Abstract
In this chapter we deal with the Homeland Security issue, which is a very crucial topic for all over the world. We specifically focus on how to benefit from cloud computing to prevent and face off terrorism attacks. To show and discuss such benefits, we analyse a specific scenario for HS, that is the Transport of Dangerous Goods. We introduce the concept of “Concurrent” transport, that describes the contemporary movement of goods through different modes in a specific geographical area in a given time interval. Spatial and temporal constrains allow to analyze the global Societal Risk of the transport in that area and to highlight the requirements of the Homeland Security activities. We present a new Cloud architecture specifically designed for supporting Homeland Security, both in terms of prevention and management of dangerous situations. It offers world wide services for the cooperation of governments and organizations involved in disaster prevention and/or rescue through the creation of federations. It also guarantees a capillary interaction with the environment along with different and heterogeneous sensing infrastructures, in order to collect massive information for detection, planning, and management activities against terrorism.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Federal Cloud Computing Strategy (December 2011), http://www.theresearchpedia.com/sites/default/files/FederalCloudComputingStrategy.pdf
National Security Threat List (April 2011), http://www.wright.edu/rsp/Security/T1threat/Nstl.html
Multimodal Transport Handbook, UNCTAD 1996 (2002), http://unctad.org/en/docs/c3em20d2_en.pdf
Accord Dangereuses Route (March 2012), http://www.unece.org/trans/danger/publi/adr/adr_e.html
International Maritime Dangerous Goods Code (March 2012), http://www.imo.org/Pages/home.aspx
ICAO: Dangerous Goods (March 2012), http://www.icao.int/safety/DangerousGoods/Pages/default.aspx
AIChE/CCPS, Guideline for chemical process quantitative risk analysis, 2nd edn., New York (2000)
NIST Cloud Computing Reference Architecture (December 2011), http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909505
The Extensible Messaging and Presence Protocol (XMPP) protocol, http://tools.ietf.org/html/rfc3920
Sedna, Native XML Database System (December 2011), http://modis.ispras.ru/sedna/
Transport of dangerous goods through road tunnels. quantitative risk assessment model (version 3.60), reference manual. In: OECD/PIARC/EU, CDROM (2003)
MITRA: Monitoring and intervention for the transportation of dangerous goods (2004-2006), http://www.mitraproject.info/
SMARTFREIGHT project, FP7-216353 (2009), http://www.smartfreight.info//
Sensor Web Enablement (2011), http://www.opengeospatial.org/standards
Alam, S., Chowdhury, M., Noll, J.: Senaas: An event-driven sensor virtualization approach for internet of things cloud. In: 2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications (NESEA), pp. 1–6 (2010), 10.1109/NESEA.2010.5678060
Chen, H., Reid, E., Sinai, J., Silke, A., Ganor, B.: Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security, 1st edn. Springer Publishing Company (2008) (incorporated)
Dunkels, A., Grnvall, B., Voigt, T.: Contiki - a lightweight and flexible operating system for tiny networked sensors. In: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, LCN 2004 (2004)
Egami, K., Matsumoto, S., Nakamura, M.: Ubiquitous cloud: Managing service resources for adaptive ubiquitous computing. In: 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 123–128 (2011), doi:10.1109/PERCOMW.2011.5766853
Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud Computing and Grid Computing 360-Degree Compared. In: Grid Computing Environments Workshop, GCE 2008, pp. 1–10 (2008)
Jain, S., McLean, C.R.: Recommended practices for homeland security modeling and simulation. In: Winter Simulation Conference, WSC 2009, pp. 2879–2890 (2009), http://dl.acm.org/citation.cfm?id=1995456.1995848
Jonkman, S.: An overview of quantitative risk measures for loss of life and economic damage. Journal of Hazardous Materials 99(1), 1–30 (2003), http://linkinghub.elsevier.com/retrieve/pii/S0304389402002832
Koyuncugil, A., Ozgulbas, N.: Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection. In: Premier Reference Source. IGI Global (2010), http://books.google.com/books?id=l4Ir1nvyURIC
Mortimer, D.: Homeland security public safety dive teams: how technology can help. In: Proceedings of MTS/IEEE, OCEANS, vol. 1, pp. 178–183 (2005), doi:10.1109/OCEANS.2005.1639758
Ortner, M., Nehorai, A., Jeremic, A.: Biochemical transport modeling and bayesian source estimation in realistic environments. IEEE Transactions on Signal Processing 55(6), 2520–2532 (2007), doi:10.1109/TSP.2006.890924
Rajesh, V., Gnanasekar, J., Ponmagal, R., Anbalagan, P.: Integration of wireless sensor network with cloud. In: 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC), pp. 321–323 (2010), doi:10.1109/ITC.2010.88
Reddick, C.: Homeland security preparedness and information systems: strategies for managing public policy. Information Science Reference (2010), http://books.google.com/books?id=NaT_Fob6lBIC
Rusitschka, S., Eger, K., Gerdes, C.: Smart grid data cloud: A model for utilizing cloud computing in the smart grid domain. In: 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 483–488 (2010), doi:10.1109/SMARTGRID.2010.5622089
Tusa, F., Paone, M., Villari, M., Puliafito., A.: CLEVER: A Cloud-Enabled Virtual Environment. In: 15th IEEE Symposium on Computers and Communications Computing and Communications, ISCC 2010, Riccione (2010)
Valente, F., Zacheo, G., Losito, P., Camarda, P.: A telecommunications framework for real-time monitoring of dangerous goods transport. In: 2009 9th International Conference on Intelligent Transport Systems Telecommunications (ITST), pp. 13–18 (2009)
Yim, K., You, I.: It issues on homeland security and defense. In: ARES, pp. 374–385 (2011)
Yingjun, Z., Shengwei, X., Peng, X., Xinquan, W.: Shipping containers of dangerous goods condition monitoring system based on wireless sensor network. In: 2010 6th International Conference on Networked Computing (INC), pp. 1–3 (2010)
Yuriyama, M., Kushida, T.: Sensor-cloud infrastructure - physical sensor management with virtualized sensors on cloud computing. In: 2010 13th International Conference on Network-Based Information Systems (NBiS), pp. 1–8 (2010), doi:10.1109/NBiS.2010.32
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Fazio, M., Paone, M., Puliafito, A., Villari, M. (2013). Homeland Security and Cloud: Challenges and On-Going Developments. In: Mukhopadhyay, S., Jayasundera, K., Fuchs, A. (eds) Advancement in Sensing Technology. Smart Sensors, Measurement and Instrumentation, vol 1. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32180-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-32180-1_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32179-5
Online ISBN: 978-3-642-32180-1
eBook Packages: EngineeringEngineering (R0)