Skip to main content

Supervising Data Transmission Services Using Secure Cloud Based Validation and Admittance Control Mechanism

  • Chapter
  • First Online:
Internet of Things (IoT)

Abstract

In the recent era cloud computing is being extensively used for numerous services. Since, adoption has security concerns. Therefore, this research work presents attestation innards to evaluate the metamorphosis utility of mobile and electronic health data transmission through cloud network and it better comprehends the idea of infiltration trialing and susceptibility assessment. The proposed approach of this research work contains information on common threats to cloud based mobile health services and their corresponding solutions. The idea of this research work is to utilize Internet Communication Technology (ICT), Internet of Things (IoT) and Embedded Computing Technology (ECT) to enhance the performance of secure cloud (SecC) based m-health data transmission services. In this research work the author has explored a new and secure cloud based service which can upgrade the concert of cloud based m-health transmission systems. Here, an advanced internet communication machinery (ICM) based on IP-WSN (Internet Protocol-Wireless Sensor Network), scattered scheme architectures, web-computing, wisdom and motivation is used for enhancing the performance of cloud based m-health data communication systems. The cloud server of proposed m-health system will also provide access and control mechanism for multiple types of vehicles on roads and hence the proposed system will be helpful in enhancing the safety of passengers while they are travelling from their houses to the e-health hospitals. The services and safety of cloud based m-health data transmission services can be optimized in real-time situations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ahmed, I., James, A., & Singh, D. (2013). Critical analysis of counter mode with cipher block chain message authentication mode protocol—CCMP. Security and Communication Networks, 7(2), 293–308.

    Article  Google Scholar 

  • Ahuja, R. (2011). SLA based scheduler for cloud storage and computational services. International Conference on Computational Science and Applications (ICCSA), pp. 258–262.

    Google Scholar 

  • Alani, M. M. (2010). Testing randomness of block-ciphers using diehard test. International Journal of Computer Science and Network Security, 10(4), 53–57.

    MathSciNet  Google Scholar 

  • Albeshri, A., & Caelli, W. (2010). Mutual protection in a cloud computing environment. 12th IEEE international conference on High performance Computing and Communications (HPCC), pp. 641–646.

    Google Scholar 

  • Alger, D. (2005, June). Build the best data center facility for your business. Indianapolis: Cisco Press Book.

    Google Scholar 

  • Ali, S. A., & Alam, M., (2016). A relative study of task scheduling algorithms in cloud computing environment. In Proceedings of the 2nd international conference on contemporary computing and informatics (IC3I 2016), pp. 105–111.

    Google Scholar 

  • Almulla, S., & Chon, Y.-Y. (2010). Cloud computing security management. 2nd international conference on engineering systems management and its applications, pp. 1–7.

    Google Scholar 

  • Behl, A. (2011). Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. In Proceedings of the World Congress on Information and Communication Technologies (WICT’11), pp. 1–5.

    Google Scholar 

  • Bellare, M., Kilian, J., & Rogaway, P. (2001). The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 61(3), 362–399.

    Article  MathSciNet  Google Scholar 

  • Bellare, M., Kohno, T., & Namprempre, C. (2002). Authenticated encryption in SSH: Provably fixing the SSH binary packet protocol. In V. Altari, S. Jajodia, & R. Sandhu (Eds.), Proceedings of 9th annual conference on Computer and Communications Security – CCS 2002, held 18–22 November 2002 in Washington, USA (pp. 1–11). New York: ACM Publication.

    Google Scholar 

  • Black, J., & Rogaway, P. (2000). A suggestion for handling arbitrary-length messages with the CBC-MAC. In M. Bellare (Ed.), Proceedings of 20th annual international conference of advances in cryptology – CRYPTO 2000, Lecture notes in computer science 1880, held 20–24 August 2000 in Santa Barbara, USA (pp. 197–215). Berlin: Springer.

    Google Scholar 

  • Buyya, R., Yeo, C. S., & Venugopal, S. (2008). Market oriented Cloud Computing: Vision, hype, and reality for delivering IT services as computing utilities. In Proceedings of the 10th IEEE international conference on High Performance Computing and Communications (HPCC 2008, IEEE CS Press, Los Alamitos, CA, USA), Dalian, China, September 25–27, pp. 1–9.

    Google Scholar 

  • Caballero, J., Yin, H., Liang, Z., & Song, D. (2007). Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In P. Ning (Ed.), Proceedings of the 14th ACM conference on Computer and Communications Security – CCS 2007, held 28–31 October 2007 in Whistler, Canada (pp. 317–329). New York: ACM Publication.

    Google Scholar 

  • Chadwick, D. W., & Fatema, K. (2012). A privacy preserving authorization system for the Cloud. Journal of Computer and System Sciences, 78(5), 1359–1373.

    Article  Google Scholar 

  • Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing. In Proceeding of the International Conference on Computer Science and Electronics Engineering (ICCSEE’12), pp. 1–5.

    Google Scholar 

  • Handley, M., & Rescorla, E. (2006). Internet denial-of-service considerations. In Internet engineering task force (Technical report, pp. 1–38).

    Google Scholar 

  • Hogan, M., Liu, F., Sokol, A., & Tong, J. (2011). NIST cloud computing standards roadmap – Version 1.0 (National Institute of Standard Technology Special Publication, 500-291, pp. 1–63).

    Google Scholar 

  • http://cloudcomputing.sys-con.com/node/612375/print. Accessed on May 5 2016.

  • http://searchsecurity.techtarget.com/definition/authentication-authorization-and-accounting. Last Accessed On: May 5, 2017.

  • Johnson, D. H. (1999). The Insignificance of Statistical Significance Testing. The Journal of Wildlife Management, 63(3), 763–772.

    Article  Google Scholar 

  • KardaÅŸ, S., Çelik, S., Bingöl, M. A., & Levi, A. (2013). A new security and privacy framework for RFID in cloud computing. In Proceedings of the 5th IEEE international conference on cloud computing technology and science (CloudCom’13), pp. 1–5.

    Google Scholar 

  • Khalid, U., Ghafoor, A., Irum, M., & Awais Shibli, M. (2013). Cloud based secure and privacy enhanced authentication and authorization protocol. Procedia Computer Science, 22, 680–688.

    Article  Google Scholar 

  • Khan, S., Shakil, K. A., & Alam, M. (2017a). Cloud based big data analytics: A survey of current research and future directions. In Big data analytics, electronic (pp. 629–640). Springer.

    Google Scholar 

  • Khan, S., Liub, X., Shakil, K. A., & Alam, M. (2017b). A survey on scholarly data: From big data perspective. Information Processing & Management, 53(4), 923–944.

    Article  Google Scholar 

  • Khodadadi, F., Calheiros, R. N., & Buyya, R. (2015). A data-centric framework for development and deployment of internet of things applications in clouds. In Proceedings of the 10th IEEE international conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2015), Singapore, April 7–9, pp. 1–6.

    Google Scholar 

  • Klein, D. A. (2013). Data security for digital data storage. U.S. Patent Application 14/022,095, 2013.

    Google Scholar 

  • Mahmood, Z. (2011). Data location and security issues in cloud computing. In Proceedings of the 2nd IEEE international conference on Emerging Intelligent Data and Web Technologies (EIDWT’11), pp. 49–54.

    Google Scholar 

  • Malhotra, S., Doja, M. N., Alam, B., & Alam, M. (2017). Generalized query processing mechanism in cloud database management system, big data analytics. Electronic, Springer, pp. 641–648.

    Google Scholar 

  • Masson, M. E. J., & Loftus, G. R. (2003). Using confidence intervals for graphically based data interpretation. Canadian Journal of Experimental Psychology, 57(3), 203.

    Article  Google Scholar 

  • Mell, P., & Grance, T. (2009). The NIST definition of cloud computing, version 15, National Institute of standards and Technology (NIST), Information Technology Laboratory, pp. 1–3. Online Available On: www.csrc.nist.gov. Last Accessed on July 21, 2017.

  • Miller, M. (2008). Cloud computing: Web based applications that change the way you work and collaborate online. Indianapolis: Que Publication.

    Google Scholar 

  • NIST Publication. (2001). Statistical test suite for random and pseudorandom number generators for cryptographic applications. http://csrc.nist.gov/publications/nistpubs/800-22/sp-800-22-051501.pdf. Online available May 6, 2017.

  • Pandey, A., Tugnayat, R. M., & Tiwari, A. K. (2013). Data security framework for cloud computing networks. International Journal of Computer Engineering & Technology, 4(1), 178–181.

    Google Scholar 

  • Plummer, D. C., Smith, D., Bittman, T. J., Cearley, D. W., Cappuccio, D. J., Scott, D., Kumar, R., & Robertson, B. (2009). Gartner highlights five attributes of cloud computing. Gartner Report, G00167182, 1–5.

    Google Scholar 

  • Robert, A. E., Manivasagam, G., Sasirekha, N., & Hemalatha, M. (2011). Reverse engineering for malicious code behaviour analysis using virtual security patching. International Journal of Computer Applications, 26(4), 41–45.

    Article  Google Scholar 

  • Rogaway, P., & Black, J. (2002). A block-cipher mode of operation for parallelizable message authentication. In L. R. Knudsen (Ed.), Proceedings of the international conference on theory and applications of cryptographic techniques, advances in cryptology – EUROCRYPT 2002, Lecture notes in computer science 2332, held 28 April–2 May 2002 in Amsterdam, Holland (pp 384–397). Berlin: Springer.

    Google Scholar 

  • Saldhana, A., Marian, R., Barbir, A., & Jabbar, S. A. (2014). OASIS Cloud Authorization (CloudAuthZ). International Journal of Multimedia and Ubiquitous Engineering, 9(9), 81–90.

    Article  Google Scholar 

  • Sedigh, A., Radhakrishnan, K., Campbell, C. E.-A., & Singh, D. (2014). Trust evaluation of the current security measures against key network attacks. MAGNT Research Report, 2(4), 161–171.

    Google Scholar 

  • Shakil, K. A., Sethi, S., & Alam, M. (2015). An effective framework for managing university data using a cloud based environment. computing for sustainable global development (INDIACom), IEEE 2nd international conference, pp. 1262–1266.

  • Shakil, K. A., Anis, S., Khan, S., & Alam, M. (2017). Dengue disease prediction using weka data mining tool. In Proceedings of IIRAJ International Conference (ICCI-SEM-2K17).

    Google Scholar 

  • Singh, I., Rai, R., & Murarker, S. (2015a). Password authentication in cloud. International Journal of Engineering Research and Applications, 9(2 (Part I)), 56–59.

    Google Scholar 

  • Singh, I., Mishra, K. N., Alberti, A., Singh, D., & Jara, A. (2015b). A novel privacy and security network for the cloud network services. 17th IEEE international conference on advanced communication technology, pp. 355–359.

    Google Scholar 

  • Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Surveying and analyzing security, privacy and trust issues in cloud computing environments. In Proceedings of the international conference on advanced in Control Engineering and Information Science (CEIS’11), pp. 1–5.

    Google Scholar 

  • Tan, Y., Sengupta, S., & Subbalakshmi, K. P. (2011). Analysis of coordinated denial-of-service attacks in ieee 802.22 networks. Selected Areas in Communications, IEEE Journal, 29(4), 890–902.

    Article  Google Scholar 

  • Van Bon, J., & Van Der Veen, A. (2007). Foundations of IT service management based on ITIL (Vol. 3). Zaltbommel: Van Haren Publishing.

    Google Scholar 

  • Whiting, D., Housley, R., & Ferguson, N. (2002). AES encryption & authentication using CTR mode & CBC-MAC. http://csrc.nist.gov/groups/ST/toolkit/BCM/current_modes.html#03. Online available May 6, 2017.

  • Wijaya, C. (2011). Performance analysis of dynamic routing protocol EIGRP and OSPF in IPv4 and IPv6 network. First international conference on Informatics and Computational Intelligence (ICI), pp. 355–360.

    Google Scholar 

  • Younis, M. Y. A., & Kifayat, K. (2013). Secure cloud computing for critical infrastructure: A survey. UK Liverpool John Moores University.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Mishra, K.N. (2020). Supervising Data Transmission Services Using Secure Cloud Based Validation and Admittance Control Mechanism. In: Alam, M., Shakil, K., Khan, S. (eds) Internet of Things (IoT). Springer, Cham. https://doi.org/10.1007/978-3-030-37468-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37468-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37467-9

  • Online ISBN: 978-3-030-37468-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics