Advertisement

Additional Security Considerations for Cloud

  • Naresh Kumar Sehgal
  • Pramod Chandra P. Bhatt
  • John M. Acken
Chapter

Abstract

This chapter starts by reviewing the Internet security threat models and an Open Web Application Security Project. Then we visit the emergence of edge computing, security solutions for IoT devices, and access control using speaker identification and wrap with a discussion of real-time control of cyber-physical systems.

References

  1. 1.
    Sehgal, N. K., Sohoni, S., Xiong, Y., Fritz, D., Mulia, W., & Acken, J. M. (2011). A cross section of the issues and research activities related to both information security and cloud computing. IETE Technical Review, 28(4), 279–291.CrossRefGoogle Scholar
  2. 2.
  3. 3.
    Ashton, J. (2009). That ‘Internet of Things’ thing. RFID Journal, 22.Google Scholar
  4. 4.
  5. 5.
  6. 6.
  7. 7.
  8. 8.
  9. 9.
  10. 10.
  11. 11.
    Beckman, P., Sankaran, R., Catlett, C., Ferrier, N., Jacob, R., & Papka, M. (2016). Waggle: An open sensor platform for edge computing. 2016 IEEE SENSORS, Orlando, FL, pp. 1–3.  https://doi.org/10.1109/ICSENS.2016.7808975.
  12. 12.
  13. 13.
  14. 14.
  15. 15.
    Hamilton, W. L., et al. Loyalty in online communities. Proceedings of the eleventh international AAAI conference on Web and Social Media (ICWSM 2017), pp. 540–543.Google Scholar
  16. 16.
    Deng, L. et al. (2013). Recent advances in deep learning for speech research at Microsoft. 2013 IEEE international conference on Acoustics, Speech and Signal Processing, Vancouver, BC, pp. 8604–8608.  https://doi.org/10.1109/ICASSP.2013.6639345.
  17. 17.
    Nelson, R. (2017, June). Smart factories leverage cloud, edge computing. Evaluation Engineering, 56(6).Google Scholar
  18. 18.
  19. 19.
    Sommer, R., & Paxson, V. (2010, May). Outside the closed world: On using machine learning for network intrusion detection. 2010 IEEE Symposium on Security and Privacy.Google Scholar
  20. 20.
  21. 21.
  22. 22.
    Sohoni, S., Shaver, C. D., Acken, J.M., Mertz, D., Nelson, L. E., Remington, J., Sadr, B., Sundararajan, G. (2009) Evaluation criteria for biometric based identity authentication systems, Proceedings of ISSSIS2009, Coimbatore, 8–10 January.Google Scholar
  23. 23.
    Ortega-Garcia, J., Bigun, J., Reynolds, D., & Gonzalez-Rodriguez, J. (2004, March). Authentication gets personal with biometrics. Signal Processing Magazine, IEEE, 21, 50–62.CrossRefGoogle Scholar
  24. 24.
    Acken, J. M., & Nelson, L. E. (2008). Statistical basics for testing and security of digital systems for identity authentication. CCCT, International Institute of Informatics and systematic, Orlando, FL, pp. 122–128, June 29th–July 2nd.Google Scholar
  25. 25.
    Bonastre, J. F., Bimbot, F., Boe, L. J., Campbell, J. P., Reynolds, D. A., & Magrin-Chagnolleau, I. (2003) Person authentication by voice: A need for caution. Proceeding of Eurospeech, ISCA, Geneva, pp. 33–36, 1–4 September.Google Scholar
  26. 26.
  27. 27.
    Lee, J., Bagheri, B., & Kao, H.-A. (2015, January). A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manufacturing Letters, 3, 18–23.  https://doi.org/10.1016/j.mfglet.2014.12.001.CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Naresh Kumar Sehgal
    • 1
  • Pramod Chandra P. Bhatt
    • 2
  • John M. Acken
    • 3
  1. 1.Data Center GroupIntel CorporationSanta ClaraUSA
  2. 2.Computer Science and Information Technology ConsultantRetd. Prof. IIT DelhiBangaloreIndia
  3. 3.Electrical and Computer EngineeringPortland State UniversityPortlandUSA

Personalised recommendations