Skip to main content

Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network

Abstract

The Cloud Computing (CC) technology refers to an infrastructure in which both data storage and data processing take place outside the mobile device. Furthermore, another new and fast growing technology called Internet of things (IoT) rises in the sector of networks and telecommunications with specific concern in the “modern” area of wireless telecommunication systems. Regarding our recent research, the main goal of the interaction and cooperation between things and objects sent through the wireless networks is to fulfill the objective set to them as a combined entity, with the aim to achieve a better environment for the use of Big Data (BD). In addition, counting on the technology of wireless networks, both CC and IoT could be developed rapidly and together. In this paper, we survey IoT and Cloud Computing technologies with focus on security problems that both technologies faced. Particularly, these two aforementioned technologies (i.e., Cloud Computing and IoT) have been compared, with the aim to examine the familiar characteristics and examine and discover the benefits of their integration to secure the use and transmission of Big Data. In conclusion, contributions of CC and IoT technologies and how the CC technology improves the operation of IoT as a base technology for Big Data systems have been presented.

Keywords

  • Internet of things
  • Cloud Computing
  • Big Data
  • Security
  • Privacy

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-22277-2_21
  • Chapter length: 30 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   169.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-22277-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   219.99
Price excludes VAT (USA)
Hardcover Book
USD   299.99
Price excludes VAT (USA)
Fig. 21.1
Fig. 21.2

References

  1. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805. https://doi.org/10.1016/j.comnet.2010.05.010.

    CrossRef  MATH  Google Scholar 

  2. Stergiou, C., Psannis, K. E., Kim, B.-G., & Gupta, B. (2016). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964–975.

    CrossRef  Google Scholar 

  3. Plageras, A. P., Psannis, K. E., Stergiou, C., Wang, H., & Gupta, B. B. (2018). Efficient IoT-based sensor big data collection-processing and analysis in smart buildings. Future Generation Computer Systems, 82, 349–357.

    CrossRef  Google Scholar 

  4. Hilbert, M., & López, P. (2011). The world’s technological capacity to store, communicate, and compute information. Science, 332(6025), 60–65.

    CrossRef  Google Scholar 

  5. Fu, Z., Ren, K., Shu, J., Sun, X., & Huang, F. (2015). Enabling personalized search over encrypted out-sourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems, 27(9), 2546–2559.

    CrossRef  Google Scholar 

  6. Mongay Batalla, J., & Krawiec, P. (2014). Conception of ID layer performance at the network level for internet of things. Personal and Ubiquitous Computing, 18(2), 465–480.

    CrossRef  Google Scholar 

  7. Stergiou, C., & Psannis, K. E. (2017). Efficient and secure big data delivery in cloud computing. Multimedia Tools and Applications, 76(21), 22803–22822.

    CrossRef  Google Scholar 

  8. Stergiou, C., Psannis, K. E., Plageras, A. P., Kokkonis, G., & Ishibashi, Y. (2017, June 19–21). Architecture for security in IoT environments. In Proceedings of 26th IEEE International Symposium on Industrial Electronics, Edinburgh, Scotland.

    Google Scholar 

  9. Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in internet of things. Digital Communications and Networks (DCN), 4(2), 18–137.

    Google Scholar 

  10. Kryftis, Y., Mastorakis, G., Mavromoustakis, C., Mongay Batalla, J., Pallis, E., & Kormentzas, G. (2016). Efficient entertainment services provision over a novel network architecture. IEEE Wireless Communications Magazine, 23, 14.

    CrossRef  Google Scholar 

  11. Stergiou, C., & Psannis, K. E. (2016). Recent advances delivered by mobile cloud computing and internet of things for big data applications: A survey. International Journal of Network Management, 27, 1–12.

    Google Scholar 

  12. Stergiou, C., Psannis, K. E., Plageras, A. P., Ishibashi, Y., & Kim, B.-G. (2018). Algorithms for efficient digital media transmission over IoT and cloud networking. Journal of Multimedia Information System, 5(1), 1–10.

    Google Scholar 

  13. Stergiou, C., Psannis, K. E., Plageras, A. P., Kokkonis, G., & Ishibashi, Y. (2017, June). Architecture for security monitoring in IoT environments. In Proceedings of IEEE 26th international symposium on industrial electronics, Edinburgh, Scotland.

    Google Scholar 

  14. Plageras, A. P., Psannis, K. E., Ishibashi, Y., & Kim, B.-G. (2016, October). IoT-based surveillance system for ubiquitous healthcare. In Proceedings of IEEE/IECON 2016 - 42nd Annual Conference of the IEEE, Industrial Electronics Society.

    Google Scholar 

  15. Li, J., Huang, L., Zhou, Y., He, S., & Ming, Z. (2017). Computation partitioning for mobile cloud computing in a big data environment. IEEE Transactions on Industrial Informatics, 13, 2009–2018.

    CrossRef  Google Scholar 

  16. Yu, R., Huang, X., Kang, J., Ding, J., Maharjan, S., Gjessing, S., & Zhang, Y. (2015). Cooperative resource management in cloud-enabled vehicular networks. IEEE Transactions on Industrial Informatics, 62(12), 7938–7951.

    CrossRef  Google Scholar 

  17. Agrawal, D., Gupta, B. B., Yamaguchi, S., & Psannis, K. E. (2018). Recent advances in mobile cloud computing. Wireless Communications and Mobile Computing, 2018, 5895817.

    CrossRef  Google Scholar 

  18. Ali, A. M. M., Ahmad, N. M., & Amin, A. H. M. (2014, December). Cloudlet-based cyber foraging framework for distributed video surveillance provisioning. In 2014 Fourth World Congress on Information and Communication Technologies (WICT), Bandar Hilir, Malaysia.

    Google Scholar 

  19. Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A., & Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2), 133–143.

    CrossRef  Google Scholar 

  20. Fremdt, S., Beck, R., & Weber, S. (2013, October) Does cloud computing matter? An analysis of the cloud model software-as-a-service and its impact on operational agility. In 46th Hawaii International Conference on System Sciences (pp. 1025–1034).

    Google Scholar 

  21. Stergiou, C., & Psannis, K. E. (2017, July 24–26). Algorithms for big data in advanced communication systems and cloud computing. In Proceedings of 19th IEEE Conference on Business Informatics 2017 (CBI2017), Doctoral Consortium, Thessaloniki, Greece.

    Google Scholar 

  22. Plageras, A. P., Stergiou, C., Psannis, K. E., Kim, B.-G., Gupta, B., & Ishibashi, Y. (2017, July 24–26). Solutions for inter-connectivity and security in a smart hospital building. In Proceedings of 15th IEEE International Conference on Industrial Informatics (INDIN 2017), Emden, Germany.

    Google Scholar 

  23. Thirumalai, C., & Kar, H. (2018, April 21–22). Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices. In IEEE, Proceedings of 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), Vellore, India.

    Google Scholar 

  24. Plageras, A. P., Stergiou, C., Psannis, K. E., Kokkonis, G., Ishibashi, Y., Kim, B.-G., et al. (2017, July 24–26). Efficient large-scale medical data (eHealth big data) analytics in internet of things. In Proceedings of 19th IEEE International Conference on Business Informatics (CBI’17), International Workshop on the Internet of Things and Smart Services (ITSS2017), Thessaloniki, Greece.

    Google Scholar 

  25. Stergiou, C., Psannis, K. E., Plageras, A. P., Xifilidis, T., & Gupta, B. B. (2018, April 15–20). Security and privacy of big data for social networking services in cloud. In Proceedings of IEEE conference on Computer Communications (IEEE INFOCOM 2018), Honolulu, HI.

    Google Scholar 

  26. Angin, P., Bhargava, B., Ranchal, R., Singh, N., & Linderman, M. (2010, October 31–November 3). An entity-centric approach for privacy and identity management in cloud computing. In Proceedings of 29th IEEE International Symposium on Reliable Distributed Systems, New Delhi, India. https://doi.org/10.1109/SRDS.2010.28.

  27. Doukas, C, Pliakas, T., & Maglogiannis, I. (2010, August 31–September 4). Mobile healthcare information management utilizing cloud computing and android OS. In Proceedings of 32nd Annual International Conference of the IEEE EMBS 2010, Buenos Aires, Argentina.

    Google Scholar 

  28. Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2011). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13, 1587–1611. https://doi.org/10.1002/wcm.1203.

    CrossRef  Google Scholar 

  29. Habib, S. M., Ries, S., & Muhlhauser, M. (2011, November 16–18). Towards a trust management system for cloud computing. In Proceedings of IEEE International Joint Conference TrustCom-11/IEEE ICESS-11/FCST-11, Changsha, China.

    Google Scholar 

  30. Prasad, M. R., Gyani, J., & Murti, P. R. K. (2012). Mobile cloud computing: Implications and challenges. Journal of Information Engineering and Applications, 2(7), 7–15.

    Google Scholar 

  31. Shiraz, M., Gani, A., Khokhar, R. H., & Buyya, R. (2012). A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. IEEE Communications Surveys & Tutorials, 15(3), 1294–1313.

    CrossRef  Google Scholar 

  32. Kim, M., & Park, S. O. (2013). Trust management on user behavioral patterns for a mobile cloud computing. Cluster Computing, 16(4), 725–731. https://doi.org/10.1007/s10586-013-0248-9.

    CrossRef  Google Scholar 

  33. Stergiou, C., Psannis, K. E., & Gupta, B. B. (2019) Advanced media-based smart big data on intelligent cloud systems. IEEE Transactions on Sustainable Computing, 4(1), 77–87.

    Google Scholar 

  34. Gnana Singh, A. A., Tamizhpoonguil, B., & Jebamalar Leavline, E. (2016). A survey on big data and cloud computing. International Journal on Recent and Innovation Trends in Computing and Communication, 7(4), 273–277.

    Google Scholar 

  35. Awodele, O., Izang, A. A., Kuyoro, S. O., & Osisanwo, F. Y. (2016). Big data and cloud computing issues. International Journal of Computer Applications, 12(133), 14–19.

    Google Scholar 

  36. Rallapallia, S., Gondkar, R. R., & Ketavarapu, U. P. K. (2015, December). Impact of processing and analyzing healthcare big data on cloud computing environment by implementing Hadoop cluster. In International Conference on Computational Modeling and Security (CMS2016) (pp. 16–22).

    Google Scholar 

  37. Hernandez-Ramos, J. L., Moreno, M. V., Bernabe, J. B., Carrillo, D. G., & Skarmeta, A. F. (2015). SAFIR: Secure access framework for IoT-enabled services on smart buildings. Journal of Computer and System Sciences, 81(8), 1452–1463.

    MathSciNet  CrossRef  Google Scholar 

  38. Moreno, M. V., Dufour, L., Skarmeta, A. F., Jara, A. J., Genoud, D., Ladevie, B., & Bezian, J.-J. (2016). Big data: The key to energy efficiency in smart buildings. Soft Computing, 20(5), 1749–1762.

    CrossRef  Google Scholar 

  39. Shah, J., & Mishra, B. (2016). Customized IoT enabled wireless sensing and monitoring platform for smart buildings. Procedia Technology, 23, 256–263.

    CrossRef  Google Scholar 

  40. Ben Sta, H. (2017). Quality and the efficiency of data in “smart-cities”. Future Generation Computer Systems, 74, 409–416.

    CrossRef  Google Scholar 

  41. Li, J., Zhang, Y., Chen, X., & Xiang, Y. (2018). Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security, 72, 1–12.

    CrossRef  Google Scholar 

  42. Qiu, M., Gai, K., Thuraisingham, B., Tao, L., & Zhao, H. (2018). Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Generation Computer Systems, 80, 421–429.

    CrossRef  Google Scholar 

  43. Elhoseny, M., Ramirez-Gonzalez, G., Abu-Elnasr, O. M., Shawkat, S. A., Arunkumar, N., & Farouk, A. (2018). Secure medical data transmission model for IoT-based healthcare systems. IEEE Access, 6, 20596–20608.

    CrossRef  Google Scholar 

  44. Hamida, E. B., Noura, H., & Znaidi, W. (2015). Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures. Electronics, 4(3), 380–423.

    CrossRef  Google Scholar 

  45. Dastjerdi, A. V., & Buyya, R. (2016). Fog computing: Helping the internet of things realize its potential. IEEE Computer, 49(8), 112–116.

    CrossRef  Google Scholar 

  46. Barreno, M., Nelson, B., Sears, R., Joseph, A. D., & Tygar, J. D. (2006, March 21–24). Can machine learning be secure? In ACM, in Proceedings of the 2006 ACM Symposium on Information, Computer And Communications Security, ASIACCS ’06, Taipei, Taiwan (pp. 16–25).

    Google Scholar 

  47. Liao, X., Ding, L., & Wang, Y. (2011, June 27–29). Secure machine learning, a brief overview. In IEEE, Proceedings of 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement – Companion, Jeju Island, South Korea.

    Google Scholar 

  48. Barreno, M., Nelson, B., Joseph, A. D., & Tygar, J. D. (2010). The security of machine learning. Machine Learning, 81(2), 121–148.

    MathSciNet  CrossRef  Google Scholar 

  49. Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., et al. (2017, October 30–November 3). Practical secure aggregation for privacy-preserving machine learning. In ACM, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS ’17, Dallas, TX (pp. 1175–1191).

    Google Scholar 

  50. Demontis, A., Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., et al. (2017). Yes, machine learning can be more secure! A case study on android malware detection. IEEE Transactions on Dependable and Secure Computing (Early Access), 16(4), 711–724.

    CrossRef  Google Scholar 

  51. Sheng, Y.-B., & Zhou, L. (2017). Distributed secure quantum machine learning. Science Bulletin, 64(14), 1025–1029.

    CrossRef  Google Scholar 

  52. Bello-Orgaz, G., Jung, J. J., & Camacho, D. (2016). Social big data: Recent achievements and new challenges. Information Fusion, 28, 45–59.

    CrossRef  Google Scholar 

  53. Gandomi, A., & Haider, M. (2015). Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 35(2), 137–144.

    CrossRef  Google Scholar 

  54. Kaur, N., & Sood, S. K. (2017). Dynamic resource allocation for big data streams based on data characteristics (5Vs). International Journal of Network Management, 27(4), e1978.

    CrossRef  Google Scholar 

  55. Hu, H., Wen, Y., Chua, T. S., & Li, X. (2014). Toward scalable systems for big data analytics: A technology tutorial. IEEE Access, 2, 652–687.

    CrossRef  Google Scholar 

  56. Rajaraman, V. (2016). Big data analytics. Resonance, 21(8), 695–716.

    CrossRef  Google Scholar 

  57. Alexandrov, A., Bergmann, R., Ewen, S., Freytag, J. C., Hueske, F., Heise, A., et al. (2014). The stratosphere platform for big data analytics. The VLDB Journal, 23(6), 939–964.

    CrossRef  Google Scholar 

  58. Kwon, O., Lee, N., & Shin, B. (2014). Data quality management, data usage experience and acquisition intention of big data analytics. International Journal of Information Management, 34(3), 387–394.

    CrossRef  Google Scholar 

  59. Müller, K., Schwarz, H., Marpe, D., Bartnik, C., Bosse, S., & Brust, H. (2013). 3D high-efficiency video coding for multi-view video and depth data. IEEE Transactions on Image Processing, 9(22), 3366–3378.

    MathSciNet  MATH  CrossRef  Google Scholar 

  60. Shen, L., Liu, Z., Zhang, X., Zhao, W., & Zhang, Z. (2013). An effective CU size decision method for HEVC encoders. IEEE Transactions on Multimedia, 2(15), 465–470.

    CrossRef  Google Scholar 

  61. Ohm, J.-R., Sullivan, G. J., Schwarz, H., Tan, T. K., & Wiegand, T. (2012). Comparison of the coding efficiency of video coding standards – including high efficiency video coding (HEVC). IEEE Transactions on Circuits and Systems for Video Technology, 12(22), 1669–1684.

    CrossRef  Google Scholar 

  62. Batalla, J. M. (2015). Advanced multimedia service provisioning based on efficient interoperability of adaptive streaming protocol and high efficient video coding. Journal of Real-Time Image Processing, 12(2), 443–454.

    CrossRef  Google Scholar 

  63. Rouse, M. (2015, November 1). IoT security (internet of things security). IoT Agenda [Online]. Retrieved July 27, 2016, from http://internetofthingsagenda.techtarget.com/definition/IoT-security-Internet-of-Things-security

  64. Plageras, A. P., & Psannis, K. E. (2017, July 24–26). Algorithms for big data delivery over the internet of things. In Proceedings of 19th IEEE Conference on Business Informatics 2017 (CBI2017), Doctoral Consortium, Thessaloniki, Greece.

    Google Scholar 

  65. Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.

    MathSciNet  MATH  CrossRef  Google Scholar 

  66. Nair, A., Shaniba Asmi, P., & Aloor, G. (2016). Analysis of physical layer security via co-operative communication in internet of things. International Conference on Emerging Trends in Engineering, Science and Technology (ICETEST - 2015), 24, 896–903.

    Google Scholar 

  67. Hu, W., Tan, H., Corke, P., Shih, W. C., & Jha, S. (2010). Toward trusted wireless sensor networks. ACM Transactions on Sensor Networks, 7(5), 1–25.

    CrossRef  Google Scholar 

  68. Huang, D. (2011). Mobile cloud computing. IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter, 6(10), 27–31.

    Google Scholar 

  69. Haque, M. N., Chowdhury, M. R. K., Gani, A., & Whaiduzzaman, M. (2014). A study on strategic provision of cloud computing services. The Scientific World Journal, 2014, 1–8.

    CrossRef  Google Scholar 

  70. Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012–1023.

    CrossRef  Google Scholar 

  71. Haghighat, M., Zonouz, S., & Abdel-Mottaleb, M. (2015). CloudID: Trustworthy cloud-based and cross-enterprise biometric identification. Expert Systems with Applications, 11(42), 7905–7916.

    CrossRef  Google Scholar 

  72. Kumar, Y., Munjal, R., & Sharma, H. (2011). Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. IJCSMS International Journal of Computer Science and Management Studies, 11(3), 68–76.

    Google Scholar 

  73. Kaur, R., & Kinger, S. (2014). Analysis of security algorithms in cloud computing. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 3(3), 171–176.

    Google Scholar 

  74. Singh, G., & Kinger, S. (2013). Integrating AES, DES, and 3-DES encryption algorithms for enhanced data security. International Journal of Scientific & Engineering Research, 4(7), 2058.

    Google Scholar 

  75. Sachdev, A., & Bhansali, M. (2013). Enhancing cloud computing security using AES algorithm. International Journal of Computer Applications, 9(67), 19–23.

    CrossRef  Google Scholar 

  76. Viswanathan, P. (2012, July 7). Cloud computing – is it really all that beneficial? abouttech [Online]. Retrieved May 24, 2017, from http://mobiledevices.about.com/od/additionalresources/a/Cloud-Computing-Is-It-Really-All-That-Beneficial.htm

  77. Pfarr, F., Buckel, T., & Winkelmann, A. (2014, January 6–9). Cloud computing data protection – a literature review and analysis. In Proceedings of 47th Hawaii International Conference on System Sciences, Waikoloa, HI (pp. 5018–5027).

    Google Scholar 

  78. Almrot, E., & Andersson, S. (2013, May). A study of the advantages and disadvantages of mobile cloud computing versus native environment. Digitala Vetenskapliga Arkivet, Bachelor Thesis in Software Engineering, Blekinge Institute of Technology, Karlskrona.

    Google Scholar 

  79. Fremdt, S., Beck, R., & Weber, S. (2013, January 7–10). Does cloud computing matter? An analysis of the cloud model software-as-a-service and its impact on operational agility. In Proceedings of 46th Hawaii International Conference on System Sciences 2013, Wailea, Maui, HI (pp. 1025–1034).

    Google Scholar 

  80. Blog: Follow what’s happening at Get Cloud Services. (2014, December 23). Mobile cloud computing – pros and cons. GetCloud Services [Online]. Retrieved December 24, 2017, from https://www.getcloudservices.com/blog/mobile-cloud-computing-pros-and-cons/

  81. Shi, E., Niu, Y., Jakobsoon, M., & Chow, R. (2010, October 25–28). Implicit authentication through learning user behavior. In ACM, Proceedings of ISC’10 13th International Conference on Information Security, Boca Raton, FL (pp. 99–113).

    Google Scholar 

  82. Mell, P., Grance, T. (2011) The NIST definition of cloud computing. Recommendations of the National Institute of Standards and Technology, Special Publication 800–145. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg. MD 20899–8930.

    Google Scholar 

  83. Botta, A., de Donato, W., Persico, V., & Pescapè, A. (2016). Integration of cloud computing and internet of things: A survey. Journal of Future Generation Computer Systems, 56, 684–700.

    CrossRef  Google Scholar 

  84. Bhattasali, T., Chaki, R., & Chaki, N. (2013). Secure and trusted cloud of things. In: India Conference (INDICON), 2013 Annual IEEE (pp. 1–6).

    Google Scholar 

  85. Simmhan, Y., Kumbhare, A. G., Cao, B., & Prasanna, V. (2011). An analysis of security and privacy issues in smart grid software architectures on clouds. In: Cloud Computing (CLOUD), IEEE International Conference on IEEE (pp. 582–589).

    Google Scholar 

  86. Grozev, N., & Buyya, R. (2014). Inter-cloud architectures and application brokering: Taxonomy and survey. Software: Practice and Experience, 44(3), 369–390.

    Google Scholar 

  87. Rao, B. P., Saluia, P., Sharma, N., Mittal, A., & Sharma, S. V. (2012). Cloud computing for internet of things and sensing based applications. In: Sensing Technology (ICST), 2012 Sixth International Conference on IEEE (pp. 374–380).

    Google Scholar 

  88. He, W., Yan, G., & Xu, L. D. (2014). Developing vehicular data cloud services in the IoT environment. IEEE Transactions on Industrial Informatics, 10(2), 1587–1595.

    CrossRef  Google Scholar 

  89. Dobre, C., & Xhafa, F. (2014). Intelligent services for big data science. Future Generation Computer Systems, 37, 267–281.

    CrossRef  Google Scholar 

  90. Aceto, G., Botta, A., de Donato, W., & Pescapè, A. (2013). Cloud monitoring: A survey. Computer Networks, 57(9), 2093–2115.

    CrossRef  Google Scholar 

Download references

Acknowledgment

The authors would like to thank the anonymous reviewers for their valuable comments and feedback which were extremely helpful in improving the quality of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. E. Psannis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Verify currency and authenticity via CrossMark

Cite this chapter

Stergiou, C.L., Plageras, A.P., Psannis, K.E., Gupta, B.B. (2020). Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22277-2_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22276-5

  • Online ISBN: 978-3-030-22277-2

  • eBook Packages: Computer ScienceComputer Science (R0)