Skip to main content

Security Analysis Using Deep Learning in IoT and Intelligent Transport System

  • Conference paper
  • First Online:
Smart Transportation Systems 2021

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 231))

Abstract

Cloud computing is an embryonic and vast field. It is cost effective, flexible and customized solution provided to customers according to their needs. Due to cloud computing customers need of having their own data centers storages and services became truncated. Cloud service providers serves customers with infrastructure, storages, security, computation resources and fault rectifications. Due to the customized and flexible in nature cloud computing created many security concerns meanwhile security is the first requirement of customer. Storages, infrastructure, software and network need security measures. In this paper we deliver different defense techniques by using which cloud computing infrastructure could be made secure. It includes different protocols, encryption techniques, and hardware and software solutions for different level of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mushtaq, M.F., et al.: Cloud computing environment and security challenges: a review. Int. J. Adv. Comput. Sci. Appl. 8(10), 183–195 (2017)

    Google Scholar 

  2. Gou, Z., Yamaguchi, S., Gupta, B.: Analysis of various security issues and challenges in cloud computing environment: a survey. In: Identity Theft: Breakthroughs in Research and Practice. 2017, IGI Global. pp. 221–247

    Google Scholar 

  3. Wilson, P.: Positive perspectives on cloud security. Inf. Secur. Tech. Rep. 16(3–4), 97–101 (2011)

    Google Scholar 

  4. Mell, P., Grance, T.: The NIST definition of cloud computing (2011)

    Google Scholar 

  5. Modi, C., et al.: A survey on security issues and solutions at different layers of Cloud computing. J. Supercomput. 63(2), 561–592 (2013)

    Article  Google Scholar 

  6. Puthal, D., et al.: Cloud computing features, issues, and challenges: a big picture. In: 2015 International Conference on Computational Intelligence and Networks (CINE), 2015

    Google Scholar 

  7. Singh, S., Jeong, Y.-S., Park, J.H.: A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)

    Article  Google Scholar 

  8. Shimbre, N., Deshpande, P.: Enhancing distributed data storage security for cloud computing using TPA and AES algorithm. In: Computing Communication Control and Automation (ICCUBEA), 2015

    Google Scholar 

  9. Celesti, A., et al.: Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems. J. Netw. Comput. Appl. 59, 208–218 (2016)

    Article  Google Scholar 

  10. Yu, Y., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)

    Article  Google Scholar 

  11. Yan, Q., et al.: Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun. Surv. Tutor. 18(1), 602–622 (2016)

    Article  Google Scholar 

  12. Ibrahim, A.S., Hamlyn-Harris, J., Grundy, J.: Emerging security challenges of cloud virtual infrastructure. arXiv preprint arXiv:1612.09059 (2016)

  13. Ahmad, I., et al.: Security in software defined networks: a survey. IEEE Commun. Surv. Tutor. 17(4), 2317–2346 (2015)

    Article  Google Scholar 

  14. Watson, M.R., et al.: Malware detection in cloud computing infrastructures. IEEE Trans. Dependable Secure Comput. 13(2), 192–205 (2016)

    Article  Google Scholar 

  15. Khan, M.A.: A survey of security issues for cloud computing. J. Netw. Comput. Appl. 71, 11–29 (2016)

    Article  Google Scholar 

  16. Zhou, L., Chao, H.C.: Multimedia traffic security architecture for the internet of things. IEEE Network 25(3), 35–40 (2011)

    Google Scholar 

  17. Lassa dos Santos, G., Guimarães, V.T., da Cunha Rodrigues, G., Granville, L.Z., Tarouco, L.M.R.: A DTLS-based security architecture for the Internet of Things. In: 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, 2015, pp. 809–815

    Google Scholar 

  18. Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G.: DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Networks 11(8), 2710–2723 (2013)

    Google Scholar 

  19. Leo, M., Battisti, F., Carli, M., Neri, A.: A federated architecture approach for Internet of Things security. In: 2014 Euro Med Telco Conference (EMTC), Naples, 2014, pp. 1–5

    Google Scholar 

  20. Lazrag, H., Chehri, A., Saadane, R., Rahmani, M.D.: A blockchain-based approach for optimal and secure routing in wireless sensor networks and IoT. In: 2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Sorrento, Italy, 2019, pp. 411–415. https://doi.org/10.1109/SITIS.2019.00072

  21. Lazrag, H., Chehri, A., Saadane, R., Rahmani, M.D.: Efficient and secure routing protocol based on Blockchain approach for wireless sensor networks. Concurr. Comput. Pract. Exper. e6144 (2020). https://doi.org/10.1002/cpe.6144

  22. Chehri, A., Mouftah, H.: Localization for vehicular ad hoc network and autonomous vehicles, are we done yet? In: Connected and Autonomous Vehicles in Smart Cities. CRC Press, Taylor & Francis Group (2020)

    Google Scholar 

  23. Chehri, A., Mouftah, H.: An empirical link-quality analysis for wireless sensor networks. In: 2012 International Conference on Computing, Networking and Communications (ICNC), Maui, HI, pp. 164–169 (2012). https://doi.org/10.1109/ICCNC.2012.6167403

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gwanggil Jeon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jeon, G., Chehri, A. (2021). Security Analysis Using Deep Learning in IoT and Intelligent Transport System. In: Qu, X., Zhen, L., Howlett, R.J., Jain, L.C. (eds) Smart Transportation Systems 2021. Smart Innovation, Systems and Technologies, vol 231. Springer, Singapore. https://doi.org/10.1007/978-981-16-2324-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-2324-0_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-2323-3

  • Online ISBN: 978-981-16-2324-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics