Green Computing in Network Security: Energy Efficient Solutions for Business and Home
- Length: 184 pages
- Edition: 1
- Language: English
- Publisher: CRC Press
- Publication Date: 2021-12-21
- ISBN-10: 0367562928
- ISBN-13: 9780367562922
- Sales Rank: #0 (See Top 100 Books)
This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications.
Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices.
Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.
Cover Half Title Series Information Title Page Copyright Page Table of Contents Preface Acknowledgments Editor Biographies List of Contributors 1 Green Computing at a Glance: A Solution for the Next Generation 1.1 What Is Green Computing? Why Green Computing? How to Implement Green? 1.1.1 Why Do Green? 1.1.2 How to Implement Green? 1.2 Downsides of Digitalization and Its Impact 1.3 Nanotechnology as a Green Solution for Integrated Circuits 1.4 Energy and Climate Impact of Digital Technology 1.4.1 Direct and Indirect Impact of Digital Technologies 1.4.1.1 Carbon Emission at Data Centers 1.4.1.2 Green Computing in Cloud Environment: Serverless Computers 1.5 Energy Efficiency at Homes 1.6 Malicious Use of Machine Learning in Green ICT 1.7 Conclusion References 2 Empirical Study of Green Cloud Environment, Edge/Fog Computing 2.1 Introduction 2.1.1 Introduction to Cloud, Fog and Edge Computing 2.1.1.1 Infrastructure as a Service (IaaS) 2.1.1.2 Software as a Service (SaaS) 2.1.1.3 Platform as a Service (PaaS) 2.1.2 Fog Computing 2.1.3 Edge Computing 2.1.4 Relation Between Different Types of Computing 2.1.5 Comparison 2.2 Principal Disciplines of Green Computing 2.2.1 Introduction to Green Computing 2.2.2 Necessity of Green Computing? 2.2.3 Approaches to Implement Green Computing 2.2.3.1 Improvements in Microprocessor 2.2.3.2 Modifications in Cooling Systems 2.2.3.3 Improvements in Network 2.2.3.4 Improvements in Disk Storage 2.3 Attacks/Threats in Green Computing 2.3.1 Types of Attacks On Cloud Computing 2.3.1.1 Malware Injection Attacks On Cloud 2.3.1.2 Denial of Service Attacks 2.3.1.3 Abuse of Cloud Services 2.3.1.4 Side-Channel Attacks 2.3.1.5 Man-In-The-Middle Cloud Attack 2.3.1.6 Wrapping Attacks 2.3.1.7 Insider Attacks 2.3.1.8 Service Or Account Hijacking 2.3.1.9 Advanced Persistent Threats (APTs) 2.3.1.10 Specter Attack and Meltdown Attack 2.3.2 Problems of Privacy and Security in Fog Computing 2.3.2.1 Authentication/Verification 2.3.2.2 Network Fortification 2.3.2.3 Confidentiality Or Privacy 2.3.2.4 Access Control/Protected Data Storage 2.3.3 Privacy and Attack Sensitivity of Edge Computing 2.4 Ensuring Security of Cloud/Fog-Based Solutions 2.4.1 Security Measures 2.4.1.1 Detect Intrusions 2.4.1.2 Safe APIs and Access 2.4.1.3 Implement Access Management 2.4.1.4 Enhanced Security Frameworks 2.4.1.5 Stronger Authentication 2.4.1.6 Limiting Access to Cloud Services 2.5 Research Challenges in Green Computing 2.5.1 Description of Challenges 2.5.1.1 New Optimization Techniques 2.5.1.2 New Efficiency Data Center 2.5.1.3 Developing Green Maturity Model 2.5.1.4 Information Resource Usage Optimization 2.5.1.5 Network for Data Center Cooling 2.5.1.6 Monitoring 2.5.2 Green Computing Practices and Issues 2.6 Further Advancements 2.6.1 Multi-Cloud Security Is Being Provided By Using Centralized Platforms By Organizations 2.6.2 Precautionary Steps Are Being Taken By Organizations to Protect Data Before It Arrives in the Cloud 2.6.3 Organizations Have Increased Their Priority for Control Identity and Access Control in the Cloud 2.6.4 SASE Is Gaining Popularity 2.6.5 Combating Struggles of Cloud-Based Solutions 2.6.6 Avoiding SaaS 2.6.7 Optimization of Internet 2.6.8 Edge Is the New Cloud 2.7 Conclusion References 3 Systematic Study of VANET: Applications, Challenges, Threats, Attacks, Schemes and Issues in Research 3.1 Introduction 3.2 Application Areas 3.3 Layered Architecture of VANETs 3.3.1 Components of VANETs 3.3.1.1 Stationary Road Side Unit (RSU) 3.3.1.2 On Board Unit (OBU) 3.3.1.3 Application Unit (AU) 3.3.1.4 Trusted Authority (TA) 3.3.2 Transmission Methods 3.4 Challenges in VANETs 3.5 Issues in Security Requirements 3.6 Threats and Attacks 3.7 Emerging and Research Issues in VANETs 3.8 Research Work Based On Authentication in VANETs 3.9 Conclusion References 4 Data Center Security 4.1 A Brief About Data Center 4.1.1 Modern-Day Data Centers 4.1.2 Significance of Data Centers in Businesses 4.2 Data Center Design 4.2.1 Objectives of Data Center Design 4.2.2 Data Center Design Standards 4.2.2.1 Power Needs of the Data Center 4.2.2.2 Rack Volume 4.2.2.3 Cooling 4.2.2.4 Defects 4.2.2.5 Integrated Data Center Protection and Maintenance 4.2.2.6 Connection 4.2.3 Design and Architecture of a Modern Data Center 4.3 Categorization of Data Centers 4.4 Data Center Structure 4.4.1 Components of the Data Center 4.5 Data Center Management 4.5.1 Data Center Management Problems 4.5.2 Selecting the Best Data Center Infrastructure Management Solution 4.5.3 Analyzing Data Center Infrastructure Management Software 4.5.4 Uses of Data Center Infrastructure Organization Software 4.6 Data Center Standards 4.6.1 Stand Tier of Uptime Institute 4.6.2 ANSI/BICSI 002-2014 4.6.3 ANSI/TIA 942-A 4.6.4 An International Standard: EN 4.6.5 Governing Standards 4.6.6 Operating Standards 4.7 Green Data Center 4.7.1 Significance of Green Data Centers 4.7.2 Grading Environmental Sustainability 4.7.2.1 Rapid Data Growth Thriving Power Demand 4.7.2.2 Economic Scalability 4.7.2.3 Guidelines for Selecting a Green Data Center 4.7.3 Green Data Center Benefits 4.7.3.1 Further Testing of Biological Diversity 4.7.3.2 Minimal Impact On the Environment 4.7.3.3 Consumes Less Power 4.7.3.4 Closing the Unused Servers 4.7.3.5 Lower Financial Costs 4.8 Data Center Security 4.8.1 Physical Protection 4.8.2 Securing the Software 4.9 Critical Aspects for Securing Data Center 4.9.1 Safety Information 4.9.2 Monitoring and Authorization Access 4.9.3 Improving Network Security 4.9.4 Data Protection 4.9.5 Infrastructure Redundancy 4.10 Data Center Security Standards 4.10.1 Safety Level 4.10.2 Logging in Access 4.10.3 Video Surveillance 4.10.4 Security Access Protocol 4.10.5 Security Round the Day/Year 4.10.6 RFID Asset Management 4.10.7 Employee Verification 4.10.8 Relieving Plans 4.10.9 Multi-Factor Authentication 4.10.10 Biometrics 4.11 Case Studies 4.11.1 Microsoft Green Under Water Data Centers 4.11.1.1 Proof of Concept 4.11.1.2 Power Wash and Data Collection 4.11.1.3 Energy, Waste and Water References 5 Energy-Efficient Network Intrusion Detection Systems in the IOT Networks 5.1 Introduction 5.2 IOT Architectures 5.2.1 Three-Layer IOT Architecture 5.2.2 Five-Layer Architecture 5.2.3 Six-Layer Architecture 5.2.4 Fog-Based Architecture Layers 5.3 IOT Applications 5.3.1 Wearable Healthcare 5.3.2 Smart Home Applications 5.3.3 Smart Cities 5.3.4 IOT-Based Agriculture 5.3.5 IOT-Based Industrialization 5.4 Security Threats in IOT Applications 5.4.1 Literature Survey 5.4.2 Security Issues in IOT 5.4.2.1 Security Challenges for IOT Devices 5.4.2.2 Security Threats in IOT 5.4.3 Existing Security Mechanisms in IOT 5.4.3.1 Intrusion Detection Systems 5.4.3.2 Methods of Intrusion Detection 5.4.3.3 Security in Internet of Things Using Intrusion Detection Systems—Proposed System 5.4.3.4 Energy-Efficient Security 5.4.4 Conclusion References 6 HomeTec: Energy Efficiency in Smart Home 6.1 Introduction 6.1.1 Smart LEDs 6.1.2 Smart Shower 6.1.3 Thermal Cooler 6.1.4 Auto Power Cut 6.1.5 Smart Solar Panels 6.2 Smart LED 6.3 Smart Shower 6.4 Thermal Cooler 6.5 Auto Power Cut 6.6 Smart Solar Panels 6.7 Conclusion References 7 Impact and Suitability of Reactive Routing Protocols, Energy-Efficient and AI Techniques On QoS Parameters of WANETs 7.1 Wireless Ad Hoc Networks 7.2 Types of Routing Protocols 7.2.1 Classification of Routing Protocols 7.2.1.1 Proactive Or Table-Driven Routing Protocols 7.2.1.2 Reactive Or On-Demand Routing Protocols 7.3 Summary References 8 Malicious Use of Machine Learning in Green ICT 8.1 Introduction to Machine Learning 8.2 Current Trends in Machine Learning 8.3 Motivation for the Application of Machine Learning in Green ICT 8.4 Prominent Machine Learning Algorithms 8.4.1 Supervised Learning 8.4.1.1 Decision Tree 8.4.1.2 Naïve Bayes 8.4.1.3 Support Vector Machine 8.4.2 Unsupervised Learning 8.4.3 Reinforcement Learning 8.4.4 Neural Network Learning 8.4.5 Instance-Based Learning 8.5 Introduction to Green ICT 8.6 Approaches to Green ICT: Green Internet Technologies 8.7 Green Data Center Technologies 8.8 Green Communication and Networking 8.9 Green Machine to Machine Technology 8.10 Green Cloud Computing 8.11 Green Wireless Sensor Network 8.12 Green RFID Technology 8.13 Machine Learning-Based Green ICT 8.14 Challenges in Machine Learning-Based Green ICT 8.15 Malicious Use of Machine Learning in Green ICT 8.16 Solution for Malicious Use of Machine Learning in Green ICT 8.17 Applications of Green ICT 8.18 Conclusion References 9 Enhanced Framework for Energy Conservation and Overcoming Security Threats for Software-Defined Networks 9.1 Network Security and Security Framework 9.1.1 SDN Support for Security 9.2 Possible Threats and Vulnerabilities 9.2.1 Security Issues in SDN Architecture 9.3 Reasons of Security Attacks to SDN Architecture 9.3.1 Application Layer Issues 9.3.2 Control Layer Issues 9.3.3 Control Channel 9.3.4 Infrastructure Layer Issues 9.3.5 Faulty System Integration and System Complexity 9.3.6 Security Design and Implementation Inconsistencies 9.4 SDN Risk Assessment in Security Framework 9.4.1 Needs of Risk Assessment 9.4.2 Security Assessment 9.4.3 Overall Risk Assessment 9.5 Security Enforcement in SDN 9.5.1 Improving SDN Security 9.5.2 Significant Security Research Efforts 9.6 SDN Security Solutions 9.6.1 Self-Learning Threat Detection Module 9.6.2 NFV/Cloud-Based Security 9.6.3 Network State Monitoring and Analysis 9.6.4 Integrated SDN Security Framework 9.7 Conclusion References 10 Smart Shopping Trolleys for Secure and Decentralized Services 10.1 Introduction 10.1.1 Background 10.1.1.1 IoT 10.1.1.2 YOLO 10.1.1.3 Blockchain Technology 10.2 Proposed Architecture 10.2.1 Overview 10.2.2 Implementation 10.2.3 Rationale 10.2.4 Data Sharing 10.2.5 Use Cases 10.3 Scenarios Study 10.3.1 Current Scenario 10.3.2 Solution By EasyBills 10.3.3 Results 10.4 Conclusion References Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.