Security Designs for the Cloud, IoT, and Social Networking

Dac-Nhuong Le (Redaktør) ; Chintan Bhatt (Redaktør) ; Mani Madhukar (Redaktør)

Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media. Les mer
Vår pris
2886,-

(Innbundet) Fri frakt!
Leveringstid: Sendes innen 21 dager

Innbundet
Legg i
Innbundet
Legg i
Vår pris: 2886,-

(Innbundet) Fri frakt!
Leveringstid: Sendes innen 21 dager

Om boka

Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media.

Fakta

Innholdsfortegnelse

List of Figures xv


List of Tables xix


Foreword xxi


Preface xxiii


Acknowledgments xxv


Acronyms xxvii


Part I Security Designs for the Cloud Network


1 Encryption Algorithm for Data Security in Cloud Computing 3
Anindita Desarkar, Ajanta Das


1.1 Introduction 4


1.2 Related Work 4


1.3 Cloud Computing - A Brief Overview 5


1.3.1 Essential Characteristics 5


1.3.2 Layers of Cloud Computing 6


1.3.3 Cloud Deployment Models 7


1.4 Data Security in Cloud Storage 7


1.4.1 Security Issues in Cloud 7


1.4.2 Symmetric Encryption Algori 8


1.4.3 Asymmetric Encryption Algorithms 12


1.4.4 Security Enhancement in Cloud Using Encryption Algorithms: Observations 15


1.5 Comparison of Encryption Algorithms 16


1.6 Performance Analysis of Encryption Algorithms in Cloud 16


1.7 Conclusion 17


References 17


2 Analysis of Security Issues in Cloud Environment 19
Sushruta Mishra, Nitin Tripathy, Brojo Kishore Mishra, Chandrakanta Mahanty


2.1 An Insight into Cloud Computing 20


2.2 Critical Challenges Concerning Cloud Computing 21


2.2.1 Data Protection 21


2.2.2 Data Recovery and Availability 22


2.2.3 Management Capacities 22


2.2.4 Regulatory and Compliance Restrictions 22


2.3 Basic Models Governing Cloud Computing 22


2.3.1 Cloud Computing Models 23


2.3.2 Security Concerns of Cloud Computing 23


2.4 Security Countermeasures in Cloud Computing 26


2.4.1 Countermeasures for Communication Issues 26


2.4.2 Countermeasures for Architecture Security 26


2.4.3 Countermeasures for Challenges Inherited from Network Concepts 27


2.4.4 Countermeasures for CAS Proposed Threats 28


2.5 Discussion of an Implemented SDN Security Framework 29


2.5.1 System Design 29


2.5.2 Phase 1: User Authentication Phase 30


2.5.3 Phase 2: Controller Assignment Phase 31


2.5.4 Phase 3: Communication Phase 33


2.6 Result Analysis 35


2.6.1 Simulation Environment 35


2.6.2 Analysis of Different Attacks 35


2.6.3 Comparative Analysis 36


2.7 Conclusion 40


References 40


3 Security and Challenges in Mobile Cloud Computing 43
Ankur Dumka, Minakshi Memoria, Alaknanda Ashok


3.1 Introduction 44


3.1.1 Mobile Cloud Computing 44


3.1.2 Internet of Things and Cloud Computing 46


3.2 Literature Review 46


3.3 Architecture of Integration of Mobile Cloud Computing with IoT 46


3.3.1 Infrastructural or Architectural Issues 49


3.3.2 Privacy Issues 52


3.3.3 Compliance Issues 53


3.4 Proposed Preventive Measure for Security in MCC 54


3.5 Conclusion 55


References 55


4 Fog Computing and Its Security Issues 59
Jyotir Moy Chatterjee, Ishaani Priyadarshini, Shankeys, and DacNhuong Le


4.1 Introduction 60


4.2 Current Fog Applications 62


4.2.1 Why Do We Need Fog? 62


4.2.2 What Can We Do with Fog? 63


4.3 Security and Privacy in Fog Computing 66


4.3.1 Trust and Authentication 66


4.3.2 Man-in-the-Middle Attacks (MITM) 66


4.3.3 Network Security 68


4.3.4 Secure Data Storage 69


4.4 Secure and Private Data Computation 69


4.4.1 Privacy 70


4.4.2 Access Control 71


4.4.3 Intrusion Detection 71


4.5 Conclusion 71


References 73


5 Application Safety and Service Vulnerability in Cloud Network 77
Sudipta Sahana, Debabrata Sarddar


5.1 Introduction 78


5.1.1 Introduction to Security Issues in Cloud Service Models 78


5.1.2 Security Issues in SaaS 78


5.1.3 Security Issues in PaaS 79


5.1.4 Security Issues in IaaS 79


5.2 Security Concerns of Cloud Computing 80


5.2.1 Dat

Om forfatteren