Home > Computing and Information Technology > Computer networking and communications > Client–Server networking > Security Designs for the Cloud, IoT, and Social Networking
36%
Security Designs for the Cloud, IoT, and Social Networking

Security Designs for the Cloud, IoT, and Social Networking

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media.

Table of Contents:
List of Figures xv List of Tables xix Foreword xxi Preface xxiii Acknowledgments xxv Acronyms xxvii Part I Security Designs for the Cloud Network 1 Encryption Algorithm for Data Security in Cloud Computing 3 Anindita Desarkar, Ajanta Das 1.1 Introduction 4 1.2 Related Work 4 1.3 Cloud Computing - A Brief Overview 5 1.3.1 Essential Characteristics 5 1.3.2 Layers of Cloud Computing 6 1.3.3 Cloud Deployment Models 7 1.4 Data Security in Cloud Storage 7 1.4.1 Security Issues in Cloud 7 1.4.2 Symmetric Encryption Algori 8 1.4.3 Asymmetric Encryption Algorithms 12 1.4.4 Security Enhancement in Cloud Using Encryption Algorithms: Observations 15 1.5 Comparison of Encryption Algorithms 16 1.6 Performance Analysis of Encryption Algorithms in Cloud 16 1.7 Conclusion 17 References 17 2 Analysis of Security Issues in Cloud Environment 19 Sushruta Mishra, Nitin Tripathy, Brojo Kishore Mishra, Chandrakanta Mahanty 2.1 An Insight into Cloud Computing 20 2.2 Critical Challenges Concerning Cloud Computing 21 2.2.1 Data Protection 21 2.2.2 Data Recovery and Availability 22 2.2.3 Management Capacities 22 2.2.4 Regulatory and Compliance Restrictions 22 2.3 Basic Models Governing Cloud Computing 22 2.3.1 Cloud Computing Models 23 2.3.2 Security Concerns of Cloud Computing 23 2.4 Security Countermeasures in Cloud Computing 26 2.4.1 Countermeasures for Communication Issues 26 2.4.2 Countermeasures for Architecture Security 26 2.4.3 Countermeasures for Challenges Inherited from Network Concepts 27 2.4.4 Countermeasures for CAS Proposed Threats 28 2.5 Discussion of an Implemented SDN Security Framework 29 2.5.1 System Design 29 2.5.2 Phase 1: User Authentication Phase 30 2.5.3 Phase 2: Controller Assignment Phase 31 2.5.4 Phase 3: Communication Phase 33 2.6 Result Analysis 35 2.6.1 Simulation Environment 35 2.6.2 Analysis of Different Attacks 35 2.6.3 Comparative Analysis 36 2.7 Conclusion 40 References 40 3 Security and Challenges in Mobile Cloud Computing 43 Ankur Dumka, Minakshi Memoria, Alaknanda Ashok 3.1 Introduction 44 3.1.1 Mobile Cloud Computing 44 3.1.2 Internet of Things and Cloud Computing 46 3.2 Literature Review 46 3.3 Architecture of Integration of Mobile Cloud Computing with IoT 46 3.3.1 Infrastructural or Architectural Issues 49 3.3.2 Privacy Issues 52 3.3.3 Compliance Issues 53 3.4 Proposed Preventive Measure for Security in MCC 54 3.5 Conclusion 55 References 55 4 Fog Computing and Its Security Issues 59 Jyotir Moy Chatterjee, Ishaani Priyadarshini, Shankeys, and DacNhuong Le 4.1 Introduction 60 4.2 Current Fog Applications 62 4.2.1 Why Do We Need Fog? 62 4.2.2 What Can We Do with Fog? 63 4.3 Security and Privacy in Fog Computing 66 4.3.1 Trust and Authentication 66 4.3.2 Man-in-the-Middle Attacks (MITM) 66 4.3.3 Network Security 68 4.3.4 Secure Data Storage 69 4.4 Secure and Private Data Computation 69 4.4.1 Privacy 70 4.4.2 Access Control 71 4.4.3 Intrusion Detection 71 4.5 Conclusion 71 References 73 5 Application Safety and Service Vulnerability in Cloud Network 77 Sudipta Sahana, Debabrata Sarddar 5.1 Introduction 78 5.1.1 Introduction to Security Issues in Cloud Service Models 78 5.1.2 Security Issues in SaaS 78 5.1.3 Security Issues in PaaS 79 5.1.4 Security Issues in IaaS 79 5.2 Security Concerns of Cloud Computing 80 5.2.1 Data Breaches 80 5.2.2 Hijacking of Accounts 81 5.2.3 Insider Threat 81 5.2.4 Malware Injection 82 5.2.5 Abuse of Cloud Services 82 5.2.6 Insecure APIs 82 5.2.7 Denial of Service Attacks 83 5.2.8 Insufficient Due Diligence 83 5.2.9 Shared Vulnerabilities 84 5.2.10 Data Loss 84 5.3 Security Tools in Cloud 84 5.3.1 Qualys 85 5.3.2 CipherCloud 85 5.3.3 Okta 86 5.3.4 Skyline Networks 86 5.3.5 Bitglass 86 5.3.6 WhiteHat Security 87 5.3.7 Proofpoint 87 5.3.8 docTrackr 87 5.3.9 Centrify 87 5.3.10 Vaultive 88 5.3.11 Zscaler 88 5.3.12 SilverSky 88 5.4 Cloud Service Vulnerabilities 89 5.4.1 Visibility and Control Reduction at the Consumer End 89 5.4.2 On-Demand SelfService Simplifies Unauthorized Use 89 5.4.3 Web-Based Organization APIs Can Be Compromised 90 5.4.4 Separation among Multi-Tenant Fails 90 5.4.5 Incomplete Data Deletion 90 5.4.6 Stolen Credentials 90 5.4.7 Increased Complexity Strains IT Staff 91 5.4.8 Vendor Lock-In Complicates Moving to Other CSPs 91 5.4.9 Insiders Abuse Authorized Access 91 5.4.10 Stored Data is Lost 92 5.4.11 CSP Supply Chain Can Be Compromised 92 5.4.12 Inadequate Due Diligence Amplifies Cyber Threat 92 5.5 Cloud Computing Security Best Practices 92 5.5.1 Cloud Data Encryption 92 5.5.2 Identity and Access Management 93 5.5.3 Network Segmentation 93 5.5.4 Disaster Recovery 93 5.5.5 Vulnerability Management 93 5.5.6 Monitoring, Altering and Reporting 94 5.6 Conclusion 94 References 94 Part II Security Designs for the Internet of Things and Social Networks 6 IoT Security and Privacy Preservation 99 Bright Keswan, Tarini Ch. Mishra, Ambarish G. Mohapatra, Poonam Keswani 6.1 Introduction 100 6.2 Review of Existing Technology 101 6.3 Research Design 101 6.4 Methodology 103 6.4.1 AWS IoT 103 6.4.2 ARM Mbed IoT 104 6.4.3 Azure IoT Suite 106 6.5 Implication and Findings 106 6.5.1 Ethical 106 6.5.2 Legal 107 6.5.3 Social 107 6.6 Future Scope 108 6.7 Conclusion 108 References 109 7 Automation Movie Recommender System Based on Internet of Things and Clustering 113 Lalit Mohan Goyal, Mamta Mittal, Asheesh Sharma 7.1 Introduction 114 7.2 Background 115 7.2.1 Characteristics of IoT 115 7.2.2 Evolution of IoT 115 7.2.3 Trends in IoT 116 7.2.4 Requirements of IoT 116 7.2.5 IoT Elements 116 7.2.6 Architecture of IoT 117 7.2.7 Application Domain of IoT 117 7.2.8 IoT Technology 119 7.2.9 The Present and Future of IoT 121 7.2.10 IoT Challenges 121 7.2.11 Scope of IoT 122 7.3 Related Works 122 7.4 Proposed System 123 7.5 Implementation 124 7.6 Conclusion 127 References 127 8 Societal Implications of Emerging Technologies (SMAC) and Related Privacy Challenges 129 Manikant Roy, Amar Singh, Sukanta Ghosh, Nisha Sethi 8.1 Introduction to Data Analytics 130 8.1.1 Descriptive Analytics 131 8.1.2 Diagnostic Analytics 131 8.1.3 Prescriptive Analytics 131 8.1.4 Exploratory Analytics 132 8.1.5 Predictive Analytics 133 8.1.6 Mechanistic, Causal and Inferential Analytics 133 8.2 Privacy Concerns Related to Use of Data Analytics 133 8.2.1 Immoral Actions Based on Analyses 133 8.2.2 Discrimination 134 8.2.3 Privacy Breaches 134 8.2.4 Inaccuracy of Data Analytics 134 8.2.5 E-Discovery Angst 134 8.2.6 Understanding Cloud Basics 134 8.3 Issues 137 8.3.1 Challenges 137 8.3.2 Services of Cloud 137 8.4 Social Media 138 8.4.1 Introduction 138 8.4.2 Societal Implication of Social Network 139 8.5 Conclusion 139 References 140 9 Implementation of REST Architecure-Based Energy-Efficient Home Automation System 143 Shankey Garg, Jyotir Moy Chatterjee, Dac-Nhuong Le 9.1 Introduction 144 9.2 Related Work 144 9.3 RESTful Web Server 144 9.4 Why and How REST is More Suitable for IoT 145 9.5 Architecture of Arduino-Based Home Automation System 146 9.6 Implementation Details 146 9.7 Why Arduino? 147 9.8 Result Analysis 147 9.8.1 Power Consumption without Automation 148 9.8.2 Power Consumption with IoT 148 9.8.3 Total Power Consumption Analysis 149 9.9 Conclusion and Future Scope 150 References 151 10 The Vital Role of Fog Computing in Internet of Things 153 Vikram Puri, Jolanda G Tromp, Chung Van Le, Nhu Gia Nguyen, Dac-Nhuong Le 10.1 Introduction 154 10.2 Related Studies 155 10.3 IoT Principles and Applications 156 10.4 Different IoT Domains 157 10.4.1 Autonomous Cars 157 10.4.2 Healthcare 157 10.4.3 Smart Home 158 10.4.4 Industry 4.0 158 10.5 Issues in Fog Computing Regarding Security and Privacy 158 10.5.1 Authentication 159 10.5.2 Trust 160 10.5.3 Attacks 160 10.5.4 End User Privacy 160 10.5.5 Secure Communication between Fog Nodes 161 10.6 Conclusion 161 References 161 Part III Security Designs for Solutions and Applications 11 The Role of Information-Centric Security in the Modern Arena of Information Technology 167 Sushree Bibhuprada, Dac-Nhuong Le, B. Priyadarshini 11.1 Introduction 168 11.2 Complete Solution to Data Security 169 11.2.1 Confidentiality 169 11.2.2 Integrity 169 11.2.3 Availability 170 11.3 Intrusion Detection and Security 170 11.3.1 Divergent Type of Intrusion Detection System 170 11.3.2 Potentiality of Intrusion Detection Systems 172 11.3.3 Advantage of Intrusion Detection Systems 173 11.4 IPS vs. IDS 173 11.5 Relevant Methods to Increase Data Safety 174 11.5.1 Limit Data Access 174 11.5.2 Identification of Sensitive Data 174 11.5.3 Pre-Planned Data Security Policy 175 11.5.4 Strong and Different Passwords for Every Department 175 11.5.5 Regular Data Backup and Update 175 11.6 Conclusion 175 References 176 12 Enabling Mobile Technology for Healthcare Service Improvements 179 Bhumi Dobaria, Chintan Bhatt 12.1 Introduction 180 12.1.1 Healthcare System in India 180 12.1.2 What is mHealth? 180 12.1.3 Worldwide mHealth Scenario 181 12.1.4 mHealth and Its Scope in India 181 12.2 System Design 182 12.2.1 Application Server 183 12.2.2 File System 183 12.2.3 Client 183 12.3 Result Analysis 183 12.4 Conclusion 188 References 189 13 Optimization of Ontology-Based Clinical Pathways and Incorporating Differential Privacy in the Healthcare System 191 Soumya Banerjee, Rachid Benlamri, Samia Bouzefrane 13.1 Introduction 192 13.2 Ontological Structure of Clinical Pathways 194 13.3 Proposed Model 195 13.3.1 Elements of Optimization in CP 196 13.3.2 Functional Model of Differential Privacy 196 13.3.3 About the Data Visualization 199 13.3.4 Validation of Results 199 13.4 Conclusion and Further Scope of Research 202 References 203 14 Advancements and Applications in Fog Computing 207 Sumit Bansal, Mayank Aggarwal, Himanshu Aggarwal 14.1 Introduction 208 14.1.1 Cloud Computing 208 14.1.2 Internet of Things 208 14.1.3 Fog Computing 209 14.2 Fog Computing Architecture 210 14.2.1 Features of Fog Computing 210 14.2.2 Architecture of Fog Computing 211 14.2.3 Components of Fog Computing 212 14.3 Communication in Fog Computing 214 14.3.1 Communication Steps 214 14.3.2 Discovery and Detection of ICOs 214 14.3.3 Models of Communication 215 14.3.4 Communication Protocols 215 14.3.5 Communication Protocol Requirements 216 14.3.6 Methods of Data Collection 216 14.4 Application or Programming Models 218 14.4.1 Sense-Process-Actuate Model 218 14.4.2 Stream Processing Model 218 14.4.3 Benefits of Fog over Cloud Computing 219 14.4.4 Simulator Tool 220 14.5 Simulation-Based Experiments 221 14.6 Scheduling 225 14.6.1 Classification of Scheduling 225 14.6.2 Need for Scheduling 225 14.6.3 Existing Scheduling Algorithms 226 14.7 Challenges in Fog Computing 227 14.7.1 Connectivity Challenges 227 14.7.2 Context Awareness 227 14.7.3 Data Handling 228 14.7.4 Security 228 14.7.5 Privacy 229 14.7.6 Pluggable Architecture 229 14.7.7 Sustainability 229 14.7.8 Network and Storage 230 14.8 Use Case Scenarios 230 14.8.1 Smart Home 230 14.8.2 Smart Rail 232 14.8.3 Smart Healthcare 233 14.8.4 Smart Agriculture 234 14.8.5 Future Applications 235 14.9 Emerging Trends 236 14.10 Conclusion 236 References 237 15 Taxonomy of Cyber-Physical Social Systems in Intelligent Transportation 241 Dhiraj, Anil Saini 15.1 Introduction 242 15.2 General Overview of CPSS in Intelligent Transportation 243 15.2.1 What is CPS? 243 15.2.2 Transition from CPS to CPSS 243 15.2.3 CPSS in Transportation 244 15.3 Conceptual Framework of CPSS in Transportation 244 15.4 Research Challenges 248 15.5 Discussion and Conclusion 248 References 249 16 Cyberspace for Smart Parenting with Sensors 253 Alok Ranjan Prusty 16.1 Background 254 16.2 Internet of Things 254 16.2.1 Machine to Machine 255 16.2.2 Smart Wearables 255 16.2.3 Smart Parenting 256 16.2.4 Accelerometer Sensor 257 16.2.5 Pulse Sensor 257 16.3 Project 257 16.4 Steps and Working Principle 259 16.5 Result and Analysis 260 16.6 Conclusions 262 References 262


Best Sellers


Product Details
  • ISBN-13: 9781119592266
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-Scrivener
  • Height: 10 mm
  • No of Pages: 300
  • Spine Width: 10 mm
  • Width: 10 mm
  • ISBN-10: 1119592267
  • Publisher Date: 11 Oct 2019
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Weight: 454 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Security Designs for the Cloud, IoT, and Social Networking
John Wiley & Sons Inc -
Security Designs for the Cloud, IoT, and Social Networking
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security Designs for the Cloud, IoT, and Social Networking

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA