Secure Sensor Cloud

Secure Sensor Cloud

Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective.

Author: Vimal Kumar

Publisher: Morgan & Claypool Publishers

ISBN: 9781681734699

Category: Computers

Page: 140

View: 280

The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned. The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hash-based Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.
Categories: Computers

Dependability in Sensor Cloud and Big Data Systems and Applications

Dependability in Sensor  Cloud  and Big Data Systems and Applications

This book constitutes the refereed proceedings of the 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys, held in Guangzhou, China, in November 2019.

Author: Guojun Wang

Publisher: Springer Nature

ISBN: 9789811513046

Category: Computers

Page: 488

View: 926

This book constitutes the refereed proceedings of the 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys, held in Guangzhou, China, in November 2019. The volume presents 39 full papers, which were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on ​dependability and security fundamentals and technologies; dependable and secure systems; dependable and secure applications; dependability and security measures and assessments; explainable artificial inteligence for cyberspace.
Categories: Computers

Secure Data Managment

Secure Data Managment

apart. The sensor-cloud provisions the use of physical sensors through the
virtualization of sensing services. The virtualization significantly expands the
boundary of service capability to facilitate a variety of missions [31,13,18]. Sensor
-cloud is ...

Author: Willem Jonker

Publisher: Springer Science & Business Media

ISBN: 9783642235559

Category: Computers

Page: 170

View: 186

This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle,WA, USA in September 2, 2011 as a satellite workshop of the VLDB 2011 Conference . The 10 revised full papers presented were carefully reviewed and selected from 19 submissions. The papers are organized in topical sections on privacy protection and quantification, security in cloud and sensor networks and secure data managment technologies.
Categories: Computers

Data Security in Cloud Computing

Data Security in Cloud Computing

This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.

Author: Vimal Kumar

Publisher: IET

ISBN: 9781785612206

Category: Computers

Page: 322

View: 409

Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, this can open security, privacy, trust and compliance issues. This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management. Data Security in Cloud Computing covers major aspects of securing data in Cloud Computing. Topics covered include NOMAD: a framework for ensuring data confidentiality in mission-critical cloud based applications; 3DCrypt: privacy-preserving pre-classification volume ray-casting of 3D images in the cloud; multiprocessor system-on-chip for processing data in Cloud Computing; distributing encoded data for private processing in the cloud; data protection and mobility management for cloud; understanding software defined perimeter; security, trust and privacy for Cloud Computing in transportation cyber-physical systems; review of data leakage attack techniques in cloud systems; Cloud Computing and personal data processing: sorting out legal requirements; the Waikato data privacy matrix; provenance reconstruction in clouds; and security visualization for Cloud Computing.
Categories: Computers

Cloud Computing

Cloud Computing

[5] have proposed different architectures to integrate WSNs into cloud neither of
these architecture provides security features to the outsourced WSN data. Apart
from the above work, there also exists many services that provide sensorcloud ...

Author: Victor C.M. Leung

Publisher: Springer

ISBN: 9783319055060

Category: Computers

Page: 298

View: 776

This book constitutes the thoroughly refereed post conference proceedings of the 4th International Conference on Cloud Computing, Cloud Comp 2013, held in Wuhan, China, in October 2013. The 28 revised full papers were carefully reviewed and selected from numerous submissions and cover topics such as mobile cloud computing, services, applications, IoT on cloud, architectures and big data, cloud-assisted pervasive computing and services, management and virtualization for cloud, cloud security.
Categories: Computers

IoT and Edge Computing for Architects

IoT and Edge Computing for Architects

What you will learn Understand the role and scope of architecting a successful IoT deployment Scan the landscape of IoT technologies, from sensors to the cloud and more See the trade-offs in choices of protocols and communications in IoT ...

Author: Perry Lea

Publisher: Packt Publishing Ltd

ISBN: 9781839218873

Category: Computers

Page: 632

View: 932

Learn to design, implement, and secure your IoT infrastructure. Revised and expanded for edge computing. Key Features Build a complete IoT system that's the best fit for your organization Learn about different concepts, tech, and trade-offs in the IoT architectural stack Understand the theory and implementation of each element that comprises IoT design Book Description Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is needed if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of IoT devices. IoT and Edge Computing for Architects, Second Edition encompasses the entire spectrum of IoT solutions, from IoT sensors to the cloud. It examines modern sensor systems, focusing on their power and functionality. It also looks at communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, the book explores IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, Sigfox, and LoRaWAN. It also explains edge computing, routing and gateways, and their role in fog computing, as well as the messaging protocols of MQTT 5.0 and CoAP. With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. The book wraps up the analytics portion with the application of statistical analysis, complex event processing, and deep learning models. The book then concludes by providing a holistic view of IoT security, cryptography, and shell security in addition to software-defined perimeters and blockchains. What you will learn Understand the role and scope of architecting a successful IoT deployment Scan the landscape of IoT technologies, from sensors to the cloud and more See the trade-offs in choices of protocols and communications in IoT deployments Become familiar with the terminology needed to work in the IoT space Broaden your skills in the multiple engineering domains necessary for the IoT architect Implement best practices to ensure reliability, scalability, and security in your IoT infrastructure Who this book is for This book is for architects, system designers, technologists, and technology managers who want to understand the IoT ecosphere, technologies, and trade-offs, and develop a 50,000-foot view of IoT architecture. An understanding of the architectural side of IoT is necessary.
Categories: Computers

Trusted Cloud Computing

Trusted Cloud Computing

Security. Architecture. for. Sensor. Data. in. the. Cloud. Martin Henze, Ren ́e
Hummen, Roman Matzutt, and Klaus Wehrle Abstract The SensorCloud project
aims at enabling the use of elastic, on-demand resources of today's Cloud offers
for ...

Author: Helmut Krcmar

Publisher: Springer

ISBN: 9783319127187

Category: Computers

Page: 331

View: 331

This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on “Security and Privacy”, “Software Engineering and Software Quality”, “Platforms, Middleware and Integration”, and “Social Aspects, Business Models and Standards”. It thus provides a holistic view on technological, societal, and legal aspects, which are indispensable not only to ensure the security of cloud services and the data they process, but also to gain the trust of society, business, industry, and science in these services. The ultimate goal of the book, as well as of the Trusted Cloud Program in general, is to distribute these results to a broader audience in both academia and industry, and thus to help with the proliferation of "Industry 4.0" services.
Categories: Computers

Advances in Big Data and Cloud Computing

Advances in Big Data and Cloud Computing

This book is a compendium of the proceedings of the International Conference on Big-Data and Cloud Computing.

Author: Elijah Blessing Rajsingh

Publisher: Springer

ISBN: 9789811072000

Category: Technology & Engineering

Page: 413

View: 184

This book is a compendium of the proceedings of the International Conference on Big-Data and Cloud Computing. It includes recent advances in the areas of big data analytics, cloud computing, the Internet of nano things, cloud security, data analytics in the cloud, smart cities and grids, etc. Primarily focusing on the application of knowledge that promotes ideas for solving the problems of the society through cutting-edge technologies, it provides novel ideas that further world-class research and development. This concise compilation of articles approved by a panel of expert reviewers is an invaluable resource for researchers in the area of advanced engineering sciences.
Categories: Technology & Engineering

Handbook of Research on Cloud Computing and Big Data Applications in IoT

Handbook of Research on Cloud Computing and Big Data Applications in IoT

The Handbook of Research on Cloud Computing and Big Data Applications in IoT is a pivotal reference source that provides relevant theoretical frameworks and the latest empirical research findings on principles, challenges, and applications ...

Author: Gupta, B. B.

Publisher: IGI Global

ISBN: 9781522584087

Category: Computers

Page: 609

View: 584

Today, cloud computing, big data, and the internet of things (IoT) are becoming indubitable parts of modern information and communication systems. They cover not only information and communication technology but also all types of systems in society including within the realms of business, finance, industry, manufacturing, and management. Therefore, it is critical to remain up-to-date on the latest advancements and applications, as well as current issues and challenges. The Handbook of Research on Cloud Computing and Big Data Applications in IoT is a pivotal reference source that provides relevant theoretical frameworks and the latest empirical research findings on principles, challenges, and applications of cloud computing, big data, and IoT. While highlighting topics such as fog computing, language interaction, and scheduling algorithms, this publication is ideally designed for software developers, computer engineers, scientists, professionals, academicians, researchers, and students.
Categories: Computers

Cloud Computing for Geospatial Big Data Analytics

Cloud Computing for Geospatial Big Data Analytics

This book introduces the latest research findings in cloud, edge, fog, and mist computing and their applications in various fields using geospatial data.

Author: Himansu Das

Publisher: Springer

ISBN: 9783030033590

Category: Computers

Page: 289

View: 263

This book introduces the latest research findings in cloud, edge, fog, and mist computing and their applications in various fields using geospatial data. It solves a number of problems of cloud computing and big data, such as scheduling, security issues using different techniques, which researchers from industry and academia have been attempting to solve in virtual environments. Some of these problems are of an intractable nature and so efficient technologies like fog, edge and mist computing play an important role in addressing these issues. By exploring emerging advances in cloud computing and big data analytics and their engineering applications, the book enables researchers to understand the mechanisms needed to implement cloud, edge, fog, and mist computing in their own endeavours, and motivates them to examine their own research findings and developments.
Categories: Computers

Security Privacy and Anonymity in Computation Communication and Storage

Security  Privacy  and Anonymity in Computation  Communication  and Storage

This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in ...

Author: Guojun Wang

Publisher: Springer

ISBN: 9783319723952

Category: Computers

Page: 855

View: 482

This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The total of 75 papers presented in this volume was carefully reviewed and selected from a total of 190 submissions to all workshops: UbiSafe 2017: The 9th IEEE International Symposium on UbiSafe Computing ISSR 2017: The 9th IEEE International Workshop on Security in e-Science and e-Research TrustData 2017: The 8th International Workshop on Trust, Security and Privacy for Big Data TSP 2017: The 7th International Symposium on Trust, Security and Privacy for Emerging Applications SPIoT 2017: The 6th International Symposium on Security and Privacy on Internet of Things NOPE 2017: The 5th International Workshop on Network Optimization and Performance Evaluation DependSys 2017: The Third International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications SCS 2017: The Third International Symposium on Sensor-Cloud Systems WCSSC 2017: The Second International Workshop on Cloud Storage Service and Computing MSCF 2017: The First International Symposium on Multimedia Security and Digital Forensics SPBD 2017: The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity
Categories: Computers

Internet of Things for Architects

Internet of Things for Architects

This book encompasses the entire spectrum of IoT solutions, from sensors to the cloud. We start by examining modern sensor systems and focus on their power and functionality.

Author: Perry Lea

Publisher: Packt Publishing Ltd

ISBN: 9781788475747

Category: Computers

Page: 524

View: 367

Learn to design, implement and secure your IoT infrastructure Key Features Build a complete IoT system that is the best fit for your organization Learn about different concepts, technologies, and tradeoffs in the IoT architectural stack Understand the theory, concepts, and implementation of each element that comprises IoT design—from sensors to the cloud Implement best practices to ensure the reliability, scalability, robust communication systems, security, and data analysis in your IoT infrastructure Book Description The Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is necessary if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of devices. This book encompasses the entire spectrum of IoT solutions, from sensors to the cloud. We start by examining modern sensor systems and focus on their power and functionality. After that, we dive deep into communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, we explore IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, SigFox, and LoRaWAN. Next, we cover edge routing and gateways and their role in fog computing, as well as the messaging protocols of MQTT and CoAP. With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. We wrap up the analytics portion of the book with the application of statistical analysis, complex event processing, and deep learning models. Finally, we conclude by providing a holistic view of the IoT security stack and the anatomical details of IoT exploits while countering them with software defined perimeters and blockchains. What you will learn Understand the role and scope of architecting a successful IoT deployment, from sensors to the cloud Scan the landscape of IoT technologies that span everything from sensors to the cloud and everything in between See the trade-offs in choices of protocols and communications in IoT deployments Build a repertoire of skills and the vernacular necessary to work in the IoT space Broaden your skills in multiple engineering domains necessary for the IoT architect Who this book is for This book is for architects, system designers, technologists, and technology managers who want to understand the IoT ecosphere, various technologies, and tradeoffs and develop a 50,000-foot view of IoT architecture.
Categories: Computers

Handbook of Research on Securing Cloud Based Databases with Biometric Applications

Handbook of Research on Securing Cloud Based Databases with Biometric Applications

The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques.

Author: Deka, Ganesh Chandra

Publisher: IGI Global

ISBN: 9781466665606

Category: Computers

Page: 434

View: 460

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.
Categories: Computers

Advances in Big Data and Cloud Computing

Advances in Big Data and Cloud Computing

The contents of this volume will be of interest to researchers and professionals alike. This book is a compendium of the proceedings of the International Conference on Big Data and Cloud Computing.

Author: J. Dinesh Peter

Publisher: Springer

ISBN: 9789811318825

Category: Computers

Page: 587

View: 214

This book is a compendium of the proceedings of the International Conference on Big Data and Cloud Computing. It includes recent advances in the areas of big data analytics, cloud computing, internet of nano things, cloud security, data analytics in the cloud, smart cities and grids, etc. This volume primarily focuses on the application of the knowledge that promotes ideas for solving the problems of the society through cutting-edge technologies. The articles featured in this proceeding provide novel ideas that contribute to the growth of world class research and development. The contents of this volume will be of interest to researchers and professionals alike.
Categories: Computers

Cloud Computing Security Privacy in New Computing Environments

Cloud Computing  Security  Privacy in New Computing Environments

This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in ...

Author: Jiafu Wan

Publisher: Springer

ISBN: 9783319696058

Category: Computers

Page: 240

View: 912

This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016.The proceedings contain 10 full papers selected from 27 submissions and presented at CloudComp 2016 and 12 full papers selected from 69 submissions and presented at SPNCE 2016. CloudComp 2016 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. SPNCE 2016 focuses on security and privacy aspects of new computing environments including mobile computing, big data, cloud computing and other large-scale environments.
Categories: Computers

Green Pervasive and Cloud Computing

Green  Pervasive  and Cloud Computing

This book constitutes the proceedings of the 12th International Conference on Green, Pervasive, and Cloud Computing, GPC 2017, held in Cetara, Italy, in May 2017 and the following colocated workshops: First International Workshop on Digital ...

Author: Man Ho Allen Au

Publisher: Springer

ISBN: 9783319571867

Category: Computers

Page: 815

View: 920

This book constitutes the proceedings of the 12th International Conference on Green, Pervasive, and Cloud Computing, GPC 2017, held in Cetara, Italy, in May 2017 and the following colocated workshops: First International Workshop on Digital Knowledge Ecosystems 2017; and First Workshop on Cloud Security Modeling, Monitoring and Management, CS3M 2017. The 58 full papers included in this volume were carefully reviewed and selected from 169 initial submissions. They deal with cryptography, security and biometric techniques; advances network services, algorithms and optimization; mobile and pervasive computing; cybersecurity; parallel and distributed computing; ontologies and smart applications; and healthcare support systems.
Categories: Computers

Handbook of Wireless Sensor Networks Issues and Challenges in Current Scenario s

Handbook of Wireless Sensor Networks  Issues and Challenges in Current Scenario s

This book explores various challenging problems and applications areas of wireless sensor networks (WSNs), and identifies the current issues and future research challenges.

Author: Pradeep Kumar Singh

Publisher: Springer Nature

ISBN: 9783030403058

Category: Technology & Engineering

Page: 716

View: 637

This book explores various challenging problems and applications areas of wireless sensor networks (WSNs), and identifies the current issues and future research challenges. Discussing the latest developments and advances, it covers all aspects of in WSNs, from architecture to protocols design, and from algorithm development to synchronization issues. As such the book is an essential reference resource for undergraduate and postgraduate students as well as scholars and academics working in the field.
Categories: Technology & Engineering

Mission Oriented Sensor Networks and Systems Art and Science

Mission Oriented Sensor Networks and Systems  Art and Science

This book discusses topics in mission-oriented sensor networks and systems research and practice, enabling readers to understand the major technical and application challenges of these networks, with respect to their architectures, ...

Author: Habib M. Ammari

Publisher: Springer Nature

ISBN: 9783319911465

Category: Technology & Engineering

Page: 820

View: 907

This book discusses topics in mission-oriented sensor networks and systems research and practice, enabling readers to understand the major technical and application challenges of these networks, with respect to their architectures, protocols, algorithms, and application design. It also presents novel theoretical and practical ideas, which have led to the development of solid foundations for the design, analysis, and implementation of energy-efficient, reliable, and secure mission-oriented sensor network applications. Covering various topics, including sensor node architecture, sensor deployment, mobile coverage, mission assignment, detection, localization, tracking, data dissemination, data fusion, topology control, geometric routing, location privacy, secure communication, and cryptograph, it is a valuable resource for computer scientists, researchers, and practitioners in academia and industry.
Categories: Technology & Engineering

IoT

IoT

This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects.

Author: Souvik Pal

Publisher: CRC Press

ISBN: 9781000058314

Category: Technology & Engineering

Page: 381

View: 235

IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente García-Díaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.
Categories: Technology & Engineering

Advanced Computing and Systems for Security

Advanced Computing and Systems for Security

This bi-volume book has a total of 21 papers divided in 7 chapters. The chapters reflect the sessions in which the works have been discussed during the symposium.

Author: Rituparna Chaki

Publisher: Springer

ISBN: 9789811081835

Category: Computers

Page: 169

View: 919

This book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017. The symposium was organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from University of Calcutta in collaboration with NIT, Patna. The International partners for ACSS 2016 had been Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. This bi-volume book has a total of 21 papers divided in 7 chapters. The chapters reflect the sessions in which the works have been discussed during the symposium. The different chapters in the book include works on biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.
Categories: Computers