Conference Paper

A Novel Privacy and Security Framework for the Cloud Network Services

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... The secure cloud integration with information and communication technologies (ICT) may get an interestingly imperative role in establishing links among servers of the clouds available at various locations and vehicle users to further improve accident deterrence in distributive environments [10,11]. To keep away from these serious problems, the creators have presented a justifiable verification policy to scrutinize the implementation of cloud administering methods [12]. ...
... To access the data/information of highly secured cloud-IoT integrated servers, it is most important that every client/ regulator in the cloud computing network is safe and aware of types of forthcoming threats. In the denial of service (DoS) attacks [12] one or many machines attack a sufferer machine in a cloud-IoT integrated environment and attempt to stop the sufferer machine from performing functional tasks. In general terms, it can be said that the DoS attacks can be traced by a thorough analysis of the behavior of sufferer's communication networks. ...
... These types of communication systems enclose an amendment digit which can reveal to the concerned authorities that how many times the persons of accidental vehicles have tried to communicate with emergency service provider agencies for getting immediate help. The true association between the control center of IRTMCCS and each vehicle are designed by providing VLAN based traffic control and management system where every association can underpin the neighboring virtual LAN to allow the means of transportation to tag a lesser amount of virtual LAN traffic between various units of the IRTMCCS [7,12,42]. ...
Chapter
Full-text available
In the existing age of computations and research, the cloud-IoT (internet of things) integrated distributive computing is being broadly used for performing information/data computation and transmission services. In view of the fact that the implementation of cloud-IoT integrated communication and computing services have safety and security-related serious concerns. Therefore, in this chapter, the authors have presented verification and validation entrails for evaluating the transmutation-based usefulness of cloud data/services. The authors believe that this technique can realize the idea of defenselessness evaluation and permeation testing in a further improved way. The described technique of this study work contains information on widespread threats to cloud-IoT integrated services e.g. SaaS (Software as a service), IaaS (Information as a Service), and PaaS (Platform as a Service). These services need to be provided to the cloud-IoT customers. The ideas originated in this chapter are to utilize Internetworked Communication Technology (IwCT), IoT, and Embedded Computing Technology (ECT) for further enhancing the overall performance of safe cloud-based information/data transfer services.In this chapter, the authors have described innovative and safe cloud-IoT integrated communication and computing services to further enhance the recital of cloud-IoT integrated communication and processing systems. Here, better-quality internetworked communication machineries based on Internet Protocol-Wireless Sensor Network (IP-WSN), web computing, and sprinkled scheme architectures are being used for improving the effectiveness of cloud-IoT integrated distributive data/information communication and control systems. The cloud-IoT integrated server of described IRTMCCS (Intelligent Road Transport Management and Communication Control & System) will unquestionably offer control and access mechanisms for several types of vehicles on roads/highways and the described IRTMCCS will be very much useful in further improving the safety of drivers and other traveling passengers.KeywordsCloud-IoT-integrated ComputingDistributive ComputingEmbedded Computing TechnologiesSecure CloudTransportation Services
... When in doubt, the assurance is a joint trustworthiness of the web customer and web server as the records well being and secrecy issue trick genuine trepidation (Plummer et al. 2009;Singh et al. 2015a). To stay away from these critical issues, the creator's present a legitimate and idiot proof confirmation strategy to inspect the execution of pulling administrations (Singh et al. 2015b). The explanation in web compute merges amenity safety, amenity supervision, and observes of resources. ...
... To reach the highest level of secure cloud server, it is important that every client (controller) in the cloud network is secure and aware. IETF defines the denial of service attack (DoS) (Singh et al. 2015b) in which one or more machines attack a victim and try to prevent the victim from doing useful work. In general, DoS attacks can be detected by analyzing the characteristics of the victim's network. ...
... The two associations between the system center and every conveyance switch are designed as connections to have VLAN traffic. Here, every association underpins the local VLAN to permit the vehicle of label less VLAN traffic over the system, between various sections (Miller 2008;Singh et al. 2015b;Caballero et al. 2007). ...
Chapter
Full-text available
In the recent era cloud computing is being extensively used for numerous services. Since, adoption has security concerns. Therefore, this research work presents attestation innards to evaluate the metamorphosis utility of mobile and electronic health data transmission through cloud network and it better comprehends the idea of infiltration trialing and susceptibility assessment. The proposed approach of this research work contains information on common threats to cloud based mobile health services and their corresponding solutions. The idea of this research work is to utilize Internet Communication Technology (ICT), Internet of Things (IoT) and Embedded Computing Technology (ECT) to enhance the performance of secure cloud (SecC) based m-health data transmission services. In this research work the author has explored a new and secure cloud based service which can upgrade the concert of cloud based m-health transmission systems. Here, an advanced internet communication machinery (ICM) based on IP-WSN (Internet Protocol-Wireless Sensor Network), scattered scheme architectures, web-computing, wisdom and motivation is used for enhancing the performance of cloud based m-health data communication systems. The cloud server of proposed m-health system will also provide access and control mechanism for multiple types of vehicles on roads and hence the proposed system will be helpful in enhancing the safety of passengers while they are travelling from their houses to the e-health hospitals. The services and safety of cloud based m-health data transmission services can be optimized in real-time situations. Keywords Cloud computing e-health Embedded computing technology Internet communication technology m-health data transmission services Secure cloud 7.
... Singh et. al. [6] believe that Cloud security, availability and performance are recognized as the biggest problems for Cloud adoption [6]. Furthermore, Singh et. ...
... Singh et. al. [6] believe that Cloud security, availability and performance are recognized as the biggest problems for Cloud adoption [6]. Furthermore, Singh et. ...
... Furthermore, Singh et. al. [6] have further concern over the reporting structure of the incident of security and privacy violations in the Cloud computing. Therefore, ensuring data security and the privacy of the users' data on the Cloud is a critical factor that needs to be considered for the increasing use of the Cloud [7]. ...
Conference Paper
Cloud services have gained popularity due to the number of advantages they provide to organizations and individuals such as reduced cost, better storage, and improved performance. However, a lot of organizations are still not willing to shift their traditional in-house services to the Cloud due to the various security implications. Many Cloud service users are worried about the security of their data and privacy being violated. There are many reported cases of Cloud service providers illegally collecting personal data of their customers, which has led to service providers being viewed with greater suspicion than before. To overcome this, Cloud service providers must ensure that they inform the users exactly about which data is being used and how it is used.
... Singh et. al. [6] believe that Cloud security, availability and performance are recognized as the biggest problems for Cloud adoption [6]. Furthermore, Singh et. ...
... Singh et. al. [6] believe that Cloud security, availability and performance are recognized as the biggest problems for Cloud adoption [6]. Furthermore, Singh et. ...
... Furthermore, Singh et. al. [6] have further concern over the reporting structure of the incident of security and privacy violations in the Cloud computing. Therefore, ensuring data security and the privacy of the users' data on the Cloud is a critical factor that needs to be considered for the increasing use of the Cloud [7]. ...
... The specific wastes that cannot be used by waste-treatment plants may be disposed of in much smarter and safer ways. The waste-management plants should follow the guidelines of green computing [38,39]. The overall problems of a smart city and its connectedness can be represented by Fig. 8.2 [40,41]. ...
... The described system may work as an intelligent platform that is equipped with deep machine learning techniques for the persons living in smart city societies. After combining data obtained from different domains of smart cities, it can be said that [37][38][39][40] the described architectural model of Fig. 8.3 will assist the smart city societies in managing their day-to-day activities in an intelligent way e.g. the smart fridge may send alerts and warnings for purchasing household food-related items, the smart television, may send information related to its recharge dates and channels to be subscribed for the next coming months. The described architectural model of Fig. 8.3 may assist the drivers in selecting another route in traffic jams-like situations. ...
... The specific wastes that cannot be used by waste-treatment plants may be disposed of in much smarter and safer ways. The waste-management plants should follow the guidelines of green computing [38,39]. The overall problems of a smart city and its connectedness can be represented by Fig. 8.2 [40,41]. ...
... The described system may work as an intelligent platform that is equipped with deep machine learning techniques for the persons living in smart city societies. After combining data obtained from different domains of smart cities, it can be said that [37][38][39][40] the described architectural model of Fig. 8.3 will assist the smart city societies in managing their day-to-day activities in an intelligent way e.g. the smart fridge may send alerts and warnings for purchasing household food-related items, the smart television, may send information related to its recharge dates and channels to be subscribed for the next coming months. The described architectural model of Fig. 8.3 may assist the drivers in selecting another route in traffic jams-like situations. ...
Chapter
Full-text available
While the definition of a smart city is still evolving in the current era of the twenty-first century, a few things have become very clear that the use of information and communication technologies (ICT) can enhance service levels, citizen well-being, sustainability, and eco-friendly economic developments. Hence, the life quality of smart city societies can be further improved where the people can live a stress-less life. But, it is another unfortunate truth that the urban population is growing rapidly at an enormous speed. This rapid growth of population in urban cities may lead to the exponential increase of pressure in the day-today life of urban people. Therefore, there is a serious need of thinking about developing smart cities and the corresponding societies where technologies will assist the people of urban societies in improving the quality of life by providing a stress-less and eco-friendly working and living environment. In this article, the authors have described the hardware, software, and other technological requirements needed for developing a smart city and the corresponding society. The intellectuals and technocrats have more responsibility to contribute towards the development of better and further advanced technologies that can enhance the life quality of smart city societies. In this chapter, the authors have described how we can use cloud-IoT and intelligent machine learning technologies to improve the overall life quality of smart cities and the corresponding societies using cloud-IoT integrated machine learning technologies. We have taken certain basic facilities like traffic management, accident prevention, accident death minimization , city crowd management, stadium crowd management, vehicle parking management , video surveillance, and waste management activities of smart city societies. Further, the authors have tried to find how these mentioned things can be managed and controlled using cloud-IoT integrated technologies.
... 2, current accident scenario, once an accident happens, it have very high chance that sequence accident can happen and accident information reaches late and the required services are not given in time, especially in icy, and foggy weather. In our proposal, we have proposed blockchain based information sharing with required services involving vehicles in accident zones vicinity [8]. As we know nowadays, a lot of researchers are working on vehicular communication environment with blockchain technology. ...
... Intelligent Vehicle Trust Point (IVTP) access methods[8]. ...
... Giannakouris and Smihily [5] found that 49% of European organizations using Cloud services are only using the very basic services of email and data storage functionalities, and 57% of European organizations ranked the security breach as the main reason to prevent them from adopting Cloud services [5]. Singh et al. [6] believe that Cloud security, availability and performance are recognized as the biggest problems for Cloud adoption. Furthermore, Singh et al. [6] have further concern over the reporting structure of the incident of security and privacy violations in the Cloud computing. ...
... Singh et al. [6] believe that Cloud security, availability and performance are recognized as the biggest problems for Cloud adoption. Furthermore, Singh et al. [6] have further concern over the reporting structure of the incident of security and privacy violations in the Cloud computing. Therefore, ensuring data security and the privacy of the users' data on the Cloud is a critical factor that needs to be considered for the increasing use of the Cloud. ...
... The communication due to centralize systems is not transparent and could not be secure. 4 As security is concerned, the amount of data exchange and the requirement of memory and power is also increased. There must be some ways to prevent malicious behavior by accessing reliable sources with the help of consensus mechanisms. ...
Article
A decentralized application runs on the blockchain network without the intervention of a central authority. Transparency in transactions and security in vehicular networks are the issues for central systems. The proposed system uses blockchain-based smart contracts, which eliminate the requirement for any third-party verification. Additionally, with signature verification and reduced overhead, smart contracts also help in a fast and secure transaction. This study suggests a trust-based system paradigm where certificate authority (CA) is employed for vehicle registration. We also propose a blockchain-based system that provides efficient two-way authentication and key agreement through encryption and digital signatures. The analysis of the proposed model reveals that it is an efficient way of establishing distributed trust management, which helps in preserving vehicle privacy. The proposed scheme is tested in Automated Validation of Internet Security-sensitive Protocols (AVISPA), and security parameters verification in Network Simulator 2(NS2) also shows that the proposed scheme is more effective in comparison with existing schemes in terms of authentication cost, storage cost, and overhead.
... During the experiments it was observed that the RFDT (random forest decision tree) model gives best performance best performance in terms of precision, accuracy, and recall values. But, it was observed by the author during experiments that the random forest method suffers from the problem of tree-over-fitting in memory for the specific cases of sudden data increase/large data size which can be considered as the future research scope of this paper [47,48]. ...
Article
Full-text available
The credit/debit card deceit detection is an enormously difficult task. However, it is a well known problem of our cloud based mobile internet society and it must be solved by technocrats in the welfare of societal mental harassments. The main problem in executing credit/debit card fraud detection technique is the availability of limited amount of fraud related data like transaction amount, transaction date, transaction time, address, and vendor category code related to the frauds. It is the truth of mobile internet world that there are billions of potential places and e-commerce websites where a credit/debit card can be used by fraudulent people for online transactions and payments which make it exceedingly thorny to trace the pattern of frauds. Moreover, the problem of fraud detection in cloud— Internet of Things (IoT) based smart societies has numerous constraints like continuous change in the behavior of normal and fraudulent persons, the fraudulent people try to develop and use new method for executing frauds, and very little availability of frauds related bench mark data sets. In this research article, the authors have presented logistic regression based k-fold machine learning technique (MLT) for fraud detection and prevention in cloud-IoT based smart societal environment. The k-fold method creates multiple folds of bank transactions related data before implementing logistic regression and MLT. The logistic regression performs logic based regression analysis and the intelligent machine learning approach performs registration, classification, clustering, dimensionality reduction, deep learning, training, and reinforcement learning steps on the received bank transactions data. The implementation of proposed methodology and its further analysis using intelligent machine learning tools like ROC (Receiver Operating Characteristic) curve, confusion matrix, mean-recall score value, and precision recall curves for European banks day-to-day transactions related bench mark data set reveal that the proposed methodology is efficient, accurate, and reliable for detecting frauds in cloud-IoT based smart societal environment.
... The finishing stage is to thin the veins' images using described thinning algorithms in m-health environment. Figure 9 shows the resultant veins' images obtained for S 1 , S 2 , S 3 , and S 4 after implementing the thinning techniques in the cloud IoT-based m-health environment (Mishra, 2016;Suhaimi, 2018;Singh et al., 2015). ...
Chapter
Full-text available
In this chapter, the authors have described the experimental analysis steps required for converting original veins images into thinned veins images by applying resample, segmentation, filtering, and thinning algorithms in the cloud IoT-based m-health environments. It is a little bit difficult to make a distinction between the vein pattern and the surroundings particularly in the cases of unclear and thin veins images. However, after applying the resample, segmentation, median filters, and thinning algorithms in the cloud IoT-based m-health environment, the superior quality veins image patterns of a single line are obtained. PERFORMANCE EVALUATION OF HARDWARE DESIGNS IN m-HEALTH ENVIRONMENT After completing the hardware design of veins' image enhancement and feature extraction algorithms, the performance of the developed system must be evaluated in cloud and IoT based m-health environment using standard tools and technologies. The algorithms and methodologies are simulated for
... Current ITS implementations use a wide range of networking technologies such as DSRC, WAVE, cellular networks and cloud networks [3]. These do not guarantee secure data transmission [4] and usually have centralized architectures. Moreover, they have low degree of security for authenticating and revoking vehicle registration which are two vital VANET security aspects [5]. ...
Conference Paper
Full-text available
The development of Internet of Things (IoT) has paved way for the Internet of Vehicles (IoV) and intelligent transportation systems (ITS). Vehicular ad-hoc networks (VANETs) are indispensable for ITS with intelligent vehicles (IV) as their key players. To ensure proper and reliable VANET operation, IVs need secure inter-and intra-network communication with trust and reliability of data (provenance). This paper aims to provide trust management in VANETs by proposing a trustless system model using blockchain and a certificate authority (CA) for registering IVs as well as revoking their registration if need be. Furthermore, to preserve data reliability, this paper uses physical unclonable functions (PUFs). Implementation of DrivMan shows that it is able to establish distributed trust management and enables secure data sharing while preserving the privacy of IVs. Index Terms-intelligent transportation system (ITS), blockchain, smart contract, vehicular ad-hoc network (VANET), certificate authority (CA), physical unclonable function (PUF).
... The system is presented within a human level in a trusted environment, but there are risks from attackers who abuse the trusted environment and shutdown the system such as hi-jack attack [8]. Irish …etc designed a novel framework for the cloud using CCMP "(Counter with Cipher Block Message Authentication Code Protocol" for secure data storage and management in cloud service [9]. ...
Article
Full-text available
Abstract—Cloud computing is a power full platform to deliver applications over the internet or a private network. It considers the next technology in data manipulating and retrieving. These technologies help to manage and manipulate data in various services and deployment models. The cloud services are delivered from cloud computing providers to the users in a manner of leased service which give users an ability to lease services in a specific scope. To handle the huge data in today’s scenario, data cloud storages is suggested which gives a big relief for users as in local machines. Data protection is one of the most important issues in cloud computing. The researchers present many techniques, for data protection and security schemes such as Intrusion Detection Systems (IDS’s), Access Control, Encryption and Secure Socket Layer (SSL), but the data security is still a challenging issue. The goal of this paper is to present the security techniques for cloud computing in different cloud services model. Furthermore, we propose a security data encryption technique for cloud services in SaaS model for large data scale. Salesforce.com SaaS service model provides a good tool for the users to register in the cloud and develop their applications.
... Intelligent Vehicles specially communicate with or with in vehicles in three manners such as In-vehicles communication, vehicle to infrastructure (anything) [1] and vehicle-to-vehicle [2]. Fig. 1 shows security issues in the all three methods of communication viz In-Vehicle (Intelligent Vehicles communications within vehicles), V2X and V2V (Intelligent Vehicles communications with Infrastructure and Vehicles respectively) [3]. ...
... Current ITS system uses ad-hoc networks for Vehicle communication such as DSRC, WAVE, Cellular Network and Cloud Networks [1], which does not guarantee secure data transmission [2]. Currently, vehicle communication application security protocols are based on cellular and IT standard security mechanism which are not up-to-date and suitable for ITS applications. ...
... Two-way Communication: The idea of distribution, scalability, and mobility with communication and security are becoming attractive opportunities for CPSS systems. To extend the facilities of CPSS to scalable nature we could use cloud applications as-well-as fog computing [11]. We know that any standard solutions of IoV based systems use cloud based on your demands. ...
Conference Paper
—Internet of Vehicle (IoV) is an essential part of the Intelligent Transportation system (ITS) which is growing exponentially in the automotive industry domain. The term IoV is used in this paper for Internet of Vehicles. IoV is conceptualized for sharing traffic, safety and several other vehicle-related information between vehicles and end user. In recent years, the number of connected vehicles has increased allover the world. Having information sharing and connectivity as its advantage, IoV also faces the challenging task in the cybersecurity-related matters. The future consists of crowded places in an interconnected world through wearable’s, sensors, smart phones etc. We are converging towards IoV technology and interactions with crowded space of connected peoples. However, this convergence demands high-security mechanism from the connected crowd as-well-as other connected vehicles to safeguard of proposed IoV system. In this paper, we coin the term of smart people crowd (SPC) and the smart vehicular crowd (SVC) for the Internet of Vehicles (IoV). These specific crowds of SPC and SVC are the potential cyber attackers of the smart IoV. People connected to the internet in the crowded place are known as a smart crowd. They have interfacing devices with sensors and the environment. A smart crowd would also consist of the random number of smart vehicles. With the future converging in to the smart connected framework for crowds, vehicles and connected vehicles, we present a novel cyber-physical surveillance system (CPSS) framework to tackle the security threats in the crowded environment for the smart automotive industry and provide the cyber security mechanism in the crowded places. We also describe an overview of use cases and their security challenges on the Internet of Vehicles.
Book
At present, we live in a self-motivated and dynamic global society where technologies and challenges are unexpectedly changing overnight. These rapid changes in globalization and technological advances are creating new market forces every day. Therefore, day-to-day innovation is essential for any business or institution to survive and flourish in such an atmosphere. Though, innovation is no longer just to create value to do good to individuals, societies, or organizations. The utmost purpose of innovation is to create a smart futuristic society where people can enjoy the best quality of life using natural resources and manmade technologies including cloud-IoT technologies, and industry4.0. Hence, the innovators and their innovations must search for intelligent solutions to tackle major socio-technical problems and remove barriers of rural, urban and smart city societies. This book provides in-depth knowledge in the areas of convergence of cloud-IoT technologies and industry 4.0 with society 5.0, machine-to-machine communication, machine-to-person communication, techno-psychological perspective of society 5.0, sentiment analysis of smart digital societies, multi-access edge computing for 5G networks, discovery & location reporting of multi-access edge enabled clients/servers, m-health systems, enhancing the concert of M-health technologies in smart societies, supervising communication services in smart societies, life quality enhancement in smart city societies, multiple disease infection predictions, and societal opinion mining algorithms for smart cities societies using cloud-IoT integrated intelligent machine / deep learning technologies to the readers in the distributive environment. In this book, the authors have mandatorily discussed the implementation of cloud-IoT-based machine learning technologies like clustering technique, Naïve Bayes classifier, artificial neural network (ANN), Firefly algorithm, Rough set classifiers, support vector machine classifier, decision tree classifier, ensemble classifier, random forest, and deep learning algorithms to analyze the behavior of intelligent machines and human habits using automated data scheduling and smart digital networks. Smart digitization and the intelligent implementation of manufacturing development processes are the necessities for today’s rural, urban, and smart city industries. All types of industries including development, manufacturing, and research are presently shifting from bunch production to customized production. The fast advancements in manufacturing technologies have an in-depth impact on all types of societies including societies of rural areas, urban areas, and smart cities. Industry 4.0 includes the Internet of Things (IoT), Industrial Internet, Smart Manufacturing, Cloud-based computing, and Manufacturing Technologies. The objective of this book is to establish a linkage between the Industry 4.0 components and various rural, urban & smart city societies (including society 5.0) to bring actual prosperity where human values, peace of mind, human relations, man-machine-relations, and calmness will have utmost preference. These objectives can be achieved by the integration of human societal values, and social opinion mining (SOM) approaches with the existing technologies.
Chapter
Full-text available
While the definition of a smart city is still evolving in the current era of the twenty-first century, a few things have become very clear that the use of information and communication technologies (ICT) can enhance service levels, citizen well-being, sustainability, and eco-friendly economic developments. Hence, the life quality of smart city societies can be further improved where the people can live a stress-less life. But, it is another unfortunate truth that the urban population is growing rapidly at an enormous speed. This rapid growth of population in urban cities may lead to the exponential increase of pressure in the day-to-day life of urban people. Therefore, there is a serious need of thinking about developing smart cities and the corresponding societies where technologies will assist the people of urban societies in improving the quality of life by providing a stress-less and eco-friendly working and living environment.In this article, the authors have described the hardware, software, and other technological requirements needed for developing a smart city and the corresponding society. The intellectuals and technocrats have more responsibility to contribute towards the development of better and further advanced technologies that can enhance the life quality of smart city societies. In this chapter, the authors have described how we can use cloud-IoT and intelligent machine learning technologies to improve the overall life quality of smart cities and the corresponding societies using cloud-IoT integrated machine learning technologies. We have taken certain basic facilities like traffic management, accident prevention, accident death minimization, city crowd management, stadium crowd management, vehicle parking management, video surveillance, and waste management activities of smart city societies. Further, the authors have tried to find how these mentioned things can be managed and controlled using cloud-IoT integrated technologies.KeywordsCloud-IoT TechnologiesCrowd Control SystemEco-friendly EnvironmentMachine LearningRoad Traffic ManagementSmart City SocietiesVehicle Accident PreventionVideo SurveillanceWaste Processing System
Book
At present, we live in a self-motivated and dynamic global society where technologies and challenges are unexpectedly changing overnight. These rapid changes in globalization and technological advances are creating new market forces every day. Therefore, day-to-day innovation is essential for any business or institution to survive and flourish in such an atmosphere. Though, innovation is no longer just to create value to do good to individuals, societies, or organizations. The utmost purpose of innovation is to create a smart futuristic society where people can enjoy the best quality of life using natural resources and manmade technologies including cloud-IoT technologies, and industry4.0. Hence, the innovators and their innovations must search for intelligent solutions to tackle major socio-technical problems and remove barriers of rural, urban and smart city societies. This book provides in-depth knowledge in the areas of convergence of cloud-IoT technologies and industry 4.0 with society 5.0, machine-to-machine communication, machine-to-person communication, techno-psychological perspective of society 5.0, sentiment analysis of smart digital societies, multi-access edge computing for 5G networks, discovery & location reporting of multi-access edge enabled clients/servers, video surveillance of suspicious objects using UAV Images, supervising communication services in smart societies, life quality enhancement in smart city societies, multiple disease infection predictions, and societal opinion mining algorithms for smart cities societies using cloud-IoT integrated intelligent machine / deep learning technologies to the readers in the distributive environment. In this book, the authors have mandatorily discussed the implementation of cloud-IoT based machine learning technologies like clustering technique, Naïve Bayes classifier, artificial neural network (ANN), Firefly algorithm, Rough set classifiers, support vector machine classifier, decision tree classifier, ensemble classifier, random forest, and deep learning algorithms to analyze the behavior of intelligent machines and human habits using automated data scheduling and smart digital networks. The smart digitization and intelligent implementation of manufacturing development processes are the necessities for today’s rural, urban, and smart city industries. All types of industries including development, manufacturing, and research are presently shifting from bunch production to customized production. The fast advancements in manufacturing technologies have an in-depth impact on all types of societies including societies of rural areas, urban areas, and smart cities. Industry 4.0 includes the Internet of Things (IoT), Industrial Internet, Smart Manufacturing, Cloud-based computing, and Manufacturing Technologies. The objective of this book is to establish linkage between the Industry 4.0 components and various rural, urban & smart city societies (including society 5.0) to bring actual prosperity where human values, peace of mind, human relations, man-machine-relations, and calmness will have utmost preference. These objectives can be achieved by the integration of human societal values, and social opinion mining (SOM) approaches with the existing technologies. Keywords: 5G Networks, Cloud-IoT Technologies; Convolution Neural Network; Crowd Control System; Deep Learning; Distributive Computing; Embedded Computing Technologies; Human Cognition; Intuitions Analysis; Sentiment Analysis; Intelligent Machine Learning; m-Health Disease Prediction System; Multi-access Edge Computing, Multiple Disease Prediction System; Pandas Libraries; Road Traffic Management; Social Opinion Mining; Smart Digital Society; Society 5.0; Supervised Learning; Suspicious Objects Surveillance; Techno-behavioural Changes; Techno-Psychological Effect; Techno-Psychological Models; Unmanned Aerial Vehicles; Unsupervised Learning; Vehicle Accident Prevention; Video Surveillance; Waste Processing System.
Chapter
The information technology field remains dominant in terms of adopting modern technologies. Additionally, there is increased adoption of the technologies in diverse realms and industries. One such rapidly emerging technology stands with the advancement of cloud computing. Today, cloud platforms are being sought after by a significant number of users and organizations to leverage their operations and productivity. The technology continues to gain more attention in the IT-Business arena. Cloud platforms offer greater flexibility in supporting real-time computation and arises as a more robust framework delivering offerings over the Internet. Amazon Windows Services (AWS) and Microsoft Azure are two key cloud platforms that allow users to utilize the cloud as a source of data storage, access, and retrieval. In the modern period of rapid global technological change, AWS and Azure cloud solutions are broadly adopted as public storage platforms for bulk information systems. Both server platforms offer private, public, hybrid, and community offerings to distinct organizations. Further, the two cloud technologies can be upgraded to mitigate against information imposition. Different security features allow diverse users to allocate a mutual foundation for storing and accessing data. Systematic appraisals among various characteristics, including platform independence, bulk employment, client requirements, security, size of data size, and other associated assets, are considered. This study is geared towards examining the infrastructure, platform, and data security issues that occur in cloud technologies, specifically with the application of Azure and AWS. Individual users and entities desire to experience the agility and scalability attributed to cloud technology platforms. These clients seek to develop and execute novice applications faster with the reduced cost through migration to the cloud platform. Amazon AWS and Microsoft Azure support distinct database management systems. The cloud providers portray different architectures, patterns of resource management, and degrees of complexity of the information systems’ enhancers, impacting scalability, performance, and price. While the cloud platforms continue to provide immense data security solutions, major challenges limit their growth and application. Future research needs to focus on more robust solutions and best practices to maintain cloud data security and integrity.
Article
Full-text available
Nowadays, the increased use of battery-powered mobile appliances and the urge to access time-sensitive data anytime anywhere has fuelled a high demand for wireless networks. However, wireless networks are susceptible to intrusion and security problems. There is an inherent need to secure the wireless data communication to ensure the confidentiality, authenticity, integrity and non repudiation of the data being exchanged. On the other hand, the computation and the resultant energy consumption to achieve sufficient security can be high. Encryption algorithms are generally computationally intensive, and consume a significant amount of computing resources (such as CPU time, memory, and battery power). Considering the limited resources on wireless devices, it is crucial that security protocols be implemented efficiently. This manuscript focuses on how energy consumption is impacted by the use of unoptimised AES-CCMP algorithms and proposes an optimized AES CCMP algorithm using 2-way interleaving that does not compromise the security of wireless communication sessions. There is also analysis of the performance of AES (a.k.a. Rijndael) in its AES-CCMP implementation. The 2-way interleaving technique is an optimization of the CBC-MAC that is investigated using two performance metrics (namely encryption time and throughput).
Conference Paper
Full-text available
Enterprises are seeking toward the cloud horizon to expand their premises facilities. It provides several services in the market, such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). This paper will discuss challenges regarding three information security concerns: confidentiality, integrity and availability. Most of the organizations are very much concerned about the ownership of their data. This paper will not only address security challenges for cloud computing including Identity and Access Management (IAM) but also present the current state authentication, authorization and auditing of users accessing the cloud along with emerging IAM protocols and standards.
Conference Paper
Full-text available
The term “cloud computing” has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market development theme for the industry and ICT users in 2010. However, one of the major challenges that faces the cloud computing concept and its global acceptance is how to secure and protect the data and processes that are the property of the user. The security of the cloud computing environment is a new research area requiring further development by both the academic and industrial research communities. Today, there are many diverse and uncoordinated efforts underway to address security issues in cloud computing and, especially, the identity management issues. This paper introduces an architecture for a new approach to necessary “mutual protection” in the cloud computing environment, based upon a concept of mutual trust and the specification of definable profiles in vector matrix form. The architecture aims to achieve better, more generic and flexible authentication, authorization and control, based on a concept of mutuality, within that cloud computing environment.
Chapter
Security aspects of cloud computing draw much attention. Many cloud customers feel that their lack of control over hardware and software makes their information vulnerable for compromise on the cloud. The security issues surrounding the cloud vary among the different types of cloud services such as SaaS, PaaS and IaaS. Among the cloud deployment models only the public cloud has several vulnerabilities. Businesses feel that since they do not control the cloud infrastructure any data stored in the cloud is insecure. It is more a perception issue than something that is inherently insecure. The cloud service providers are trying to reassure the public of their security practices and provide third party audits to back up their claims. Moreover, all the major service providers seek the enhanced SSAE 16 Type II Audit and the ISAE 3402 international reporting standards compliance certification. In this chapter we will analyze the security implications for businesses from the perspective of compliance with laws and industry standards as well as certifications carried by the service provider. Moreover, the service providers facilitate implementing both access control mechanisms and organizational control policies to limit the number of privileged users with access to customer data. Also, we discuss the proactive steps an organization could take to protect their data in transit and storage.
Article
As technology develops, more human-made devices are able to make use of Internet to communicate with each other, thus enabling the Internet of Things (IoT) era to emerge. The amount of data IoT entities generate can overwhelm computer infrastructures not prepared for such data deluge and consequent need for more CPU power. Cloud computing offers a solution at infrastructure level that alleviates such a problem by offering highly scalable computing platforms that can be configured on demand to meet constant changes of applications requirements in a pay-per-use mode. Current approaches enabling IoT applications are domain-specific or focus only on interaction with sensors, thus they cannot be easily ported to other domains nor provide means of interactions with data sources other than sensors. To address this issue, in this paper we introduce a data-centric framework for development of IoT applications executed in clouds. The framework handles connection to data sources, data filtering, and utilization of cloud resources including provisioning, load balancing, and scheduling, enabling developers to focus on the application logic and therefore facilitating the development of IoT applications. We present a prototype application executing on AWS, built on top of the Aneka Cloud Application Platform and present experiments demonstrating the use of our framework for building an application capable of processing input from different sources and analysing them using easy-to-use APIs provided by Aneka.
Conference Paper
We are designing a novel architecture to support future internet services which is going to solve fundamental issues such as addressing, mobility, routing scalability challenges, security and control to support trillion of things to connect with internet. In this paper we have presented an efficient hierarchical identification mapping server (IMS) which uses separation mechanism of identification (ID) and location (LOC). IMS introduces huge amount of LOC independent globally unique Flat ID and Bloom Filter (BF) has been introduces the management of Flat IDs during the Lookup process into the IMS. Hence, we can state that hierarchical IMS architecture could be an alternative solution of current internet oriented innovations in a scalable manner. The aim of architecture is the coverage of Internet and sensors oriented smart objects.
Article
The proposed work gives novel technique to exploit the cloud for the purpose of qualitative improvement in services being rendered. In this context a service level agreement is executed between the service provider and the user incorporating stipulations regarding terms & conditions relevant with the transactions. Agreement envisages the provisioning of services to the users at the appointed time and charges commensurate with the market scenario. Besides the interests of the service providers are equally watched upon by allowing negotiations and settlements at par with prevailing market trends, thus ensuring benefits to both the service providers and the users. The scheduler algorithm allows re-provisioning of resources on the cloud in the event of failures. The focus of the model is to provide fair deal to the users and consumers, enhanced quality of service as well as generation of optimal revenue.
Article
CCM/CCMP is a two-cycle authenticate and encrypt (AE) mode. One cycle is used to perform confidentiality computations, and the second cycle is used to compute authenticity and integrity. CCM/CCMP is also a generic composition. CCM/CCMP is actually made up of two separate modes, CBC-MAC and AES counter mode amalgamated together. Although CCM/CCMP is an AE mode, it is not an authenticated encryption with associated data (AEAD) mode. Previous research has suggested that it is a major deficiency for an AE mode not to be an AEAD. Previous critiques of the CCM/CCMP have shown that CBC-MAC and AES counter mode were poorly amalgamated to create the CCM/CCMP. They also showed that CCMP, which was ratified by the IEEE 802.11i workgroup in 2003 and implemented in WPA2, has some security issues. It also has some major efficiency and complexity issues. This research work reviewed the current major AE and AEAD modes such as the Galois counter mode, and the encryption system with keyed integrity and managed oracle and used critical analysis and statistical analysis approaches to identify more deficiencies in the CCM/CCMP.
Article
We propose a block-cipher mode of operation, EAX, for authenticated-encryption with associated data (AEAD). Given a nonce N , a message M , and a header H, the mode protects the privacy of M and the authenticity of both M and H. Strings N; M;H 2 f0; 1g are arbitrary, and the mode uses 2dM=ne + dH=ne + dN=ne block-cipher calls when these strings are nonempty and n is the block length of the underlying block cipher. Among EAX's characteristics are that it is on-line (the length of a message isn't needed to begin processing it) and a fixed header can be pre-processed, effectively removing the per-message cost of binding it to the ciphertext. EAX is obtained by instantiating a simple generic composition method, EAX2, and then collapsing its two keys into one. EAX is provably secure under a standard complexity-theoretic assumption. EAX is an alternative to CCM [19], and is likewise patent-free.
NIST Cloud Computing Standards Roadmap – Version 1.0
  • M Hogan
  • F Liu
  • A Sokol
  • J Tong
M. Hogan, F. Liu, A. Sokol, J. Tong, NIST Cloud Computing Standards Roadmap -Version 1.0, Natl. Inst. Stand. Technol. Spec. Publ. 500-291, 83 pages, July 5, 2011.
SLA Based Scheduler for Cloud storage and Computational Services
  • R Ahuja
R. Ahuja "SLA Based Scheduler for Cloud storage and Computational Services", International Conference on Computational Science and Applications (ICCSA), pp.258-262, June 2011.
A Data-Centric Framework for Development and Deployment of Internet of Things Applications in Clouds
  • F Khodadadi
  • R N Calheiros
  • R Buyya
F. Khodadadi, R.N. Calheiros, R. Buyya, "A Data-Centric Framework for Development and Deployment of Internet of Things Applications in Clouds", Proc. of the 10th IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2015), Singapore, April 7-9, 2015.
NIST Cloud Computing Standards Roadmap – Version 1.0
  • hogan