Predictive Computing and Information Security: A Technical Review

With the advancement in technology and computing techniques, it has become possible to integrate several different technologies that make task of data processing in real-time easier and faster. It is believed that integration of cloud computing and IoT with wireless sensor networks will completely reshape the Information and Communication Technology (ICT) industry. One major advantage of this integration is that it has become easy to design predictive computing-based techniques and models for many key areas. In this chapter, we have focused on these hot key areas, where predictive computing-based techniques and frameworks are applied for better human living and environment. We aim to pinpoint the predictive techniques, data handling techniques, sustainable techniques, navigation techniques, intelligent agents, smart object based techniques. Key areas for the predictive framework: healthcare, smart home, navigation, e-commerce are discussed. Security in context to predictive computing can be defined in terms of data confidentiality, privacy and trust. At the end, we have given the key challenges related to integration and implementation of IoT and cloud computing.

[1]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[2]  Weiping Zhu,et al.  LASEC: A Localized Approach to Service Composition in Pervasive Computing Environments , 2015, IEEE Transactions on Parallel and Distributed Systems.

[3]  Jong Hyuk Park,et al.  An enhanced security framework for home appliances in smart home , 2017, Human-centric Computing and Information Sciences.

[4]  Hervé Rivano,et al.  On the use of city bikes to make the city even smarter , 2014, 2014 International Conference on Smart Computing Workshops.

[5]  Hassan Salmani,et al.  Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion , 2016, IEEE Transactions on Information Forensics and Security.

[6]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[7]  Vangelis Metsis,et al.  IoT Middleware: A Survey on Issues and Enabling Technologies , 2017, IEEE Internet of Things Journal.

[8]  S. Martin,et al.  Using context prediction for self-management in ubiquitous computing environments , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[9]  Reza Malekian,et al.  Implementing DNA Encryption Technique in Web Services to Embed Confidentiality in Cloud , 2016 .

[10]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[11]  Gareth A. Taylor,et al.  Recent developments towards novel high performance computing and communications solutions for smart distribution network operation , 2011, 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies.

[12]  C. Brodley,et al.  Exploration of machine learning techniques in predicting multiple sclerosis disease course , 2017, PloS one.

[13]  Yong Yu,et al.  Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[14]  Svetha Venkatesh,et al.  A predictive framework for modeling healthcare data with evolving clinical interventions , 2015, Stat. Anal. Data Min..

[15]  Ciprian Dobre,et al.  The Art of Advanced Healthcare Applications in Big Data and IoT Systems , 2017 .

[16]  Simon Fong,et al.  Predicting the next turn at road junction from big traffic data , 2017, The Journal of Supercomputing.

[17]  Lin Xu,et al.  Energy-efficient reliable data gathering scheme based on Enhanced Reed-Solomon code for wireless sensor networks , 2014, 2014 International Conference on Smart Computing.

[18]  Furrakh Shahzad,et al.  An Efficient Framework for Information Security in Cloud Computing Using Auditing Algorithm Shell (AAS) , 2017, ArXiv.

[19]  A. Kansal,et al.  Building a Sensor Network of Mobile Phones , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[20]  Radu Terec,et al.  DNA SECURITY USING SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY , 2011 .

[21]  Stefan Feuerriegel,et al.  Understanding Consumer Behavior in Electronic Commerce with Image Sentiment , 2017, Wirtschaftsinformatik.

[22]  Dongjian He,et al.  Adaptive Kalman filtering based on optimal autoregressive predictive model , 2017, GPS Solutions.

[23]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[24]  Rajan Gupta,et al.  A Machine Learning Framework for Predicting Purchase by Online Customers based on Dynamic Pricing , 2014, Complex Adaptive Systems.

[25]  Manuel Mazzara,et al.  Link Prediction Using Top-k Shortest Distances , 2017, BICOD.

[26]  Ammar Rayes,et al.  Internet of Things Security and Privacy , 2017 .

[27]  Antonio Puliafito,et al.  AllJoyn Lambda: An architecture for the management of smart environments in IoT , 2014, 2014 International Conference on Smart Computing Workshops.

[28]  Harjot Kaur,et al.  K-MLP Based Classifier for Discernment of Gratuitous Mails using N-Gram Filtration , 2017 .

[29]  Kaveh Ahmadi,et al.  Predicting e-Customer Behavior in B2C Relationships for CLV Model , 2011 .

[30]  Brett Browning,et al.  Learning to Predict Driver Route and Destination Intent , 2006, 2006 IEEE Intelligent Transportation Systems Conference.

[31]  W. Ochieng,et al.  An Extended Kalman Filter Algorithm for Integrating GPS and Low Cost Dead Reckoning System Data for Vehicle Performance and Emissions Monitoring , 2003 .

[32]  Juan A. Besada,et al.  Human Computer Interactions in Next-Generation of Aircraft Smart Navigation Management Systems: Task Analysis and Architecture under an Agent-Oriented Methodological Approach , 2015, Sensors.

[33]  M. Parulekar,et al.  Automatic vehicle navigation using Dijkstra's Algorithm , 2013, 2013 International Conference on Advances in Technology and Engineering (ICATE).

[34]  Hui Zhao,et al.  A Finite Equivalence of Verifiable Multi-secret Sharing , 2012, Int. J. Comput. Intell. Syst..

[35]  Jin B. Hong,et al.  A framework for automating security analysis of the internet of things , 2017, J. Netw. Comput. Appl..

[36]  Miriam Seoane Santos,et al.  Predicting Breast Cancer Recurrence Using Machine Learning Techniques , 2016, ACM Comput. Surv..

[37]  Soma Bandyopadhyay,et al.  Privacy for IoT: Involuntary privacy enablement for smart energy systems , 2015, 2015 IEEE International Conference on Communications (ICC).

[38]  Rinusha Irudeen,et al.  Big data solution for Sri Lankan development: A case study from travel and tourism , 2013, 2013 International Conference on Advances in ICT for Emerging Regions (ICTer).

[39]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[40]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[41]  Punit Gupta,et al.  A Framework of Creating Intelligent Power Profiles in Operating Systems to Minimize Power Consumption and Greenhouse Effect Caused by Computer Systems , 2011 .

[42]  Cheng Hu,et al.  Complex data collection in large-scale RFID systems , 2014, 2014 International Conference on Smart Computing.

[43]  Zhu Zhenmin,et al.  Heart rate measurement via smart phone acceleration sensor , 2014, 2014 International Conference on Smart Computing.

[44]  Albrecht Schmidt,et al.  Embedded Interaction: Interacting with the Internet of Things , 2010, IEEE Internet Computing.

[45]  Qian Wang,et al.  Predictive Guidance and Control Framework for (Semi-)Autonomous Vehicles in Public Traffic , 2017, IEEE Transactions on Control Systems Technology.

[46]  Sajal K. Das,et al.  Ensuring energy efficient coverage for participatory sensing in urban streets , 2014, 2014 International Conference on Smart Computing.

[47]  Hendrik,et al.  Trip Guidance: A Linked Data Based Mobile Tourists Guide , 2014 .

[48]  Chih-Hung Chang,et al.  Development of shortest path computing mechanism with consideration of commercial vehicles characteristics , 2014, 2014 International Conference on Smart Computing Workshops.

[49]  Weigang Wu,et al.  A navigation route based minimum dominating set algorithm in VANETs , 2014, 2014 International Conference on Smart Computing Workshops.

[50]  Myeonggil Choi,et al.  Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations , 2015 .

[51]  Jong Hyuk Park,et al.  Adaptive Body Posture Analysis for Elderly-Falling Detection with Multisensors , 2010, IEEE Intelligent Systems.

[52]  Michael S. Hsiao,et al.  Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[53]  William J. Buchanan,et al.  Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[54]  Mengyin Fu,et al.  A practical route planning algorithm for vehicle navigation system , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).

[55]  David Lillethun,et al.  Mobile fog: a programming model for large-scale applications on the internet of things , 2013, MCC '13.

[56]  Jure Leskovec,et al.  Understanding Behaviors that Lead to Purchasing: A Case Study of Pinterest , 2016, KDD.

[57]  Matthew Barth,et al.  Vehicle route prediction and time of arrival estimation techniques for improved transportation system management , 2003, IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No.03TH8683).

[58]  Pan Li,et al.  Context-aware scheduling algorithm in smart home system , 2013, China Communications.

[59]  Mostafa Azizi,et al.  Classification of major security attacks against RFID systems , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).

[60]  Blaine Nelson,et al.  Can machine learning be secure? , 2006, ASIACCS '06.

[61]  Adeel Anjum,et al.  BangA: An Efficient and Flexible Generalization-Based Algorithm for Privacy Preserving Data Publication , 2017, Comput..

[62]  Hongming Cai,et al.  Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services , 2014, IEEE Transactions on Industrial Informatics.

[63]  G. Singh,et al.  User centric framework of power schemes for minimizing energy consumption by computer systems , 2012, 2012 International Conference on Radar, Communication and Computing (ICRCC).

[64]  Abdul Hanan Abdullah,et al.  Design of accurate vehicle location system using RFID , 2013 .

[65]  Rebecca Montanari,et al.  Context-Aware Middleware for Anytime, Anywhere Social Networks , 2007, IEEE Intelligent Systems.

[66]  Saima Abdullah,et al.  An Energy Efficient Message Scheduling Algorithm Considering Node Failure in IoT Environment , 2014, Wireless Personal Communications.

[67]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[68]  Surendra Sarnikar,et al.  A framework for developing a domain specific business intelligence maturity model: Application to healthcare , 2015, Int. J. Inf. Manag..

[69]  Raul Aquino-Santos,et al.  Ubiquitous computing and ambient intelligence for smart homes applications , 2012, World Automation Congress 2012.

[70]  Gerd Kortuem,et al.  Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.

[71]  Mo Chen,et al.  FaSTrack: A modular framework for fast and guaranteed safe motion planning , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[72]  Devu Manikantan Shila,et al.  Design, implementation and security analysis of Hardware Trojan Threats in FPGA , 2014, 2014 IEEE International Conference on Communications (ICC).

[73]  Adnan Shahzada,et al.  Dynamic vehicle navigation: An A* algorithm based approach using traffic and road information , 2011, 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE).

[74]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[75]  L. Baum,et al.  A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains , 1970 .

[76]  Yi-Ming Chen,et al.  Autonomic Navigation System Based on Predicted Traffic and VANETs , 2017, Wirel. Pers. Commun..

[77]  Hui Li,et al.  Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[78]  Sudha Devi Dorairaj,et al.  An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment , 2015, TheScientificWorldJournal.

[79]  Xiaolei Dong,et al.  Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.

[80]  Jiafu Wan,et al.  Energy Management Framework Designed for Autonomous Electric Vehicle with Sensor Networks Navigation , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.

[81]  Laurence T. Yang,et al.  Cyberentity Security in the Internet of Things , 2013, Computer.

[82]  Roberto Baldoni,et al.  Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments , 2017, ITASEC.

[83]  Tossapon Boongoen,et al.  Generating descriptive model for student dropout: a review of clustering approach , 2017, Human-centric Computing and Information Sciences.

[84]  S.K. Singh,et al.  Smart real-time traffic congestion estimation and clustering technique for urban vehicular roads , 2016, 2016 IEEE Region 10 Conference (TENCON).

[85]  Jiafu Wan,et al.  IoT sensing framework with inter-cloud computing capability in vehicular networking , 2014, Electron. Commer. Res..

[86]  David Eppstein,et al.  Finding the k Shortest Paths , 1999, SIAM J. Comput..

[87]  Karen Kent,et al.  Guide to Computer Security Log Management , 2006 .

[88]  G. Singh,et al.  A Novel Human Computer Interaction Aware Algorithm to Minimize Energy Consumption , 2015, Wirel. Pers. Commun..

[89]  Tze Wei Liew,et al.  Exploring the effects of a non-interactive talking avatar on social presence, credibility, trust, and patronage intention in an e-commerce website , 2017, Human-centric Computing and Information Sciences.

[90]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[91]  Vijay Varadharajan,et al.  Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.

[92]  S. Ventylees Raj Implementation of pervasive computing based high-secure smart home system , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.

[93]  Wen-Zhan Song,et al.  DCTP: Data collecting based on trajectory prediction in Smart Environment , 2014, 2014 International Conference on Smart Computing Workshops.

[94]  Giuseppe Anastasi,et al.  E-Net-Manager: A power management system for networked PCs based on soft sensors , 2014, 2014 International Conference on Smart Computing.

[95]  Jimeng Sun,et al.  PARAMO: A PARAllel predictive MOdeling platform for healthcare analytic research using electronic health records , 2014, J. Biomed. Informatics.

[96]  Wei Huang,et al.  Design of a Fault Detection and Isolation System for Intelligent Vehicle Navigation System , 2015 .

[97]  Dinesha H.A,et al.  Evaluation of Secure Cloud Transmission Protocol , 2017 .

[98]  J. Doug Tygar,et al.  Adversarial machine learning , 2019, AISec '11.

[99]  Sherif Sakr,et al.  Towards a Comprehensive Data Analytics Framework for Smart Healthcare Services , 2016, Big Data Res..

[100]  David C. Keezer,et al.  A Novel Approach to Detect Hardware Trojan Attacks on Primary Data Inputs , 2015, WESS.

[101]  L. Arockiam,et al.  A Security Service Algorithm to Ensure the Confidentiality of Data in Cloud Storageq , 2014 .

[102]  Reza Malekian,et al.  A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres , 2017, Multimedia Tools and Applications.

[103]  Erik Jenelius,et al.  Integrated framework for real-time urban network travel time prediction on sparse probe data , 2018 .

[104]  Ghanshyam Singh,et al.  Energy-Sustainable Framework and Performance Analysis of Power Scheme for Operating Systems: A Tool , 2012 .

[105]  Nick Feamster,et al.  A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.

[106]  Kim-Kwang Raymond Choo,et al.  Applications of computational intelligence in vehicle traffic congestion problem: a survey , 2017, Soft Computing.

[107]  Roberto Di Pietro,et al.  Smart health: A context-aware health paradigm within smart cities , 2014, IEEE Communications Magazine.

[108]  Jong Hyuk Park,et al.  Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions , 2017, J. Ambient Intell. Humaniz. Comput..

[109]  Jiangtao Qiu A predictive Model for Customer Purchase Behavior in E-Commerce Context , 2014, PACIS.

[110]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[111]  A. Goldberg,et al.  A heuristic improvement of the Bellman-Ford algorithm , 1993 .

[112]  Guojun Peng,et al.  Application of Internet of Things in Development of e-Navigation Architecture , 2015 .

[113]  John Krumm,et al.  Route Prediction from Trip Observations , 2008 .

[114]  G. Dong,et al.  Journey to the east: Diverse routes and variable flowering times for wheat and barley en route to prehistoric China , 2017, PloS one.

[115]  Keon Chul Park,et al.  Security assessment framework for IoT service , 2016, Telecommunication Systems.

[116]  Wu Chen,et al.  Adaptive Kalman Filtering for Vehicle Navigation , 2003 .

[117]  Xiaojun Cao,et al.  Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects , 2014, IEEE Internet of Things Journal.

[118]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[119]  Malcolm Clarke,et al.  Exploring a New Security Framework for Remote Patient Monitoring Devices , 2017, Comput..

[120]  Yi Mei,et al.  CAPRA: A contour-based accessible path routing algorithm , 2017, Inf. Sci..

[121]  Young-Sik Jeong,et al.  Large-Scale Middleware for Ubiquitous Sensor Networks , 2010, IEEE Intelligent Systems.

[122]  Yi Mu,et al.  Privacy-Preserved Access Control for Cloud Computing , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[123]  D Bokefode Jayant,et al.  Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model , 2015 .

[124]  JongHyun Park,et al.  A middleware for smart object in ubiquitous computing environment , 2012, 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT).

[125]  Laura Maria Badea Predicting Consumer Behavior with Artificial Neural Networks , 2014 .

[126]  Alessandro Bassi,et al.  From today's INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view , 2010, IEEE Wireless Communications.

[127]  Muthu Ramachandran,et al.  Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .

[128]  Chin-Ling Chen,et al.  An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing , 2017, J. Sensors.

[129]  Xiaodong Lin,et al.  SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.

[130]  Qingquan Li,et al.  A Sensor-Fusion Drivable-Region and Lane-Detection System for Autonomous Vehicle Navigation in Challenging Road Scenarios , 2014, IEEE Transactions on Vehicular Technology.

[131]  Yu Zhang,et al.  A new data aggregation technique in multi-sink wireless sensor networks , 2014, 2014 International Conference on Smart Computing Workshops.

[132]  Afrand Agah,et al.  Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..

[133]  Reza Malekian,et al.  Smart Vehicle Navigation System Using Hidden Markov Model and RFID Technology , 2016, Wirel. Pers. Commun..

[134]  Yan Zhao,et al.  Providing privacy preserving in cloud computing , 2009, 2009 International Conference on Test and Measurement.

[135]  Ulrich Greveler,et al.  A Privacy Preserving System for Cloud Computing , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.

[136]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[137]  Chun-Chieh Wang,et al.  Integration of Disaster Detection and Warning System for a Smart Vehicle , 2014 .

[138]  K. R. Singh,et al.  Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[139]  Qian Zhang,et al.  Code-Centric RFID System Based on Software Agent Intelligence , 2010, IEEE Intelligent Systems.

[140]  M. Farhatullah,et al.  PccP: A model for Preserving cloud computing Privacy , 2012, 2012 International Conference on Data Science & Engineering (ICDSE).

[141]  Mirza Aamir Mehmood,et al.  Implementation of Eap with RSA for Enhancing The Security of Cloud Computing , 2012 .

[142]  Peter Friess,et al.  Internet of Things Strategic Research Roadmap , 2011 .

[143]  Chung-Horng Lung,et al.  Smart Home: Integrating Internet of Things with Web Services and Cloud Computing , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[144]  Kashif Munir,et al.  FRAMEWORK FOR SECURE CLOUD COMPUTING , 2013, CloudCom 2013.

[145]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[146]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.