Atnaujinkite slapukų nuostatas

El. knyga: Security and Privacy for Big Data, Cloud Computing and Applications

Edited by (Universitat Politčcnica de Catalunya, ), Edited by (China University of Geosciences (Wuhan), School of Computer Science, China), Edited by (University of Texas at San Antonio, USA), Edited by (China University of Geosciences (CUG), School of Computer Science, China)
  • Formatas: PDF+DRM
  • Serija: Computing and Networks
  • Išleidimo metai: 30-Sep-2019
  • Leidėjas: Institution of Engineering and Technology
  • Kalba: eng
  • ISBN-13: 9781785617485
Kitos knygos pagal šią temą:
  • Formatas: PDF+DRM
  • Serija: Computing and Networks
  • Išleidimo metai: 30-Sep-2019
  • Leidėjas: Institution of Engineering and Technology
  • Kalba: eng
  • ISBN-13: 9781785617485
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book examines various topics and approaches related to the security and privacy in big data and cloud computing, where authors share their expertise in their respective chapters on a broad range of security and privacy challenges and state of the art solutions.



As big data becomes increasingly pervasive and cloud computing utilization becomes a norm, this book focuses on ensuring the security and privacy of our systems and data, which will be more critical with emerging security and privacy threats and challenges. Specifically, this book examines various topics and approaches related to the security and privacy in big data and cloud computing, where authors share their expertise in their respective chapters on a broad range of security and privacy challenges and state of the art solutions. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.

About the editors xiii
Preface xv
1 Privacy preserving in big data
1(26)
Mengmeng Yang
Tianqing Zhu
1.1 Privacy attacks
1(6)
1.1.1 Tabular data attack
1(2)
1.1.2 Graph data attack
3(2)
1.1.3 Location privacy attack
5(1)
1.1.4 Attacks for other applications
6(1)
1.2 Privacy technologies
7(7)
1.2.1 Encryption
7(1)
1.2.2 Anonymization
8(1)
1.2.3 Differential privacy
9(4)
1.2.4 Other technologies
13(1)
1.3 Privacy metrics
14(5)
1.3.1 Uncertainty
14(2)
1.3.2 Error/Accuracy
16(2)
1.3.3 Indistinguishability
18(1)
1.4 Summary
19(8)
References
19(8)
2 Privacy-preserving analysis for big data using cryptographic tools
27(20)
Rui Xu
2.1 Privacy-preserving data analysis
28(2)
2.1.1 Security model of privacy-preserving data analysis
28(2)
2.2 Encryption schemes with special properties
30(4)
2.2.1 Deterministic encryption and keyword search
30(1)
2.2.2 Order preserving encryption and range query
31(1)
2.2.3 Scalar-product-preserving encryption and nearest neighbor query
32(1)
2.2.4 Searchable symmetric encryption
33(1)
2.3 Schemes based on secure computation
34(5)
2.3.1 Secure computation
34(1)
2.3.2 Scalability of secure computation
35(1)
2.3.3 Secure computation on top of ORAM
36(3)
2.4 Features of reviewed solutions
39(1)
2.5 Summary
40(1)
2.6 Summary
41(6)
References
42(5)
3 Big data security in Internet of Things
47(20)
Yongjun Zheng
Haider Ali
Umair Ullah Tariq
3.1 Internet-of-Things
47(9)
3.1.1 Wireless sensor network
49(1)
3.1.2 Cloud
50(3)
3.1.3 Big data analytics
53(3)
3.2 Big data security
56(6)
3.2.1 Hadoop security
58(1)
3.2.2 Cloud security
59(1)
3.2.3 Monitoring and auditing
60(1)
3.2.4 Key management
61(1)
3.2.5 Anonymization
61(1)
3.3 Summary
62(5)
References
63(4)
4 A watermark-based in situ access-control model for image big data
67(22)
Liangli Ma
Jinyi Guo
Wei Ren
Yi Ren
4.1 Preliminaries
67(1)
4.2 Introduction
68(2)
4.3 Related work
70(2)
4.4 Problem formulation
72(4)
4.4.1 System model
72(2)
4.4.2 Attack models
74(1)
4.4.3 Design goals
75(1)
4.5 Proposed scheme
76(6)
4.5.1 Basic settings
76(1)
4.5.2 Hierarchical key-role-area access-control model
76(3)
4.5.3 Image publication
79(1)
4.5.4 Client conformance
80(1)
4.5.5 Case study
80(2)
4.6 Security and performance analysis
82(1)
4.6.1 Security analysis
82(1)
4.6.2 Performance analysis
83(1)
4.7 Conclusions
83(6)
Acknowledgments
84(1)
References
85(4)
5 Blockchain-based security and access control for BIM big data
89(32)
Rongyue Zheng
Jianlin Jiang
Xiaohan Hao
Wei Ren
5.1 bcBIM: a blockchain-based big data model for BIM modification audit and provenance in mobile cloud
89(16)
5.1.1 Introduction
89(1)
5.1.2 Related work
90(2)
5.1.3 Problem formulation
92(3)
5.1.4 Proposed scheme
95(5)
5.1.5 Example---public blockchain bcBIM
100(1)
5.1.6 Example---private blockchain bcBIM
100(2)
5.1.7 Security analysis and performance analysis
102(2)
5.1.8 Conclusions
104(1)
5.2 CaACBIM: a context-aware access control model for BIM
105(16)
5.2.1 Introduction
105(1)
5.2.2 Related work
106(1)
5.2.3 Problem formulation
107(1)
5.2.4 Proposed scheme
108(6)
5.2.5 Security and performance analysis
114(2)
5.2.6 Conclusions
116(1)
Acknowledgment
116(1)
Data availability statement
116(1)
References
116(5)
6 Security of marine-information system
121(14)
Lin Mu
Jun Song
6.1 Background and significance of marine information security
121(1)
6.2 The characteristics and design objective of marine-information system
122(1)
6.3 Marine information security risk analysis
123(1)
6.4 Analysis on marine-information system security demand
124(1)
6.4.1 Wireless network communication security
124(1)
6.4.2 Marine data security
125(1)
6.4.3 Marine-information-sharing security
125(1)
6.4.4 Marine-information-systematization security
125(1)
6.5 Marine information security system
125(2)
6.5.1 Marine communication and network security
126(1)
6.5.2 Marine system computing environment security
126(1)
6.5.3 Big marine data and application security
126(1)
6.5.4 Marine-information-sharing security
127(1)
6.5.5 Marine security monitoring and forewarning mechanism
127(1)
6.5.6 Marine security infrastructure
127(1)
6.6 Key security theory and technology
127(6)
6.6.1 Password and security protocol
128(3)
6.6.2 Intrusion detection
131(1)
6.6.3 Data backup and recovery technology
132(1)
6.7 Marine information security development trend and discussion
133(2)
References
134(1)
7 A layered security architecture based on cyber kill chain against advanced persistent threats
135(22)
Pooneh Nikkhah Bahrami
Ali Dehghantanha
Tooska Dargahi
Reza M. Parizi
Kim-Kwang Raymond Choo
Hamid H.S. Javadi
7.1 Introduction
135(1)
7.2 Driven defensive model (course of actions)
136(3)
7.3 Defense mechanism
139(5)
7.3.1 Mitigation for each phase of CKC model
139(5)
7.4 Mapping 7D, CKC and APT actors activities
144(7)
7.5 Conclusion
151(6)
References
151(6)
8 Privacy-aware digital forensics
157(40)
Ana Nieto
Ruben Rios
Javier Lopez
8.1 Introduction
157(2)
8.2 Digital forensics
159(7)
8.2.1 Evolution of digital forensics
160(2)
8.2.2 Digital forensics rules
162(2)
8.2.3 Digital forensics challenges
164(2)
8.3 Digital privacy
166(6)
8.3.1 Evolution of digital privacy
166(1)
8.3.2 Privacy protection
167(4)
8.3.3 Privacy challenges in digital forensics
171(1)
8.4 Law, privacy and digital forensics
172(2)
8.5 Privacy-aware computer forensics
174(5)
8.5.1 Database
174(3)
8.5.2 Computer
177(2)
8.6 Privacy-aware network forensics
179(6)
8.6.1 Server
180(2)
8.6.2 Networks
182(2)
8.6.3 Browser and applications
184(1)
8.7 Beyond computer and network forensics
185(3)
8.7.1 Mobile
185(1)
8.7.2 Cloud
186(1)
8.7.3 Internet of Things
187(1)
8.8 Conclusions and final remarks
188(9)
References
190(7)
9 A survey of trust, trustworthiness and trustworthy computing: concepts, models and challenges
197(16)
Fatos Xhafa
9.1 Introduction
197(2)
9.2 Basic concepts and models for trust, trustworthiness and trustworthy computing
199(7)
9.2.1 Characteristics of trust, trustworthiness and trustworthy computing
201(1)
9.2.2 Trust, trustworthy and trustworthiness modelling
202(4)
9.3 Trustworthy evaluation and prediction
206(1)
9.4 Blockchain and trust
207(1)
9.4.1 Trust-free vs. trust building
207(1)
9.4.2 Blockchain as a factor of trust
208(1)
9.5 Conclusions and future research
208(5)
References
209(4)
10 Software-defined mobile networks security
213(26)
Yongfeng Qian
Min Chen
10.1 The evolution of software-defined mobile network
213(1)
10.2 SDMN architecture
214(5)
10.2.1 Network function virtualization
215(3)
10.2.2 OpenFlow
218(1)
10.3 SDMN security issues
219(4)
10.3.1 SDN original security issues
219(2)
10.3.2 Special security issues in SDMN
221(2)
10.4 SDMN security measures
223(8)
10.4.1 Data plane attack
225(2)
10.4.2 Control plane attack
227(1)
10.4.3 Application plane attack
228(1)
10.4.4 Attack at the communication protocols
228(1)
10.4.5 Category and analysis of STRIDE
229(1)
10.4.6 SDMN security challenges
230(1)
10.5 Summary
231(8)
References
231(8)
11 Dynamic public opinion evolvement modeling and supervision in social networks
239(24)
Shuaishuai Zhu
Xu An Wang
11.1 Introduction
239(2)
11.1.1 No combined analysis model for public opinion in social networks
240(1)
11.1.2 Dynamic challenge for public opinion sampling and inspection
240(1)
11.1.3 Time efficiency for public opinion supervision
241(1)
11.2 Related works
241(2)
11.2.1 Evolvement based on topo discovery and graph structure change
241(1)
11.2.2 Evolvement based on influence analysis
242(1)
11.2.3 Evolvement based on sentiment an(LNLP
242(1)
11.3 Dynamic public opinion evolvement modeling
243(7)
11.3.1 System model and definitions
243(5)
11.3.2 Conditional optimization problems in dynamic public opinion evolvement
248(2)
11.4 Evolvement of public opinion and supervision
250(2)
11.4.1 Preparation algorithms
250(1)
11.4.2 Evolvement and supervision algorithms
250(2)
11.5 Data and results
252(7)
11.5.1 Datasets and environment
252(2)
11.5.2 Parameters (μ, λ, ε(t))
254(2)
11.5.3 OC--SA optimization performance in TTSN evolvement effectiveness
256(3)
11.6 Discussions
259(4)
Acknowledgments
260(1)
References
260(3)
12 Privacy verification of PhotoDNA based on machine learning
263(18)
Muhammad Shahroz Nadeem
Virginia N.L. Franqueira
Xiaojun Zhai
12.1 Introduction
263(2)
12.2 Hash functions
265(1)
12.3 PhotoDNA
265(1)
12.4 Content-based image classification
265(2)
12.4.1 Feature-descriptor-based image classification
266(1)
12.4.2 CNN-based image classification
266(1)
12.5 Encryption-based image classification
267(2)
12.6 Experiments
269(4)
12.6.1 Experimental framework
269(1)
12.6.2 PhotoDNA hash values dataset
270(3)
12.7 Results
273(3)
12.8 Discussion
276(1)
12.9 Conclusion
277(4)
References
277(4)
13 Chaos-based communication systems
281(22)
Xiaojing Gao
13.1 Cryptography and chaos
281(1)
13.2 Continuous chaotic systems
282(5)
13.2.1 Chua's chaotic system
282(1)
13.2.2 Lorentz chaotic system
283(2)
13.2.3 Chen's chaotic system
285(1)
13.2.4 Lii chaotic system
285(2)
13.3 Chaotic secure communication and its application in optical communication
287(2)
13.3.1 The design of chaotic secure communication
287(2)
13.4 Optic chaotic communication
289(14)
13.4.1 Ikeda-delayed chaotic system
289(1)
13.4.2 A chaotic system with suppressed time-delay signature based on multiple electro-optic nonlinear loops
290(1)
13.4.3 System model
291(2)
13.4.4 Time-delay signature suppression
293(3)
13.4.5 Synchronization scheme
296(4)
References
300(3)
Index 303
Wei Ren is a full Professor at the School of Computer Science, China University of Geosciences (Wuhan), China.



Lizhe Wang is a "ChuTian" Chair Professor at School of Computer Science, China Univ. of Geosciences (CUG).



Kim-Kwang Raymond Choo holds the Cloud Technology Endowed Professorship at the University of Texas at San Antonio, USA.



Fatos Xhafa holds a permanent position of Professor Titular d'Universitat (Hab. Full Professor) at the Departament de Cičncies de la Computació, Universitat Politčcnica de Catalunya, Barcelona, Spain.