Cloud Computing Infrastructure for Enabling Future Technology Advancement
- Length: 260 pages
- Edition: 1
- Language: English
- Publisher: Nova Science Pub Inc
- Publication Date: 2022-04-14
- ISBN-10: 1685076157
- ISBN-13: 9781685076153
- Sales Rank: #0 (See Top 100 Books)
The primary goal of this book is to present the most up-to-date information about cloud computing technologies and applications. This book provides a detailed introduction of the research fields, recent work, and open research questions in the emerging field of cloud computing. Also, the present book will look for potential research areas and technologies that will make it easier to build a global market for cloud computing services that support scientific, industrial, business, and consumer applications. The benefits associated with cloud computing are enormous, and for rapid development, there is a massive requirement of research and development in this field. Cloud Computing Infrastructure for Enabling Future Technology Advancement aims to make readers and researchers understand the internals of cloud computing and how cloud technology can be used for enabling future technology development.
Contents Preface Acknowledgments Acronyms Chapter 1 A Novel Authentication Technique for Cloud Data Storage Security Abstract Introduction Role of Cloud Computing in Secure Data Transactions Proposed Model for Authentication Mechanism Literature Review Frame Work for Secure Cloud Data Storage Registration Process Design Perspective of Orthogonal Key Generation and Orthogonal Encryption Algorithm Design of Cloud Storage Allocation Design Aspect of Orthogonal Hand Shaking Authentication Algorithm (OHSAA) Design Aspect of Key Distribution and Orthogonal Decryption Algorithm (ODA) Design Objectives for Secure Data Storage and Transactions Cloud Data Storage Security Challenges Design Issues of Secure Cloud Data Storage Amazon Web Services (AWS) Verizon Cloud (VC) Digital Ocean Cloud (DOC) Algorithm for OHAT Key Generation and Encryption Orthogonal Key Generation Algorithm Orthogonal Encryption Algorithm Protocol Stack in OHAT - Key Generation and Encryption Performance Evaluation of OHAT - Key Generation and Encryption Performance Evaluation of OHAT with Existing Cloud Data Security Algorithms OHAT - Authentication Decryption and Cloud Data Storage Authentication and Authorization Orthogonal Handshaking Authentication Algorithm (OHAA) Orthogonal Block Allocation Table (OBAT) Orthogonal Decryption Algorithm (ODA) Performance Evaluation of OHAT – ODA Performance Evaluation of OHAT - Authentication and Decryption with Existing Cloud Storage Algorithms Result and Discussion Performance Evaluation Parameters Performance Evaluation of Key Generation with Cloud Service Providers Performance Evaluation of Encryption with Cloud Service Providers Performance Evaluation of Authentication with Cloud Service Providers Performance Analysis of Decryption with Cloud Service Providers Throughput Analysis Conclusion References Chapter 2 Privacy Preservation in Cloud Platform Using Fully Homomorphic Encryption Techniques Abstract Introduction Security and Privacy Issues in Cloud Some Key Considerations to Be Aware of in Privacy Concern Security Problems in the Cloud Secrecy Preserving Schemes Homomorphic Encryption A Job That Pacifies... Exponential Factors Fourier Transform Proposed Approach Results and Discussion Homomorphism Properties Homomorphism Addition of Plaintexts Homomorphism Multiplication of Plaintexts Self-Multiplication Complexity Conclusion References Chapter 3 Improving the Scalability of Blockchain Powered IoT Networks Using Improved Fuzzy Stellar Consensus Protocol Abstract Introduction Literature Review Proposed Fuzzy Stellar Consensus Protocol (FSCP) Model for Improved Scalability Result and Comparative Analysis Conclusion and Future Scope References Chapter 4 Cloud Computing Infrastructure for Education System Development Abstract Introduction Literature Review Software as a Service Created Applications for Education System Teaching Lecture Halls Instructors Materials for Study Video PPTs Preparation for Class Student Records Student Participation Activities in the Classroom Teacher Profiles Interaction with Parents Cloud Based – Learning Process Security Patterns for Education System Security Requirements Confidentiality Authentication and Authorization Honesty Data Accuracy Assaults on Network Properties Google Cloud Based Isolated Area Teaching System Challenges for Education System Platforms for Smart Education Systems Networking Issues Challenges Facing Educational Organizations Miscellaneous Technical Issues Accessibility Dependability is a Term Used to Portray an Individual’s Ability Management Education Is an Issue in Management Organizations Budget-Friendly Conclusion References Chapter 5 Effective Cloud Computing Features – AWS Abstract Introduction: How Cloud Computing Effects Productivity Advantages of Cloud Computing Challenges in Cloud Databases Available Database as a Service in Cloud Limitations in Cloud Impractical for Big Data Analytics Benefits of Using IoT in Cloud Computing AWS IoT 1-Click Benefits of AWS IoT 1- Click AWS IoT Analytics Benefits of AWS IoT Analytics AWS IoT Button AWS IoT Core Mirror Device State Build Alexa Built-in Devices Cost-Effectively at Scale Connect and Manage Lorawan Devices Benefits AWS IoT Device Defender Working AWS IoT Device Defender Can Send Alerts to the AWS IoT Console, Amazon Cloudwatch Why Is IoT Security Important? What Are the Challenges with IoT Security AWS IoT Device Defender Helps You Manage IoT Security When to Use AWS IoT Device Defender for IoT Security Continuous Compliance and Adoption of Security Best Practices Attack Surface Evaluation Threat Impact Analysis AWS IoT Device Management How AWS IoT Device Management Works Benefits of Using AWS IoT Device Management AWS IoT Events Benefits AWS IoT Greengrass AWS IoT SiteWise Use Cases AWS IoT Things Graph Benefits AWS Partner Device Catalog Explore, Build, and Go to Market Why Choose AWS Qualified Devices FreeRTOS Benefits Conclusion References Chapter 6 Generation of Power from Waste Using Thermo-Electric Generators Abstract Introduction Problem Statement Motivation Objective Result and Discussion Working of Thermoelectric Materials Conclusion References Chapter 7 Analysis and Visualization of Cloud Data in Agriculture Using Supervised Learning Abstract Introduction Origin of Agricultural Data Meaning of Cloud Data in the Field of Agriculture Analysis and Visualization of Cloud Data Analysis Techniques of Cloud Data Predictive Analysis Recommendation System Data Mining An Analytical Technique for Time Series Cloud Data Implementing Analysis in Agriculture Challenges of Cloud Data in Agriculture Future Scope of Work in Agriculture Conclusion References Chapter 8 Recent Challenges and Future Research Scope in Smart Healthcare Using a Blockchain-Based Iot Environment: A Systematic Analysis Abstract Introduction Background Technology Internet of Things (IoT) for Healthcare Blockchain Technology Literature Survey Conclusion References Chapter 9 Basics of Trellis Coded Modulation (TCM) Encoding for the IoT Key Enabler Abstract Introduction Types of Error Correction Coding and Decoding Techniques Traditional Types of Modulation Trellis Coded Modulation Advantages of Multi-Level Modulation Basics of Trellis Code Trellis Code Suggested by Ungerboeck Multidimensional Phase TCM Signal Set Partitioning Mapping Equations Effect of Phase Rotation on Multi-Dimensional –PSK The General Encoding System Differential Encoder Convolutional Coder Constellation Mapper and Modulator Conclusion References Chapter 10 A Neural Network-Based Workload Prediction Mock-Up for Data Centers Abstract Introduction Literature Survey Proposed System LSTM Algorithm Implementation and Results Conclusion and Future Scope References Chapter 11 A Technique for Properly Secured Sharing of Health Records in the Cloud Abstract Introduction Literature Survey i. Data Security and Privacy Care in Edge Computing Paradigm ii. Cloud-Based Secure Exchange of Electronic Health Records iii. A Strategy for Incremental Proxy Re-Encryption in a Mobile Cloud Computing Environment iv. Edge-of-Things Privacy-Preserving Multi-Channel Communication Problem Definition Proposed Solution Implementation and Result Conclusion and Future Enhancement References About the Editors List of Contributors Index Blank Page Blank Page
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.