Integration of Cloud Computing with Internet of Things (eBook, PDF)
Foundations, Analytics and Applications
Redaktion: Mangla, Monika; Mohanty, Sachi Nandan; Nayak, Bhagirathi; Satpathy, Suneeta
Alle Infos zum eBook verschenken
Integration of Cloud Computing with Internet of Things (eBook, PDF)
Foundations, Analytics and Applications
Redaktion: Mangla, Monika; Mohanty, Sachi Nandan; Nayak, Bhagirathi; Satpathy, Suneeta
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The book aims to integrate the aspects of IoT, Cloud computing and data analytics from diversified perspectives. The book also plans to discuss the recent research trends and advanced topics in the field which will be of interest to academicians and researchers working in this area. Thus, the book intends to help its readers to understand and explore the spectrum of applications of IoT, cloud computing and data analytics. Here, it is also worth mentioning that the book is believed to draw attention on the applications of said technology in various disciplines in order to obtain enhanced…mehr
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 36.54MB
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: John Wiley & Sons
- Seitenzahl: 384
- Erscheinungstermin: 8. März 2021
- Englisch
- ISBN-13: 9781119769316
- Artikelnr.: 61314881
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Verlag: John Wiley & Sons
- Seitenzahl: 384
- Erscheinungstermin: 8. März 2021
- Englisch
- ISBN-13: 9781119769316
- Artikelnr.: 61314881
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Acknowledgement xvii
1 Internet of Things: A Key to Unfasten Mundane Repetitive Tasks 1
Hemanta Kumar Palo and Limali Sahoo
1.1 Introduction 1
1.2 The IoT Scenario 2
1.3 The IoT Domains 3
1.3.1 The IoT Policy Domain 3
1.3.2 The IoT Software Domain 5
1.3.2.1 IoT in Cloud Computing (CC) 5
1.3.2.2 IoT in Edge Computing (EC) 6
1.3.2.3 IoT in Fog Computing (FC) 10
1.3.2.4 IoT in Telecommuting 11
1.3.2.5 IoT in Data-Center 12
1.3.2.6 Virtualization-Based IoT (VBIoT) 12
1.4 Green Computing (GC) in IoT Framework 12
1.5 Semantic IoT (SIoT) 13
1.5.1 Standardization Using oneM2M 15
1.5.2 Semantic Interoperability (SI) 18
1.5.3 Semantic Interoperability (SI) 19
1.5.4 Semantic IoT vs Machine Learning 20
1.6 Conclusions 21
References 21
2 Measures for Improving IoT Security 25
Richa Goel, Seema Sahai, Gurinder Singh and Saurav Lall
2.1 Introduction 25
2.2 Perceiving IoT Security 26
2.3 The IoT Safety Term 27
2.4 Objectives 28
2.4.1 Enhancing Personal Data Access in Public Repositories 28
2.4.2 Develop and Sustain Ethicality 28
2.4.3 Maximize the Power of IoT Access 29
2.4.4 Understanding Importance of Firewalls 29
2.5 Research Methodology 30
2.6 Security Challenges 31
2.6.1 Challenge of Data Management 32
2.7 Securing IoT 33
2.7.1 Ensure User Authentication 33
2.7.2 Increase User Autonomy 33
2.7.3 Use of Firewalls 34
2.7.4 Firewall Features 35
2.7.5 Mode of Camouflage 35
2.7.6 Protection of Data 35
2.7.7 Integrity in Service 36
2.7.8 Sensing of Infringement 36
2.8 Monitoring of Firewalls and Good Management 36
2.8.1 Surveillance 36
2.8.2 Forensics 37
2.8.3 Secure Firewalls for Private 37
2.8.4 Business Firewalls for Personal 37
2.8.5 IoT Security Weaknesses 37
2.9 Conclusion 37
References 38
3 An Efficient Fog-Based Model for Secured Data Communication 41
V. Lakshman Narayana and R. S. M. Lakshmi Patibandla
3.1 Introduction 41
3.1.1 Fog Computing Model 42
3.1.2 Correspondence in IoT Devices 43
3.2 Attacks in IoT 45
3.2.1 Botnets 45
3.2.2 Man-In-The-Middle Concept 45
3.2.3 Data and Misrepresentation 46
3.2.4 Social Engineering 46
3.2.5 Denial of Service 46
3.2.6 Concerns 47
3.3 Literature Survey 48
3.4 Proposed Model for Attack Identification Using Fog Computing 49
3.5 Performance Analysis 52
3.6 Conclusion 54
References 54
4 An Expert System to Implement Symptom Analysis in Healthcare 57
Subhasish Mohapatra and Kunal Anand
4.1 Introduction 57
4.2 Related Work 59
4.3 Proposed Model Description and Flow Chart 60
4.3.1 Flowchart of the Model 60
4.3.1.1 Value of Symptoms 60
4.3.1.2 User Interaction Web Module 60
4.3.1.3 Knowledge-Base 60
4.3.1.4 Convolution Neural Network 60
4.3.1.5 CNN-Fuzzy Inference Engine 61
4.4 UML Analysis of Expert Model 62
4.4.1 Expert Module Activity Diagram 63
4.4.2 Ontology Class Collaboration Diagram 65
4.5 Ontology Model of Expert Systems 66
4.6 Conclusion and Future Scope 67
References 68
5 An IoT-Based Gadget for Visually Impaired P
Acknowledgement xvii
1 Internet of Things: A Key to Unfasten Mundane Repetitive Tasks 1
Hemanta Kumar Palo and Limali Sahoo
1.1 Introduction 1
1.2 The IoT Scenario 2
1.3 The IoT Domains 3
1.3.1 The IoT Policy Domain 3
1.3.2 The IoT Software Domain 5
1.3.2.1 IoT in Cloud Computing (CC) 5
1.3.2.2 IoT in Edge Computing (EC) 6
1.3.2.3 IoT in Fog Computing (FC) 10
1.3.2.4 IoT in Telecommuting 11
1.3.2.5 IoT in Data-Center 12
1.3.2.6 Virtualization-Based IoT (VBIoT) 12
1.4 Green Computing (GC) in IoT Framework 12
1.5 Semantic IoT (SIoT) 13
1.5.1 Standardization Using oneM2M 15
1.5.2 Semantic Interoperability (SI) 18
1.5.3 Semantic Interoperability (SI) 19
1.5.4 Semantic IoT vs Machine Learning 20
1.6 Conclusions 21
References 21
2 Measures for Improving IoT Security 25
Richa Goel, Seema Sahai, Gurinder Singh and Saurav Lall
2.1 Introduction 25
2.2 Perceiving IoT Security 26
2.3 The IoT Safety Term 27
2.4 Objectives 28
2.4.1 Enhancing Personal Data Access in Public Repositories 28
2.4.2 Develop and Sustain Ethicality 28
2.4.3 Maximize the Power of IoT Access 29
2.4.4 Understanding Importance of Firewalls 29
2.5 Research Methodology 30
2.6 Security Challenges 31
2.6.1 Challenge of Data Management 32
2.7 Securing IoT 33
2.7.1 Ensure User Authentication 33
2.7.2 Increase User Autonomy 33
2.7.3 Use of Firewalls 34
2.7.4 Firewall Features 35
2.7.5 Mode of Camouflage 35
2.7.6 Protection of Data 35
2.7.7 Integrity in Service 36
2.7.8 Sensing of Infringement 36
2.8 Monitoring of Firewalls and Good Management 36
2.8.1 Surveillance 36
2.8.2 Forensics 37
2.8.3 Secure Firewalls for Private 37
2.8.4 Business Firewalls for Personal 37
2.8.5 IoT Security Weaknesses 37
2.9 Conclusion 37
References 38
3 An Efficient Fog-Based Model for Secured Data Communication 41
V. Lakshman Narayana and R. S. M. Lakshmi Patibandla
3.1 Introduction 41
3.1.1 Fog Computing Model 42
3.1.2 Correspondence in IoT Devices 43
3.2 Attacks in IoT 45
3.2.1 Botnets 45
3.2.2 Man-In-The-Middle Concept 45
3.2.3 Data and Misrepresentation 46
3.2.4 Social Engineering 46
3.2.5 Denial of Service 46
3.2.6 Concerns 47
3.3 Literature Survey 48
3.4 Proposed Model for Attack Identification Using Fog Computing 49
3.5 Performance Analysis 52
3.6 Conclusion 54
References 54
4 An Expert System to Implement Symptom Analysis in Healthcare 57
Subhasish Mohapatra and Kunal Anand
4.1 Introduction 57
4.2 Related Work 59
4.3 Proposed Model Description and Flow Chart 60
4.3.1 Flowchart of the Model 60
4.3.1.1 Value of Symptoms 60
4.3.1.2 User Interaction Web Module 60
4.3.1.3 Knowledge-Base 60
4.3.1.4 Convolution Neural Network 60
4.3.1.5 CNN-Fuzzy Inference Engine 61
4.4 UML Analysis of Expert Model 62
4.4.1 Expert Module Activity Diagram 63
4.4.2 Ontology Class Collaboration Diagram 65
4.5 Ontology Model of Expert Systems 66
4.6 Conclusion and Future Scope 67
References 68
5 An IoT-Based Gadget for Visually Impaired P