Security and Privacy for Big Data, Cloud Computing and Applications
- Length: 328 pages
- Edition: 1
- Language: English
- Publisher: The Institution of Engineering and Technology
- Publication Date: 2019-10-09
- ISBN-10: 1785617478
- ISBN-13: 9781785617478
- Sales Rank: #0 (See Top 100 Books)
As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.
Title Copyright Contents About the editors Preface Chapter 1 Privacy preserving in big data 1.1 Privacy attacks 1.1.1 Tabular data attack 1.1.2 Graph data attack [3] 1.1.3 Location privacy attack 1.1.4 Attacks for other applications 1.2 Privacy technologies 1.2.1 Encryption 1.2.2 Anonymization 1.2.3 Differential privacy 1.2.4 Other technologies 1.3 Privacy metrics 1.3.1 Uncertainty 1.3.2 Error/Accuracy 1.3.3 Indistinguishability 1.4 Summary References Chapter 2 Privacy-preserving analysis for big data using cryptographic tools 2.1 Privacy-preserving data analysis 2.1.1 Security model of privacy-preserving data analysis 2.2 Encryption schemes with special properties 2.2.1 Deterministic encryption and keyword search 2.2.2 Order preserving encryption and range query 2.2.3 Scalar-product-preserving encryption and nearest neighbor query 2.2.4 Searchable symmetric encryption 2.3 Schemes based on secure computation 2.3.1 Secure computation 2.3.2 Scalability of secure computation 2.3.3 Secure computation on top of ORAM 2.4 Features of reviewed solutions 2.5 Summary 2.6 Summary References Chapter 3 Big data security in Internet of Things 3.1 Internet-of-Things 3.1.1 Wireless sensor network 3.1.2 Cloud 3.1.3 Big data analytics 3.2 Big data security 3.2.1 Hadoop security 3.2.2 Cloud security 3.2.3 Monitoring and auditing 3.2.4 Key management 3.2.5 Anonymization 3.3 Summary References Chapter 4 A watermark-based in situ access-control model for image big data 4.1 Preliminaries 4.2 Introduction 4.3 Related work 4.4 Problem formulation 4.4.1 System model 4.4.2 Attack models 4.4.3 Design goals 4.5 Proposed scheme 4.5.1 Basic settings 4.5.2 Hierarchical key-role-area access-control model 4.5.3 Image publication 4.5.4 Client conformance 4.5.5 Case study 4.6 Security and performance analysis 4.6.1 Security analysis 4.6.2 Performance analysis 4.7 Conclusions Acknowledgments References Chapter 5 Blockchain-based security and access control for BIM big data 5.1 bcBIM: a blockchain-based big data model for BIM modification audit and provenance in mobile cloud 5.1.1 Introduction 5.1.2 Related work 5.1.3 Problem formulation 5.1.4 Proposed scheme 5.1.5 Example—public blockchain bcBIM 5.1.6 Example—private blockchain bcBIM 5.1.7 Security analysis and performance analysis 5.1.8 Conclusions 5.2 CaACBIM: a context-aware access control model for BIM 5.2.1 Introduction 5.2.2 Related work 5.2.3 Problem formulation 5.2.4 Proposed scheme 5.2.5 Security and performance analysis 5.2.6 Conclusions Acknowledgment Data availability statement References Chapter 6 Security of marine-information system 6.1 Background and significance of marine information security 6.2 The characteristics and design objective of marine-information system 6.3 Marine information security risk analysis 6.4 Analysis on marine-information system security demand 6.4.1 Wireless network communication security 6.4.2 Marine data security 6.4.3 Marine-information-sharing security 6.4.4 Marine-information-systematization security 6.5 Marine information security system 6.5.1 Marine communication and network security 6.5.2 Marine system computing environment security 6.5.3 Big marine data and application security 6.5.4 Marine-information-sharing security 6.5.5 Marine security monitoring and forewarning mechanism 6.5.6 Marine security infrastructure 6.6 Key security theory and technology 6.6.1 Password and security protocol 6.6.2 Intrusion detection 6.6.3 Data backup and recovery technology 6.7 Marine information security development trend and discussion References Chapter 7 A layered security architecture based on cyber kill chain against advanced persistent threats 7.1 Introduction 7.2 Driven defensive model (course of actions) 7.3 Defense mechanism 7.3.1 Mitigation for each phase of CKC model 7.4 Mapping 7D, CKC and APT actors activities 7.5 Conclusion References Chapter 8 Privacy-aware digital forensics 8.1 Introduction 8.2 Digital forensics 8.2.1 Evolution of digital forensics 8.2.2 Digital forensics rules 8.2.3 Digital forensics challenges 8.3 Digital privacy 8.3.1 Evolution of digital privacy 8.3.2 Privacy protection 8.3.3 Privacy challenges in digital forensics 8.4 Law, privacy and digital forensics 8.5 Privacy-aware computer forensics 8.5.1 Database 8.5.2 Computer 8.6 Privacy-aware network forensics 8.6.1 Server 8.6.2 Networks 8.6.3 Browser and applications 8.7 Beyond computer and network forensics 8.7.1 Mobile 8.7.2 Cloud 8.7.3 Internet of Things 8.8 Conclusions and final remarks References Chapter 9 A survey of trust, trustworthiness and trustworthy computing: concepts, models and challenges 9.1 Introduction 9.2 Basic concepts and models for trust, trustworthiness and trustworthy computing 9.2.1 Characteristics of trust, trustworthiness and trustworthy computing 9.2.2 Trust, trustworthy and trustworthiness modelling 9.3 Trustworthy evaluation and prediction 9.4 Blockchain and trust 9.4.1 Trust-free vs. trust building 9.4.2 Blockchain as a factor of trust 9.5 Conclusions and future research References Chapter 10 Software-defined mobile networks security 10.1 The evolution of software-defined mobile network 10.2 SDMN architecture 10.2.1 Network function virtualization 10.2.2 OpenFlow 10.3 SDMN security issues 10.3.1 SDN original security issues 10.3.2 Special security issues in SDMN 10.4 SDMN security measures 10.4.1 Data plane attack 10.4.2 Control plane attack 10.4.3 Application plane attack 10.4.4 Attack at the communication protocols 10.4.5 Category and analysis of STRIDE 10.4.6 SDMN security challenges 10.5 Summary References Chapter 11 Dynamic public opinion evolvement modeling and supervision in social networks 11.1 Introduction 11.1.1 No combined analysis model for public opinion in social networks 11.1.2 Dynamic challenge for public opinion sampling and inspection 11.1.3 Time efficiency for public opinion supervision 11.2 Related works 11.2.1 Evolvement based on topo discovery and graph structure change 11.2.2 Evolvement based on influence analysis 11.2.3 Evolvement based on sentiment and NLP 11.3 Dynamic public opinion evolvement modeling 11.3.1 System model and definitions 11.3.2 Conditional optimization problems in dynamic public opinion evolvement 11.4 Evolvement of public opinion and supervision 11.4.1 Preparation algorithms 11.4.2 Evolvement and supervision algorithms 11.5 Data and results 11.5.1 Datasets and environment 11.5.2 Parameters 〈μ,λ,ε(t)〉 11.5.3 OC–SA optimization performance in TTSN evolvement effectiveness 11.6 Discussions Acknowledgments References Chapter 12 Privacy verification of PhotoDNA based on machine learning 12.1 Introduction 12.2 Hash functions 12.3 PhotoDNA 12.4 Content-based image classification 12.4.1 Feature-descriptor-based image classification 12.4.2 CNN-based image classification 12.5 Encryption-based image classification 12.6 Experiments 12.6.1 Experimental framework 12.6.2 PhotoDNA hash values dataset 12.7 Results 12.8 Discussion 12.9 Conclusion References Chapter 13 Chaos-based communication systems 13.1 Cryptography and chaos 13.2 Continuous chaotic systems 13.2.1 Chua's chaotic system 13.2.2 Lorentz chaotic system 13.2.3 Chen's chaotic system 13.2.4 Lü chaotic system 13.3 Chaotic secure communication and its application in optical communication 13.3.1 The design of chaotic secure communication 13.4 Optic chaotic communication 13.4.1 Ikeda-delayed chaotic system 13.4.2 A chaotic system with suppressed time-delay signature based on multiple electro-optic nonlinear loops 13.4.3 System model 13.4.4 Time-delay signature suppression 13.4.5 Synchronization scheme References Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.