Skip to main content

Homeland Security and Cloud: Challenges and On-Going Developments

  • Chapter

Part of the book series: Smart Sensors, Measurement and Instrumentation ((SSMI,volume 1))

Abstract

In this chapter we deal with the Homeland Security issue, which is a very crucial topic for all over the world. We specifically focus on how to benefit from cloud computing to prevent and face off terrorism attacks. To show and discuss such benefits, we analyse a specific scenario for HS, that is the Transport of Dangerous Goods. We introduce the concept of “Concurrent” transport, that describes the contemporary movement of goods through different modes in a specific geographical area in a given time interval. Spatial and temporal constrains allow to analyze the global Societal Risk of the transport in that area and to highlight the requirements of the Homeland Security activities. We present a new Cloud architecture specifically designed for supporting Homeland Security, both in terms of prevention and management of dangerous situations. It offers world wide services for the cooperation of governments and organizations involved in disaster prevention and/or rescue through the creation of federations. It also guarantees a capillary interaction with the environment along with different and heterogeneous sensing infrastructures, in order to collect massive information for detection, planning, and management activities against terrorism.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Federal Cloud Computing Strategy (December 2011), http://www.theresearchpedia.com/sites/default/files/FederalCloudComputingStrategy.pdf

  2. National Security Threat List (April 2011), http://www.wright.edu/rsp/Security/T1threat/Nstl.html

  3. Multimodal Transport Handbook, UNCTAD 1996 (2002), http://unctad.org/en/docs/c3em20d2_en.pdf

  4. Accord Dangereuses Route (March 2012), http://www.unece.org/trans/danger/publi/adr/adr_e.html

  5. International Maritime Dangerous Goods Code (March 2012), http://www.imo.org/Pages/home.aspx

  6. ICAO: Dangerous Goods (March 2012), http://www.icao.int/safety/DangerousGoods/Pages/default.aspx

  7. AIChE/CCPS, Guideline for chemical process quantitative risk analysis, 2nd edn., New York (2000)

    Google Scholar 

  8. NIST Cloud Computing Reference Architecture (December 2011), http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909505

  9. The Extensible Messaging and Presence Protocol (XMPP) protocol, http://tools.ietf.org/html/rfc3920

  10. Sedna, Native XML Database System (December 2011), http://modis.ispras.ru/sedna/

  11. Transport of dangerous goods through road tunnels. quantitative risk assessment model (version 3.60), reference manual. In: OECD/PIARC/EU, CDROM (2003)

    Google Scholar 

  12. MITRA: Monitoring and intervention for the transportation of dangerous goods (2004-2006), http://www.mitraproject.info/

  13. SMARTFREIGHT project, FP7-216353 (2009), http://www.smartfreight.info//

  14. Sensor Web Enablement (2011), http://www.opengeospatial.org/standards

  15. Alam, S., Chowdhury, M., Noll, J.: Senaas: An event-driven sensor virtualization approach for internet of things cloud. In: 2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications (NESEA), pp. 1–6 (2010), 10.1109/NESEA.2010.5678060

    Google Scholar 

  16. Chen, H., Reid, E., Sinai, J., Silke, A., Ganor, B.: Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security, 1st edn. Springer Publishing Company (2008) (incorporated)

    Google Scholar 

  17. Dunkels, A., Grnvall, B., Voigt, T.: Contiki - a lightweight and flexible operating system for tiny networked sensors. In: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, LCN 2004 (2004)

    Google Scholar 

  18. Egami, K., Matsumoto, S., Nakamura, M.: Ubiquitous cloud: Managing service resources for adaptive ubiquitous computing. In: 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 123–128 (2011), doi:10.1109/PERCOMW.2011.5766853

    Google Scholar 

  19. Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud Computing and Grid Computing 360-Degree Compared. In: Grid Computing Environments Workshop, GCE 2008, pp. 1–10 (2008)

    Google Scholar 

  20. Jain, S., McLean, C.R.: Recommended practices for homeland security modeling and simulation. In: Winter Simulation Conference, WSC 2009, pp. 2879–2890 (2009), http://dl.acm.org/citation.cfm?id=1995456.1995848

  21. Jonkman, S.: An overview of quantitative risk measures for loss of life and economic damage. Journal of Hazardous Materials 99(1), 1–30 (2003), http://linkinghub.elsevier.com/retrieve/pii/S0304389402002832

    Article  Google Scholar 

  22. Koyuncugil, A., Ozgulbas, N.: Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection. In: Premier Reference Source. IGI Global (2010), http://books.google.com/books?id=l4Ir1nvyURIC

  23. Mortimer, D.: Homeland security public safety dive teams: how technology can help. In: Proceedings of MTS/IEEE, OCEANS, vol. 1, pp. 178–183 (2005), doi:10.1109/OCEANS.2005.1639758

    Google Scholar 

  24. Ortner, M., Nehorai, A., Jeremic, A.: Biochemical transport modeling and bayesian source estimation in realistic environments. IEEE Transactions on Signal Processing 55(6), 2520–2532 (2007), doi:10.1109/TSP.2006.890924

    Article  MathSciNet  Google Scholar 

  25. Rajesh, V., Gnanasekar, J., Ponmagal, R., Anbalagan, P.: Integration of wireless sensor network with cloud. In: 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC), pp. 321–323 (2010), doi:10.1109/ITC.2010.88

    Google Scholar 

  26. Reddick, C.: Homeland security preparedness and information systems: strategies for managing public policy. Information Science Reference (2010), http://books.google.com/books?id=NaT_Fob6lBIC

  27. Rusitschka, S., Eger, K., Gerdes, C.: Smart grid data cloud: A model for utilizing cloud computing in the smart grid domain. In: 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 483–488 (2010), doi:10.1109/SMARTGRID.2010.5622089

    Google Scholar 

  28. Tusa, F., Paone, M., Villari, M., Puliafito., A.: CLEVER: A Cloud-Enabled Virtual Environment. In: 15th IEEE Symposium on Computers and Communications Computing and Communications, ISCC 2010, Riccione (2010)

    Google Scholar 

  29. Valente, F., Zacheo, G., Losito, P., Camarda, P.: A telecommunications framework for real-time monitoring of dangerous goods transport. In: 2009 9th International Conference on Intelligent Transport Systems Telecommunications (ITST), pp. 13–18 (2009)

    Google Scholar 

  30. Yim, K., You, I.: It issues on homeland security and defense. In: ARES, pp. 374–385 (2011)

    Google Scholar 

  31. Yingjun, Z., Shengwei, X., Peng, X., Xinquan, W.: Shipping containers of dangerous goods condition monitoring system based on wireless sensor network. In: 2010 6th International Conference on Networked Computing (INC), pp. 1–3 (2010)

    Google Scholar 

  32. Yuriyama, M., Kushida, T.: Sensor-cloud infrastructure - physical sensor management with virtualized sensors on cloud computing. In: 2010 13th International Conference on Network-Based Information Systems (NBiS), pp. 1–8 (2010), doi:10.1109/NBiS.2010.32

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Fazio .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Fazio, M., Paone, M., Puliafito, A., Villari, M. (2013). Homeland Security and Cloud: Challenges and On-Going Developments. In: Mukhopadhyay, S., Jayasundera, K., Fuchs, A. (eds) Advancement in Sensing Technology. Smart Sensors, Measurement and Instrumentation, vol 1. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32180-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32180-1_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32179-5

  • Online ISBN: 978-3-642-32180-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics