles across different technologies including blockchain, cloud, data science, IBM Watson and Internet of Things. He represents IBM in various national and international forums as technical expert /panelist on various technologies.