Skip to main content
Top

2021 | OriginalPaper | Chapter

Security Analysis Using Deep Learning in IoT and Intelligent Transport System

Authors : Gwanggil Jeon, Abdellah Chehri

Published in: Smart Transportation Systems 2021

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing is an embryonic and vast field. It is cost effective, flexible and customized solution provided to customers according to their needs. Due to cloud computing customers need of having their own data centers storages and services became truncated. Cloud service providers serves customers with infrastructure, storages, security, computation resources and fault rectifications. Due to the customized and flexible in nature cloud computing created many security concerns meanwhile security is the first requirement of customer. Storages, infrastructure, software and network need security measures. In this paper we deliver different defense techniques by using which cloud computing infrastructure could be made secure. It includes different protocols, encryption techniques, and hardware and software solutions for different level of security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mushtaq, M.F., et al.: Cloud computing environment and security challenges: a review. Int. J. Adv. Comput. Sci. Appl. 8(10), 183–195 (2017) Mushtaq, M.F., et al.: Cloud computing environment and security challenges: a review. Int. J. Adv. Comput. Sci. Appl. 8(10), 183–195 (2017)
2.
go back to reference Gou, Z., Yamaguchi, S., Gupta, B.: Analysis of various security issues and challenges in cloud computing environment: a survey. In: Identity Theft: Breakthroughs in Research and Practice. 2017, IGI Global. pp. 221–247 Gou, Z., Yamaguchi, S., Gupta, B.: Analysis of various security issues and challenges in cloud computing environment: a survey. In: Identity Theft: Breakthroughs in Research and Practice. 2017, IGI Global. pp. 221–247
3.
go back to reference Wilson, P.: Positive perspectives on cloud security. Inf. Secur. Tech. Rep. 16(3–4), 97–101 (2011) Wilson, P.: Positive perspectives on cloud security. Inf. Secur. Tech. Rep. 16(3–4), 97–101 (2011)
4.
go back to reference Mell, P., Grance, T.: The NIST definition of cloud computing (2011) Mell, P., Grance, T.: The NIST definition of cloud computing (2011)
5.
go back to reference Modi, C., et al.: A survey on security issues and solutions at different layers of Cloud computing. J. Supercomput. 63(2), 561–592 (2013)CrossRef Modi, C., et al.: A survey on security issues and solutions at different layers of Cloud computing. J. Supercomput. 63(2), 561–592 (2013)CrossRef
6.
go back to reference Puthal, D., et al.: Cloud computing features, issues, and challenges: a big picture. In: 2015 International Conference on Computational Intelligence and Networks (CINE), 2015 Puthal, D., et al.: Cloud computing features, issues, and challenges: a big picture. In: 2015 International Conference on Computational Intelligence and Networks (CINE), 2015
7.
go back to reference Singh, S., Jeong, Y.-S., Park, J.H.: A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)CrossRef Singh, S., Jeong, Y.-S., Park, J.H.: A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)CrossRef
8.
go back to reference Shimbre, N., Deshpande, P.: Enhancing distributed data storage security for cloud computing using TPA and AES algorithm. In: Computing Communication Control and Automation (ICCUBEA), 2015 Shimbre, N., Deshpande, P.: Enhancing distributed data storage security for cloud computing using TPA and AES algorithm. In: Computing Communication Control and Automation (ICCUBEA), 2015
9.
go back to reference Celesti, A., et al.: Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems. J. Netw. Comput. Appl. 59, 208–218 (2016)CrossRef Celesti, A., et al.: Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems. J. Netw. Comput. Appl. 59, 208–218 (2016)CrossRef
10.
go back to reference Yu, Y., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)CrossRef Yu, Y., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)CrossRef
11.
go back to reference Yan, Q., et al.: Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun. Surv. Tutor. 18(1), 602–622 (2016)CrossRef Yan, Q., et al.: Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun. Surv. Tutor. 18(1), 602–622 (2016)CrossRef
12.
go back to reference Ibrahim, A.S., Hamlyn-Harris, J., Grundy, J.: Emerging security challenges of cloud virtual infrastructure. arXiv preprint arXiv:1612.09059 (2016) Ibrahim, A.S., Hamlyn-Harris, J., Grundy, J.: Emerging security challenges of cloud virtual infrastructure. arXiv preprint arXiv:​1612.​09059 (2016)
13.
go back to reference Ahmad, I., et al.: Security in software defined networks: a survey. IEEE Commun. Surv. Tutor. 17(4), 2317–2346 (2015)CrossRef Ahmad, I., et al.: Security in software defined networks: a survey. IEEE Commun. Surv. Tutor. 17(4), 2317–2346 (2015)CrossRef
14.
go back to reference Watson, M.R., et al.: Malware detection in cloud computing infrastructures. IEEE Trans. Dependable Secure Comput. 13(2), 192–205 (2016)CrossRef Watson, M.R., et al.: Malware detection in cloud computing infrastructures. IEEE Trans. Dependable Secure Comput. 13(2), 192–205 (2016)CrossRef
15.
go back to reference Khan, M.A.: A survey of security issues for cloud computing. J. Netw. Comput. Appl. 71, 11–29 (2016)CrossRef Khan, M.A.: A survey of security issues for cloud computing. J. Netw. Comput. Appl. 71, 11–29 (2016)CrossRef
16.
go back to reference Zhou, L., Chao, H.C.: Multimedia traffic security architecture for the internet of things. IEEE Network 25(3), 35–40 (2011) Zhou, L., Chao, H.C.: Multimedia traffic security architecture for the internet of things. IEEE Network 25(3), 35–40 (2011)
17.
go back to reference Lassa dos Santos, G., Guimarães, V.T., da Cunha Rodrigues, G., Granville, L.Z., Tarouco, L.M.R.: A DTLS-based security architecture for the Internet of Things. In: 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, 2015, pp. 809–815 Lassa dos Santos, G., Guimarães, V.T., da Cunha Rodrigues, G., Granville, L.Z., Tarouco, L.M.R.: A DTLS-based security architecture for the Internet of Things. In: 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, 2015, pp. 809–815
18.
go back to reference Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G.: DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Networks 11(8), 2710–2723 (2013) Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G.: DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Networks 11(8), 2710–2723 (2013)
19.
go back to reference Leo, M., Battisti, F., Carli, M., Neri, A.: A federated architecture approach for Internet of Things security. In: 2014 Euro Med Telco Conference (EMTC), Naples, 2014, pp. 1–5 Leo, M., Battisti, F., Carli, M., Neri, A.: A federated architecture approach for Internet of Things security. In: 2014 Euro Med Telco Conference (EMTC), Naples, 2014, pp. 1–5
20.
go back to reference Lazrag, H., Chehri, A., Saadane, R., Rahmani, M.D.: A blockchain-based approach for optimal and secure routing in wireless sensor networks and IoT. In: 2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Sorrento, Italy, 2019, pp. 411–415. https://doi.org/10.1109/SITIS.2019.00072 Lazrag, H., Chehri, A., Saadane, R., Rahmani, M.D.: A blockchain-based approach for optimal and secure routing in wireless sensor networks and IoT. In: 2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Sorrento, Italy, 2019, pp. 411–415. https://​doi.​org/​10.​1109/​SITIS.​2019.​00072
22.
go back to reference Chehri, A., Mouftah, H.: Localization for vehicular ad hoc network and autonomous vehicles, are we done yet? In: Connected and Autonomous Vehicles in Smart Cities. CRC Press, Taylor & Francis Group (2020) Chehri, A., Mouftah, H.: Localization for vehicular ad hoc network and autonomous vehicles, are we done yet? In: Connected and Autonomous Vehicles in Smart Cities. CRC Press, Taylor & Francis Group (2020)
Metadata
Title
Security Analysis Using Deep Learning in IoT and Intelligent Transport System
Authors
Gwanggil Jeon
Abdellah Chehri
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-2324-0_2

Premium Partner