Security Challenges and Resolution in Cloud Computing and Cloud of Things

Cloud computing is a developing zone of computing innovation that shapes the handling power and the computing assets of many associated, topographically separated PCs associated by means of internet. Cloud computing wipes out the need of having a total framework of equipment and programming to meet clients’ prerequisites and applications. It very well may be thought of as a total or an incomplete outsourcing of equipment and programming assets. To get to cloud applications, a great internet association and a standard internet program are required. Cloud computing has its own particular downside from the security perspective; this chapter addresses the vast majority of these dangers and their conceivable arrangements. Cloud computing gives its client numerous abilities like getting to an expansive number of utilizations without the requirement for having a permit, acquiring, introducing, or downloading any of these applications. Security Challenges and Resolution in Cloud Computing and Cloud of Things

[1]  Mamata Rath,et al.  Study and Analysis of Smart Applications in Smart City Context , 2017, 2017 International Conference on Information Technology (ICIT).

[2]  G. P. Biswas,et al.  Networking for IoT and applications using existing communication technology , 2017, Egyptian Informatics Journal.

[3]  Binod Kumar Pattanayak,et al.  Network Security: Attacks and Control in MANET , 2018 .

[4]  Binod Kumar Pattanayak,et al.  Energy Efficient MANET Protocol Using Cross Layer Design for Military Applications , 2016 .

[5]  Franco Callegati,et al.  Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective , 2017, Comput. Secur..

[6]  N. Sukavanam,et al.  An unsupervised learning based neural network approach for a robotic manipulator , 2017 .

[7]  Hamza Gharsellaoui,et al.  Privacy and Security in Internet-based Computing: Cloud Computing, Internet of Things, Cloud of Things: a review , 2017, KES.

[8]  Mamata Rath Information Security Problem and Solution Approaches in Social Applications , 2019 .

[9]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[10]  Antonio Scarfò The Cyber Security Challenges in the IoT Era , 2018 .

[11]  Binod Kumar Pattanayak,et al.  Resource Reservation and Improved QoS for Real Time Applications in MANET , 2016 .

[12]  Mamata Rath,et al.  Resource provision and QoS support with added security for client side applications in cloud computing , 2019 .

[13]  Alan Eardley,et al.  Identity Management in the Internet of Things: the Role of MANETs for Healthcare Applications , 2013 .

[14]  Ion Bica,et al.  A security authorization scheme for smart home Internet of Things devices , 2017, Future Gener. Comput. Syst..

[15]  Binod Kumar Pattanayak,et al.  Mobile Agent-Based Improved Traffic Control System in VANET , 2018, Integrated Intelligent Computing, Communication and Security.

[16]  A. Radhakrishnan,et al.  Energy Aware Resource Allocation Model for IaaS Optimization , 2018 .

[17]  Victor I. Chang,et al.  Efficient algorithm for traffic engineering in Cloud-of-Things and edge computing , 2018, Comput. Electr. Eng..

[18]  Binod Kumar Pattanayak,et al.  A Mobile Agent based Intrusion Detection System Architecture for Mobile Ad Hoc Networks , 2014, J. Comput. Sci..

[19]  Imed Romdhani,et al.  Existing Security Scheme for IoT , 2017 .

[20]  Enji Sun,et al.  The internet of things (IOT) and cloud computing (CC) based tailings dam monitoring and pre-alarm system in mines , 2012 .

[21]  Wei Li,et al.  A dynamic tradeoff data processing framework for delay-sensitive applications in Cloud of Things systems , 2018, J. Parallel Distributed Comput..

[22]  Javad Rezazadeh,et al.  Middleware Technologies for Cloud of Things - a survey , 2017, Digit. Commun. Networks.

[23]  Mamata Rath Effective Routing in Mobile Ad-hoc Networks With Power and End-to-End Delay Optimization: Well Matched With Modern Digital IoT Technology , 2018 .

[24]  Kim-Kwang Raymond Choo,et al.  Internet- and cloud-of-things cybersecurity research challenges and advances , 2018, Comput. Secur..

[25]  Binod Kumar Pattanayak,et al.  MAQ: A Mobile Agent Based Quality of Service Platform for MANETs , 2017, Int. J. Bus. Data Commun. Netw..

[26]  K. Saravanan,et al.  Examining IoT's Applications Using Cloud Services , 2018 .

[27]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[28]  K. Saravanan Cloud Robotics: Robot Rides on the Cloud – Architecture, Applications, and Challenges , 2017 .

[29]  Binod Kumar Pattanayak,et al.  Monitoring of QoS in MANET Based Real Time Applications , 2017 .

[30]  Victor I. Chang,et al.  Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare , 2018, Future Gener. Comput. Syst..

[31]  Mamata Rath,et al.  MAQ system development in mobile ad-hoc networks using mobile agents , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).

[32]  Binod Kumar Pattanayak,et al.  Comparative analysis of AODV routing protocols based on network performance parameters in Mobile Adhoc Networks , 2016 .

[33]  Binod Kumar Pattanayak,et al.  Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET , 2019, Int. J. Inf. Secur. Priv..

[34]  K. Saravanan,et al.  Cloud IOT based novel livestock monitoring and identification system using UID , 2018 .

[35]  Mamata Rath Delay and power based network assessment of network layer protocols in MANET , 2015, 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[36]  Imran A. Zualkernan,et al.  A smart home energy management system using IoT and big data analytics approach , 2017, IEEE Transactions on Consumer Electronics.

[37]  Mamata Rath,et al.  An Exhaustive Study and Analysis of Assorted Application and Challenges in Fog Computing and Emerging Ubiquitous Computing Technology , 2018, Int. J. Appl. Evol. Comput..

[38]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[39]  Imed Romdhani,et al.  Confidentiality and Security for IoT Based Healthcare , 2017 .

[40]  Mamata Rath,et al.  Prioritization of Security Measures at the Junction of MANET and IoT , 2016, ICTCS '16.

[41]  Binod Kumar Pattanayak,et al.  Relevance of Soft Computing Techniques in the Significant Management of Wireless Sensor Networks , 2018, Soft Computing in Wireless Sensor Networks.

[42]  Binod Kumar Pattanayak,et al.  Design and Development of Secured Framework for Efficient Routing in Vehicular Ad-Hoc Network , 2019, Int. J. Bus. Data Commun. Netw..

[43]  Zhihan Lv,et al.  Next-Generation Big Data Analytics: State of the Art, Challenges, and Future Research Topics , 2017, IEEE Transactions on Industrial Informatics.

[44]  Antonio Iera,et al.  Federated IoT services leveraging 5G technologies at the edge , 2018, Ad Hoc Networks.

[45]  Binod Kumar Pattanayak,et al.  Cross layer based QoS platform for multimedia transmission in MANET , 2017, 2017 11th International Conference on Intelligent Systems and Control (ISCO).

[46]  Mamata Rath,et al.  Communication Improvement and Traffic Control Based on V2I in Smart City Framework , 2018 .

[47]  Binod Kumar Pattanayak,et al.  Energy Competent Routing Protocol Design in MANET with Real Time Application Provision , 2015, Int. J. Bus. Data Commun. Netw..

[48]  Mamata Rath,et al.  Security Issues in Mobile Devices and Mobile Adhoc Networks , 2018 .

[49]  Joshua James,et al.  Evidence identification in IoT networks based on threat assessment , 2017, Future Gener. Comput. Syst..

[50]  Gianfranco Cerullo,et al.  IoT and Sensor Networks Security , 2018 .

[51]  Binod Kumar Pattanayak,et al.  Inter-layer communication based QoS platform for real time multimedia applications in MANET , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[52]  Binod Kumar Pattanayak,et al.  A methodical survey on real time applications in MANETS: Focussing on key issues , 2014, 2014 International Conference on High Performance Computing and Applications (ICHPCA).

[53]  Binod Kumar Pattanayak,et al.  SCICS: A Soft Computing Based Intelligent Communication System in VANET , 2017 .

[54]  Shancang Li Security Requirements in IoT Architecture , 2017 .