Abstract
In the recent era cloud computing is being extensively used for numerous services. Since, adoption has security concerns. Therefore, this research work presents attestation innards to evaluate the metamorphosis utility of mobile and electronic health data transmission through cloud network and it better comprehends the idea of infiltration trialing and susceptibility assessment. The proposed approach of this research work contains information on common threats to cloud based mobile health services and their corresponding solutions. The idea of this research work is to utilize Internet Communication Technology (ICT), Internet of Things (IoT) and Embedded Computing Technology (ECT) to enhance the performance of secure cloud (SecC) based m-health data transmission services. In this research work the author has explored a new and secure cloud based service which can upgrade the concert of cloud based m-health transmission systems. Here, an advanced internet communication machinery (ICM) based on IP-WSN (Internet Protocol-Wireless Sensor Network), scattered scheme architectures, web-computing, wisdom and motivation is used for enhancing the performance of cloud based m-health data communication systems. The cloud server of proposed m-health system will also provide access and control mechanism for multiple types of vehicles on roads and hence the proposed system will be helpful in enhancing the safety of passengers while they are travelling from their houses to the e-health hospitals. The services and safety of cloud based m-health data transmission services can be optimized in real-time situations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmed, I., James, A., & Singh, D. (2013). Critical analysis of counter mode with cipher block chain message authentication mode protocol—CCMP. Security and Communication Networks, 7(2), 293–308.
Ahuja, R. (2011). SLA based scheduler for cloud storage and computational services. International Conference on Computational Science and Applications (ICCSA), pp. 258–262.
Alani, M. M. (2010). Testing randomness of block-ciphers using diehard test. International Journal of Computer Science and Network Security, 10(4), 53–57.
Albeshri, A., & Caelli, W. (2010). Mutual protection in a cloud computing environment. 12th IEEE international conference on High performance Computing and Communications (HPCC), pp. 641–646.
Alger, D. (2005, June). Build the best data center facility for your business. Indianapolis: Cisco Press Book.
Ali, S. A., & Alam, M., (2016). A relative study of task scheduling algorithms in cloud computing environment. In Proceedings of the 2nd international conference on contemporary computing and informatics (IC3I 2016), pp. 105–111.
Almulla, S., & Chon, Y.-Y. (2010). Cloud computing security management. 2nd international conference on engineering systems management and its applications, pp. 1–7.
Behl, A. (2011). Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. In Proceedings of the World Congress on Information and Communication Technologies (WICT’11), pp. 1–5.
Bellare, M., Kilian, J., & Rogaway, P. (2001). The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 61(3), 362–399.
Bellare, M., Kohno, T., & Namprempre, C. (2002). Authenticated encryption in SSH: Provably fixing the SSH binary packet protocol. In V. Altari, S. Jajodia, & R. Sandhu (Eds.), Proceedings of 9th annual conference on Computer and Communications Security – CCS 2002, held 18–22 November 2002 in Washington, USA (pp. 1–11). New York: ACM Publication.
Black, J., & Rogaway, P. (2000). A suggestion for handling arbitrary-length messages with the CBC-MAC. In M. Bellare (Ed.), Proceedings of 20th annual international conference of advances in cryptology – CRYPTO 2000, Lecture notes in computer science 1880, held 20–24 August 2000 in Santa Barbara, USA (pp. 197–215). Berlin: Springer.
Buyya, R., Yeo, C. S., & Venugopal, S. (2008). Market oriented Cloud Computing: Vision, hype, and reality for delivering IT services as computing utilities. In Proceedings of the 10th IEEE international conference on High Performance Computing and Communications (HPCC 2008, IEEE CS Press, Los Alamitos, CA, USA), Dalian, China, September 25–27, pp. 1–9.
Caballero, J., Yin, H., Liang, Z., & Song, D. (2007). Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In P. Ning (Ed.), Proceedings of the 14th ACM conference on Computer and Communications Security – CCS 2007, held 28–31 October 2007 in Whistler, Canada (pp. 317–329). New York: ACM Publication.
Chadwick, D. W., & Fatema, K. (2012). A privacy preserving authorization system for the Cloud. Journal of Computer and System Sciences, 78(5), 1359–1373.
Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing. In Proceeding of the International Conference on Computer Science and Electronics Engineering (ICCSEE’12), pp. 1–5.
Handley, M., & Rescorla, E. (2006). Internet denial-of-service considerations. In Internet engineering task force (Technical report, pp. 1–38).
Hogan, M., Liu, F., Sokol, A., & Tong, J. (2011). NIST cloud computing standards roadmap – Version 1.0 (National Institute of Standard Technology Special Publication, 500-291, pp. 1–63).
http://cloudcomputing.sys-con.com/node/612375/print. Accessed on May 5 2016.
http://searchsecurity.techtarget.com/definition/authentication-authorization-and-accounting. Last Accessed On: May 5, 2017.
Johnson, D. H. (1999). The Insignificance of Statistical Significance Testing. The Journal of Wildlife Management, 63(3), 763–772.
Kardaş, S., Çelik, S., Bingöl, M. A., & Levi, A. (2013). A new security and privacy framework for RFID in cloud computing. In Proceedings of the 5th IEEE international conference on cloud computing technology and science (CloudCom’13), pp. 1–5.
Khalid, U., Ghafoor, A., Irum, M., & Awais Shibli, M. (2013). Cloud based secure and privacy enhanced authentication and authorization protocol. Procedia Computer Science, 22, 680–688.
Khan, S., Shakil, K. A., & Alam, M. (2017a). Cloud based big data analytics: A survey of current research and future directions. In Big data analytics, electronic (pp. 629–640). Springer.
Khan, S., Liub, X., Shakil, K. A., & Alam, M. (2017b). A survey on scholarly data: From big data perspective. Information Processing & Management, 53(4), 923–944.
Khodadadi, F., Calheiros, R. N., & Buyya, R. (2015). A data-centric framework for development and deployment of internet of things applications in clouds. In Proceedings of the 10th IEEE international conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2015), Singapore, April 7–9, pp. 1–6.
Klein, D. A. (2013). Data security for digital data storage. U.S. Patent Application 14/022,095, 2013.
Mahmood, Z. (2011). Data location and security issues in cloud computing. In Proceedings of the 2nd IEEE international conference on Emerging Intelligent Data and Web Technologies (EIDWT’11), pp. 49–54.
Malhotra, S., Doja, M. N., Alam, B., & Alam, M. (2017). Generalized query processing mechanism in cloud database management system, big data analytics. Electronic, Springer, pp. 641–648.
Masson, M. E. J., & Loftus, G. R. (2003). Using confidence intervals for graphically based data interpretation. Canadian Journal of Experimental Psychology, 57(3), 203.
Mell, P., & Grance, T. (2009). The NIST definition of cloud computing, version 15, National Institute of standards and Technology (NIST), Information Technology Laboratory, pp. 1–3. Online Available On: www.csrc.nist.gov. Last Accessed on July 21, 2017.
Miller, M. (2008). Cloud computing: Web based applications that change the way you work and collaborate online. Indianapolis: Que Publication.
NIST Publication. (2001). Statistical test suite for random and pseudorandom number generators for cryptographic applications. http://csrc.nist.gov/publications/nistpubs/800-22/sp-800-22-051501.pdf. Online available May 6, 2017.
Pandey, A., Tugnayat, R. M., & Tiwari, A. K. (2013). Data security framework for cloud computing networks. International Journal of Computer Engineering & Technology, 4(1), 178–181.
Plummer, D. C., Smith, D., Bittman, T. J., Cearley, D. W., Cappuccio, D. J., Scott, D., Kumar, R., & Robertson, B. (2009). Gartner highlights five attributes of cloud computing. Gartner Report, G00167182, 1–5.
Robert, A. E., Manivasagam, G., Sasirekha, N., & Hemalatha, M. (2011). Reverse engineering for malicious code behaviour analysis using virtual security patching. International Journal of Computer Applications, 26(4), 41–45.
Rogaway, P., & Black, J. (2002). A block-cipher mode of operation for parallelizable message authentication. In L. R. Knudsen (Ed.), Proceedings of the international conference on theory and applications of cryptographic techniques, advances in cryptology – EUROCRYPT 2002, Lecture notes in computer science 2332, held 28 April–2 May 2002 in Amsterdam, Holland (pp 384–397). Berlin: Springer.
Saldhana, A., Marian, R., Barbir, A., & Jabbar, S. A. (2014). OASIS Cloud Authorization (CloudAuthZ). International Journal of Multimedia and Ubiquitous Engineering, 9(9), 81–90.
Sedigh, A., Radhakrishnan, K., Campbell, C. E.-A., & Singh, D. (2014). Trust evaluation of the current security measures against key network attacks. MAGNT Research Report, 2(4), 161–171.
Shakil, K. A., Sethi, S., & Alam, M. (2015). An effective framework for managing university data using a cloud based environment. computing for sustainable global development (INDIACom), IEEE 2nd international conference, pp. 1262–1266.
Shakil, K. A., Anis, S., Khan, S., & Alam, M. (2017). Dengue disease prediction using weka data mining tool. In Proceedings of IIRAJ International Conference (ICCI-SEM-2K17).
Singh, I., Rai, R., & Murarker, S. (2015a). Password authentication in cloud. International Journal of Engineering Research and Applications, 9(2 (Part I)), 56–59.
Singh, I., Mishra, K. N., Alberti, A., Singh, D., & Jara, A. (2015b). A novel privacy and security network for the cloud network services. 17th IEEE international conference on advanced communication technology, pp. 355–359.
Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Surveying and analyzing security, privacy and trust issues in cloud computing environments. In Proceedings of the international conference on advanced in Control Engineering and Information Science (CEIS’11), pp. 1–5.
Tan, Y., Sengupta, S., & Subbalakshmi, K. P. (2011). Analysis of coordinated denial-of-service attacks in ieee 802.22 networks. Selected Areas in Communications, IEEE Journal, 29(4), 890–902.
Van Bon, J., & Van Der Veen, A. (2007). Foundations of IT service management based on ITIL (Vol. 3). Zaltbommel: Van Haren Publishing.
Whiting, D., Housley, R., & Ferguson, N. (2002). AES encryption & authentication using CTR mode & CBC-MAC. http://csrc.nist.gov/groups/ST/toolkit/BCM/current_modes.html#03. Online available May 6, 2017.
Wijaya, C. (2011). Performance analysis of dynamic routing protocol EIGRP and OSPF in IPv4 and IPv6 network. First international conference on Informatics and Computational Intelligence (ICI), pp. 355–360.
Younis, M. Y. A., & Kifayat, K. (2013). Secure cloud computing for critical infrastructure: A survey. UK Liverpool John Moores University.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Mishra, K.N. (2020). Supervising Data Transmission Services Using Secure Cloud Based Validation and Admittance Control Mechanism. In: Alam, M., Shakil, K., Khan, S. (eds) Internet of Things (IoT). Springer, Cham. https://doi.org/10.1007/978-3-030-37468-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-37468-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37467-9
Online ISBN: 978-3-030-37468-6
eBook Packages: Computer ScienceComputer Science (R0)