"Cloud computing solutions have been gaining traction in the commercial world due to their capacity to provide on-demand access to resources, govern the software environment, and augment existing systems. As a result, universities around the world have included cloud computing and related technologies in their curricula, and information technology organizations are speeding up their skill-set evolution in order to better prepare for emerging cloud technologies and public expectations, such as new services. The primary goal of this book is to present the most up-to-date information about cloud computing technologies and applications. This book provides a detailed introduction of the research fields, recent work, and open research questions in the emergingfield of cloud computing. Also, the present book will look for potential research areas and technologies that will make it easier to build a global market for cloud computing services that support scientific, industrial, business, and consumer applications. The benefits associated with cloud computing are enormous, and for rapid development, there is a massive requirement of research and development in this field. Cloud Computing Infrastructure for Enabling Future Technology Advancement aims to make readers and researchers understand the internals of cloud computing and how cloud technology can be used for enabling future technology development"--
Author(s): Sitendra Tamrakar, Suraj Sharma, Ritesh Dash
Series: Computer Science, Technology and Applications
Publisher: Nova Science Publishers
Year: 2022
Language: English
Pages: 256
City: New York
Contents
Preface
Acknowledgments
Acronyms
Chapter 1
A Novel Authentication Technique for Cloud Data Storage Security
Abstract
Introduction
Role of Cloud Computing in Secure Data Transactions
Proposed Model for Authentication Mechanism
Literature Review
Frame Work for Secure Cloud Data Storage
Registration Process
Design Perspective of Orthogonal Key Generation and Orthogonal Encryption Algorithm
Design of Cloud Storage Allocation
Design Aspect of Orthogonal Hand Shaking Authentication Algorithm (OHSAA)
Design Aspect of Key Distribution and Orthogonal Decryption Algorithm (ODA)
Design Objectives for Secure Data Storage and Transactions
Cloud Data Storage Security Challenges
Design Issues of Secure Cloud Data Storage
Amazon Web Services (AWS)
Verizon Cloud (VC)
Digital Ocean Cloud (DOC)
Algorithm for OHAT Key Generation and Encryption
Orthogonal Key Generation Algorithm
Orthogonal Encryption Algorithm
Protocol Stack in OHAT - Key Generation and Encryption
Performance Evaluation of OHAT - Key Generation and Encryption
Performance Evaluation of OHAT with Existing Cloud Data Security Algorithms
OHAT - Authentication Decryption and Cloud Data Storage
Authentication and Authorization
Orthogonal Handshaking Authentication Algorithm (OHAA)
Orthogonal Block Allocation Table (OBAT)
Orthogonal Decryption Algorithm (ODA)
Performance Evaluation of OHAT – ODA
Performance Evaluation of OHAT - Authentication and Decryption with Existing Cloud Storage Algorithms
Result and Discussion
Performance Evaluation Parameters
Performance Evaluation of Key Generation with Cloud Service Providers
Performance Evaluation of Encryption with Cloud Service Providers
Performance Evaluation of Authentication with Cloud Service Providers
Performance Analysis of Decryption with Cloud Service Providers
Throughput Analysis
Conclusion
References
Chapter 2
Privacy Preservation in Cloud Platform Using Fully Homomorphic Encryption Techniques
Abstract
Introduction
Security and Privacy Issues in Cloud
Some Key Considerations to Be Aware of in Privacy Concern
Security Problems in the Cloud
Secrecy Preserving Schemes
Homomorphic Encryption
A Job That Pacifies...
Exponential
Factors
Fourier Transform
Proposed Approach
Results and Discussion
Homomorphism Properties
Homomorphism Addition of Plaintexts
Homomorphism Multiplication of Plaintexts
Self-Multiplication Complexity
Conclusion
References
Chapter 3
Improving the Scalability of Blockchain Powered IoT Networks Using Improved Fuzzy Stellar Consensus Protocol
Abstract
Introduction
Literature Review
Proposed Fuzzy Stellar Consensus Protocol (FSCP) Model for Improved Scalability
Result and Comparative Analysis
Conclusion and Future Scope
References
Chapter 4
Cloud Computing Infrastructure for Education System Development
Abstract
Introduction
Literature Review
Software as a Service Created Applications for Education System
Teaching
Lecture Halls
Instructors
Materials for Study
Video PPTs
Preparation for Class
Student Records
Student Participation
Activities in the Classroom
Teacher Profiles
Interaction with Parents
Cloud Based – Learning Process
Security Patterns for Education System
Security Requirements
Confidentiality
Authentication and Authorization
Honesty
Data Accuracy
Assaults on Network Properties
Google Cloud Based Isolated Area Teaching System
Challenges for Education System
Platforms for Smart Education Systems
Networking Issues
Challenges Facing Educational Organizations
Miscellaneous Technical Issues
Accessibility
Dependability is a Term Used to Portray an Individual’s Ability
Management Education Is an Issue in Management Organizations
Budget-Friendly
Conclusion
References
Chapter 5
Effective Cloud Computing Features – AWS
Abstract
Introduction: How Cloud Computing Effects Productivity
Advantages of Cloud Computing
Challenges in Cloud Databases
Available Database as a Service in Cloud
Limitations in Cloud
Impractical for Big Data Analytics
Benefits of Using IoT in Cloud Computing
AWS IoT 1-Click
Benefits of AWS IoT 1- Click
AWS IoT Analytics
Benefits of AWS IoT Analytics
AWS IoT Button
AWS IoT Core
Mirror Device State
Build Alexa Built-in Devices Cost-Effectively at Scale
Connect and Manage Lorawan Devices
Benefits
AWS IoT Device Defender
Working AWS IoT Device Defender Can Send Alerts to the AWS IoT Console, Amazon Cloudwatch
Why Is IoT Security Important?
What Are the Challenges with IoT Security
AWS IoT Device Defender Helps You Manage IoT Security
When to Use AWS IoT Device Defender for IoT Security
Continuous Compliance and Adoption of Security Best Practices
Attack Surface Evaluation
Threat Impact Analysis
AWS IoT Device Management
How AWS IoT Device Management Works
Benefits of Using AWS IoT Device Management
AWS IoT Events
Benefits
AWS IoT Greengrass
AWS IoT SiteWise
Use Cases
AWS IoT Things Graph
Benefits
AWS Partner Device Catalog
Explore, Build, and Go to Market
Why Choose AWS Qualified Devices
FreeRTOS
Benefits
Conclusion
References
Chapter 6
Generation of Power from Waste Using Thermo-Electric Generators
Abstract
Introduction
Problem Statement
Motivation
Objective
Result and Discussion
Working of Thermoelectric Materials
Conclusion
References
Chapter 7
Analysis and Visualization of Cloud Data in Agriculture Using Supervised Learning
Abstract
Introduction
Origin of Agricultural Data
Meaning of Cloud Data in the Field of Agriculture
Analysis and Visualization of Cloud Data
Analysis Techniques of Cloud Data
Predictive Analysis
Recommendation System
Data Mining
An Analytical Technique for Time Series Cloud Data
Implementing Analysis in Agriculture
Challenges of Cloud Data in Agriculture
Future Scope of Work in Agriculture
Conclusion
References
Chapter 8
Recent Challenges and Future Research Scope in Smart Healthcare Using a Blockchain-Based Iot Environment: A Systematic Analysis
Abstract
Introduction
Background Technology
Internet of Things (IoT) for Healthcare
Blockchain Technology
Literature Survey
Conclusion
References
Chapter 9
Basics of Trellis Coded Modulation (TCM) Encoding for the IoT Key Enabler
Abstract
Introduction
Types of Error Correction Coding and Decoding Techniques
Traditional Types of Modulation
Trellis Coded Modulation
Advantages of Multi-Level Modulation
Basics of Trellis Code
Trellis Code Suggested by Ungerboeck
Multidimensional Phase TCM
Signal Set Partitioning
Mapping Equations
Effect of Phase Rotation on Multi-Dimensional –PSK
The General Encoding System
Differential Encoder
Convolutional Coder
Constellation Mapper and Modulator
Conclusion
References
Chapter 10
A Neural Network-Based Workload Prediction Mock-Up for Data Centers
Abstract
Introduction
Literature Survey
Proposed System
LSTM Algorithm
Implementation and Results
Conclusion and Future Scope
References
Chapter 11
A Technique for Properly Secured Sharing of Health Records in the Cloud
Abstract
Introduction
Literature Survey
i. Data Security and Privacy Care in Edge Computing Paradigm
ii. Cloud-Based Secure Exchange of Electronic Health Records
iii. A Strategy for Incremental Proxy Re-Encryption in a Mobile Cloud Computing Environment
iv. Edge-of-Things Privacy-Preserving Multi-Channel Communication
Problem Definition
Proposed Solution
Implementation and Result
Conclusion and Future Enhancement
References
About the Editors
List of Contributors
Index
Blank Page
Blank Page