Abstract
Cloud computing is an embryonic and vast field. It is cost effective, flexible and customized solution provided to customers according to their needs. Due to cloud computing customers need of having their own data centers storages and services became truncated. Cloud service providers serves customers with infrastructure, storages, security, computation resources and fault rectifications. Due to the customized and flexible in nature cloud computing created many security concerns meanwhile security is the first requirement of customer. Storages, infrastructure, software and network need security measures. In this paper we deliver different defense techniques by using which cloud computing infrastructure could be made secure. It includes different protocols, encryption techniques, and hardware and software solutions for different level of security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mushtaq, M.F., et al.: Cloud computing environment and security challenges: a review. Int. J. Adv. Comput. Sci. Appl. 8(10), 183–195 (2017)
Gou, Z., Yamaguchi, S., Gupta, B.: Analysis of various security issues and challenges in cloud computing environment: a survey. In: Identity Theft: Breakthroughs in Research and Practice. 2017, IGI Global. pp. 221–247
Wilson, P.: Positive perspectives on cloud security. Inf. Secur. Tech. Rep. 16(3–4), 97–101 (2011)
Mell, P., Grance, T.: The NIST definition of cloud computing (2011)
Modi, C., et al.: A survey on security issues and solutions at different layers of Cloud computing. J. Supercomput. 63(2), 561–592 (2013)
Puthal, D., et al.: Cloud computing features, issues, and challenges: a big picture. In: 2015 International Conference on Computational Intelligence and Networks (CINE), 2015
Singh, S., Jeong, Y.-S., Park, J.H.: A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)
Shimbre, N., Deshpande, P.: Enhancing distributed data storage security for cloud computing using TPA and AES algorithm. In: Computing Communication Control and Automation (ICCUBEA), 2015
Celesti, A., et al.: Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems. J. Netw. Comput. Appl. 59, 208–218 (2016)
Yu, Y., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)
Yan, Q., et al.: Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun. Surv. Tutor. 18(1), 602–622 (2016)
Ibrahim, A.S., Hamlyn-Harris, J., Grundy, J.: Emerging security challenges of cloud virtual infrastructure. arXiv preprint arXiv:1612.09059 (2016)
Ahmad, I., et al.: Security in software defined networks: a survey. IEEE Commun. Surv. Tutor. 17(4), 2317–2346 (2015)
Watson, M.R., et al.: Malware detection in cloud computing infrastructures. IEEE Trans. Dependable Secure Comput. 13(2), 192–205 (2016)
Khan, M.A.: A survey of security issues for cloud computing. J. Netw. Comput. Appl. 71, 11–29 (2016)
Zhou, L., Chao, H.C.: Multimedia traffic security architecture for the internet of things. IEEE Network 25(3), 35–40 (2011)
Lassa dos Santos, G., Guimarães, V.T., da Cunha Rodrigues, G., Granville, L.Z., Tarouco, L.M.R.: A DTLS-based security architecture for the Internet of Things. In: 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, 2015, pp. 809–815
Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G.: DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Networks 11(8), 2710–2723 (2013)
Leo, M., Battisti, F., Carli, M., Neri, A.: A federated architecture approach for Internet of Things security. In: 2014 Euro Med Telco Conference (EMTC), Naples, 2014, pp. 1–5
Lazrag, H., Chehri, A., Saadane, R., Rahmani, M.D.: A blockchain-based approach for optimal and secure routing in wireless sensor networks and IoT. In: 2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Sorrento, Italy, 2019, pp. 411–415. https://doi.org/10.1109/SITIS.2019.00072
Lazrag, H., Chehri, A., Saadane, R., Rahmani, M.D.: Efficient and secure routing protocol based on Blockchain approach for wireless sensor networks. Concurr. Comput. Pract. Exper. e6144 (2020). https://doi.org/10.1002/cpe.6144
Chehri, A., Mouftah, H.: Localization for vehicular ad hoc network and autonomous vehicles, are we done yet? In: Connected and Autonomous Vehicles in Smart Cities. CRC Press, Taylor & Francis Group (2020)
Chehri, A., Mouftah, H.: An empirical link-quality analysis for wireless sensor networks. In: 2012 International Conference on Computing, Networking and Communications (ICNC), Maui, HI, pp. 164–169 (2012). https://doi.org/10.1109/ICCNC.2012.6167403
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jeon, G., Chehri, A. (2021). Security Analysis Using Deep Learning in IoT and Intelligent Transport System. In: Qu, X., Zhen, L., Howlett, R.J., Jain, L.C. (eds) Smart Transportation Systems 2021. Smart Innovation, Systems and Technologies, vol 231. Springer, Singapore. https://doi.org/10.1007/978-981-16-2324-0_2
Download citation
DOI: https://doi.org/10.1007/978-981-16-2324-0_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-2323-3
Online ISBN: 978-981-16-2324-0
eBook Packages: EngineeringEngineering (R0)