Cloud Security Techniques and Applications Smart Computing Applications
Cloud Security Techniques and Applications Smart Computing Applications
)
Cloud Security
De Gruyter Series on
Smart Computing Applications
Volume 1
Cloud Security
ISBN 978-3-11-073750-9
e-ISBN (PDF) 978-3-11-073257-3
e-ISBN (EPUB) 978-3-11-073270-2
ISSN 2700-6239
www.degruyter.com
|
This book is humbly dedicated in honour of Shri N. J. Yasaswy, Finance and invest-
ment writer and founder of ICFAI University and Shri E. N. Murthy, Member Secre-
tary, The ICFAI Society, whose support, encouragement and blessings made us to
get this effort and work.
Aforesaid volume contains the devotion with great love and affection “In memory of
my beloved father Shri Potluri. Rama Mohana Rao”, whose foundation, inspiration
and benediction made me to achieve this great career and life.
Preface
Sustainable computing paradigms like cloud and fog are mining better solutions to
handle the issues of security, privacy, performance, storage, processing, mainte-
nance, efficiency, integration, cost, energy and latency. In these evolving days,
according to statistics, billions of connected devices are producing enormous
amounts of real time data. For complex computation and processing of the collected
data in order to make the dynamic decisions these devices are connected over the
cloud or fog environment. Best practices and protocols are being implemented by
cloud to ensure security and privacy everywhere in the architecture.
This book illuminates some of the best practices and their respective outcomes
in cloud environment to preserve privacy and security. This book is aiming to pro-
vide next level of security and privacy preserving techniques for dynamic cloud.
Innovative techniques and methods for secure cloud are gathered to present ad-
vanced and specialized research in the selected area.
Various state-of-the-art and cutting edge methods to achieve security and priva-
cy in cloud computing environment by using Artificial intelligence, Machine learn-
ing, Blockchain, IoT, DDoS mitigating practices, Industry 4.0, Cloud manufacturing,
Data analytics and Vanet are essential slices of this book.
This book essences on various research issues related to security and privacy
preserving approaches and techniques using big data storage and analysis, large
scale data processing, knowledge discovery and knowledge management, computa-
tional intelligence, data security and privacy, data representation and visualization
and data analytics. The featured technology of this book optimizes various industry
processes using business intelligence in engineering and technology. This book
sheds light on cloud based secure integrated and development practices to increase
productivity and reduce the operational cost.
Chapter 1 focuses on AI based advanced technology that helps companies to
manage complex operations efficiently and improve productivity. AI-based net-
works allows to maximize organizational performance but also to evade risks and
threats. This chapter focuses on security and privacy related issues and explored
effective counter measure to handle such issues. This chapter also provides latest
literature on collaboratively secured collections to identify the kind of vulnerability
they address and also the form of approach they use to handle it.
Chapter 2 focuses on Blockchain based advanced technology to deliver infra-
structure and has been adopted widely due to its performance and availability.
Blockchain Technology, one of the emerging technologies can be used to comple-
ment the issues concerning cloud users. This technology provides features like de-
centralization, distribution, authenticity, immutability, trust, etc. that can be used
to face the threats of data integrity. This chapter focuses on concerning the security
https://doi.org/10.1515/9783110732573-202
VIII | Preface
and privacy of the data in the cloud model and how the features of the blockchain
technology can enhance the integrity of this model.
Chapter 3 focuses on DDoS attack occurrences, DDoS types and associated secu-
rity and privacy issues in cloud computing environment. Due to the dynamic behav-
ior, distributed paradigm and heterogeneity present among the processing ele-
ments, devices and service oriented pay per use policies; the cloud computing
environment is having its availability, security and privacy issues. Among these
various issues one of the important issues in cloud computing paradigm is DDoS
attack. This chapter put in plain words the DDoS attack, its detection as well as
prevention mechanisms in cloud computing environment. This chapter also ex-
plains about the effects of DDoS attack on cloud platform and the related defence
mechanisms required to be considered.
Chapter 4 focuses on secure cloud based healthcare application to handle big
data of healthcare industry. Handling and processing such huge chunks of data can
be a daunting task. To avoid scenarios of this type, many of the healthcare sectors
have adapted cloud computing as the solution. This chapter explains privacy relat-
ed issues and security related concerns, dynamically acceptable storage, regulatory
issues, electronic documents containing patient’s data, handwritten medical edi-
tions, various images such as X-ray, MRI scan and radiology images analysis.
Chapter 5 focuses on secure IoT frameworks, methods, security arrangements,
and the best protection models are important and suitable for the various layers of
IoT operated applications. This chapter also proposed embossed IoT model: stand-
ard and expanded with security and safety components and layers of physical evi-
dence. This chapter also explains about perceived security vulnerabilities and best
security measures to combat network security risks in all layers of cloud, edge, and
IoT.
Chapter 6 focuses on efficient marketing strategies for business to business
marketing and business to customer marketing are greatly heightened by using
cloud based marketing automation solutions. Cloud governance ensure to meet
business desires and needs through professional practices. Significant factors to
ensure security in cloud marketing are embedded in each phase of marketing life
cycle. This chapter explains about various cloud based secure marketing solutions
to meet next generation marketing needs.
Chapter 7 focuses on secure machine learning model to anticipate in finest out-
comes and boost the choice of cloud based long-term course of actions. This chapter
is proposing best strategic cloud security enhancement model for next generation
computing standards. Efficient machine learning algorithms like convolution neural
network gives automatic and responsive approaches to reinforce security in a cloud
environment. These models give solutions that incorporate holistic approaches for
secure enterprise knowledge throughout all the cloud applications.
Chapter 8 focuses on secure intelligent VANET for smart transportation to ob-
serve resolutions using cloud based infrastructure. The vehicles connect together
Preface | IX
through a network to form a vehicular cloud which will offer space for storing, com-
puting resources, sensor readings as an on-demand service to clients. There is a
need of efficient computational, supervising and guiding solutions for the citizens
to make them to get rid of traffic related issues and problems. This chapter explains
various methods to find an appropriate parking lot within the area on the brink of
university, shopping complex, or a commercial complex in big and medium cities
would enjoy the assistance of an automatic parking management utility.
Chapter 9 focuses on novel cloud manufacturing architype which is developed
from prevailing innovative manufacturing prototypes and enterprise level infor-
mation expertise under the provision of cloud computing, IoT, virtualization tech-
nology and service oriented computing, and cutting-edge computing technologies
and expertise. Manufacturing as a service is an advanced manufacturing architype
developed from the existing manufacturing models such as ASP, AM, NM and
MGrid. This chapter is to study and discuss about security and privacy issues and
solutions in cloud based manufacturing.
https://doi.org/10.1515/9783110732573-203
Contents
Dedication | V
Preface | VII
Acknoledgment | XI
List of Abbreviations | XV
Shagun S Lokre, Shanmukhi Priya, Vihas Naman, Sachi Nandan Mohanty, Sirisha
Potluri
Addressing Security and Privacy in Cloud Computing: Blockchain as a
Service | 21
Sirisha Potluri, Sai Lalitha Sunaina, Neha Pavuluri, Chennu Sai Sri Govind,
Raghavender Rao Jakileti, V. MNSSVKR Gupta
A Secure Cloud Infrastructure towards Smart Healthcare: IoT Based Health
Monitoring | 63
Indrani Inapakolla, SVB Revanth, Siliveru Akhil Durga, Sirisha Potluri, Sachi Nandan
Mohanty
Internet of Cloud: Secure and Privacy Preserving Cloud Model with IoT Enabled
Service | 83
Srikanth Pothuri
Marketing analytics as a Service: Secure Cloud Based Automation Strategy | 105
Sachi Nandan Mohanty, Gouse Baig Mohammad, Sirisha Potluri, Ramya Reddy
Padala, Lavanya Reddy Padala
Next Generation Cloud Security: State of the Art Machine Learning Model | 125
XIV | Contents
Index | 191
List of Abbreviations
AI Artificial Intelligence
DI Data Integrity
DU Data Usage
TTP Third Party Based Encryption Scheme
VM Virtual Machine
CDC Centralized Data Centre
ANN Artificial Neural Network
MSE Mean Squared Error
DNN Deep Neural Network
IoT Internet of Things
CSP Cloud Service Provider
SAMS Secure Authentication Management human-centric Scheme
DDoS Distributed-Denial-of-Service
DoS Denial-of-service
SLA Service Level Agreement
SDN Software Defined Network
KNN K nearest Neighbour
SOA Service Oriented Architecture
BW-DDoS Bandwidth distributed Dos
CDN Content Delivery Network
SMC Secure Multiparty Computation
API Application Programming Interface
VMM Virtual Machine Manager
SaaS Software as a Service
PaaS Platform as a Service
IaaS Infrastructure as a Service
BDaaS Big Data as a Service
NaaS Network as a Service
HaaS Healthcare as a Service
MaaS Manufacturing as a Service
IoTaaS IoT as a Service
AaaS Analytics as a Service
EMS Emergency Medical Systems
CNN Convolutional Neural Network
AWS Amazon Web Service
RFID Radio Frequency Identification
IAM Identity and Access Management
SEO Search Engine Optimization
SEM Search Engine Marketing
https://doi.org/10.1515/9783110732573-205
XVI | List of Abbreviations
Dr. Sachi Nandan Mohanty , Associate Professor in the Department of Computer Engineering at the
College of Engineering Pune, India. He received his PostDoc from IIT Kanpur in the year 2019 and
Ph.D. from IIT Kharagpur, India in the year 2015, with MHRD scholarship from Govt of India. He has
edited 14 books in association with Springer, Wiley and CRC Press. His research areas include Data
mining, Big Data Analysis, Cognitive Science, Fuzzy Decision Making, Brain-Computer Interface, and
Computational Intelligence. Prof. S N Mohanty has received 3 Best Paper awards during his Ph.D at
IIT Kharagpur from International Conference at Benjing, China, and the other at International Con-
ference on Soft Computing applications organized by IIT Rookee in the year 2013. He has awarded
Best thesis award first prize by Computer Society of India in the year 2015. He has published 42
International Journals of International repute and has been elected as FELLOW of Institute of Engi-
neers, IETE, and senior member of IEEE Computer Society Hyderabad chapter. He also the reviewer
of Journal of Robotics and Autonomous Systems (Elsevier), Computational and Structural Biotech-
nology Journal (Elsevier), Artificial Intelligence Review (Springer), Spatial Information Research
(Springer).
Dr. Katta Subba Rao is working as a Professor in Department of Computer Science & Engineering in
B.V.Raju Institute of Technology, Hyderabad, India. He has received PhD degree from Nagarjuna
University, Andhra Pradesh, India. His research areas includes Software Engineering, Cloud Compu-
ting and Machine Learning. He has more than 15 years of cherished teaching and research experi-
ence. His research contributes various journal articles, conferences and book chapters.
Dr. Gouse Baig Mohammad is working as Associate Professor in Department of Computer Science &
Engineering in Vardhaman College of Engineering, Hyderabad, India. He has received PhD degree
from Nagarjuna University, Andhra Pradesh, India. His research areas includes Network Security,
IoT and Machine Learning. He has 14 years of cherished teaching and research experience. His
research contributes 7 scholarly peer reviewed research articles in reputed International Journals
and 2 patents.
Mr. Srikanth Pothuri is working as National Head, Department of Marketing, at ICFAI Foundation for
Higher Education, Hyderabad, India. He is pursuing his PhD from ICFAI Business School, ICFAI Uni-
versity Dehradun, Dehradun, Uttarakand, India. His research areas include Marketing Management,
XVIII | List of Contributors
Marketing Strategy, Consumer Behavior and Marketing Quantitative Methods. He has 19 years of
industry experience.
Mr. V. MNSSVKR GUPTA is working as Assistant professor in Sagi Rama Krishnam Raju Engineering
College (SRKR Engineering College), Bhimavaram, India. He is pursuing his PhD from KL Education
Foundation, Vijayawada, India. His research areas include Artificial Intelligence, Bio Informatics and
Image Processing. He has 12 years of teaching experience. He has published 11 scholarly peer
reviewed research articles in reputed International Journals and attended 5 international confer-
ences.
Mr. Vangeti Bhanu Prakash Reddy is a researcher in the Department of Computer Science and
Engineering at ICFAI Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology),
Hyderabad, India. His research interest includes Artificial Intelligence, Cloud Computing and Ma-
chine Learning.
Mr. Srinath Bellamkonda is a researcher in the Department of Computer Science and Engineering at
ICFAI Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad,
India. His research interest includes Artificial Intelligence, Cloud Computing and Machine Learning.
Mr. Manjunath Reddy is a researcher in the Department of Computer Science and Engineering at
ICFAI Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad,
India. His research interest includes Artificial Intelligence, Cloud Computing and Machine Learning.
Mr. Shagun S Lokre is a researcher in the Department of Computer Science and Engineering at ICFAI
Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad, India.
His current area of interest for research includes Blockchain technology, Ethereum, Distributed
Ledger Technology, Supply chain management. As a part of his achievements, he has an approved
patent in the field of Blockchain technology in the event management sector in the India patent
office (IPO), and co-authored 3 chapters titled “Gun Tracking System Using Blockchain Technology”,
“Secure Event Ticket Booking Using Blockchain Technology”, “Distributed Ledger Technology in the
Construction Industry Using Corda” in Blockchain Technology. These chapters are part of “Block-
chain Technology: Applications and Challenges”, “Intelligent Systems Reference Library, Springer
(WoS and Scopus Indexed)”, and “The New Advanced Society: Artificial Intelligence and Industrial
Internet of Things Paradigm, Willey Press (U.S.A)”. He is currently working on other research papers
on the Distributed Ledger Technology.
Ms. Shanmukhi Priya, is a researcher in the Department of Computer Science and Engineering at
ICFAI Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad,
India. Her current area of interest for research includes blockchain technology, Ethereum, Distribut-
ed Ledger technology, Corda, and back-end technologies. As a part of his achievements, he has an
approved patent in the field of Blockchain technology in the event management sector in the India
patent office (IPO), and co-authored 3 chapters titled “Gun Tracking System Using Blockchain Tech-
nology”, “Secure Event Ticket Booking Using Block-chain Technology”, “Distributed Ledger Tech-
nology in the Construction Industry Using Corda” in Blockchain Technology. These chapters are part
of “Blockchain Technology: Applications and Challenges”, “Intelligent Systems Reference Library,
Springer (WoS and Scopus Indexed)”, and “The New Advanced Society: Artificial Intelligence and
Industrial Internet of Things Paradigm, Willey Press (U.S.A)”. He is currently working on other re-
search papers on the Distributed Ledger Technology.
List of Contributors | XIX
Mr. Vihas Naman is a researcher in the Department of Computer Science and Engineering at ICFAI
Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad, India.
His current area of interest for research includes blockchain technology, Ethereum, Distributed
Ledger technology, Corda, and the Internet of things. As a part of his achievements, he has an
approved patent in the field of Blockchain technology in the event management sector in the India
patent office (IPO), and co-authored 3 chapters titled “Gun Tracking System Using Blockchain Tech-
nology”, “Secure Event Ticket Booking Using Block-chain Technology”, “Distributed Ledger Tech-
nology in the Construction Industry Using Corda” in Blockchain Technology. These chapters are part
of “Blockchain Technology: Applications and Challenges”, “Intelligent Systems Reference Library,
Springer (WoS and Scopus Indexed)”, and “The New Advanced Society: Artificial Intelligence and
Industrial Internet of Things Paradigm, Willey Press (U.S.A)”. He is currently working on other re-
search papers on the Distributed Ledger Technology.
Ms. T. Kundana is a researcher in the Department of Computer Science and Engineering at ICFAI
Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad, India.
Her research interest includes Network Security, Cloud Computing, Machine Learning and Cyber
Security.
Mr. D. Abhinav is a researcher in the Department of Computer Science and Engineering at ICFAI
Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad, India.
His research interest includes Network Security, Cloud Computing, Machine Learning and Cyber
Security.
Ms. P. Sushrutha is a researcher in the Department of Computer Science and Engineering at ICFAI
Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad, India.
Her research interest includes Network Security, Cloud Computing, Machine Learning and Cyber
Security.
Ms. Sai Lalitha Sunaina M is a researcher in the Department of Computer Science and Engineering
at ICFAI Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad,
India. Her research interest includes Cloud Computing, Machine Learning and Data Analytics.
Ms. Neha Pavuluri is a researcher in the Department of Computer Science and Engineering at ICFAI
Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad, India.
Her research interest includes Cloud Computing, Machine Learning and Data Analytics.
Mr. Govind Ch is a researcher in the Department of Computer Science and Engineering at ICFAI
Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad, India.
His research interest includes Cloud Computing, Machine Learning and Data Analytics.
Mr. Raghavender Rao Jakileti is a researcher in the Department of Computer Science and Engineer-
ing at ICFAI Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hydera-
bad, India. His research interest includes Cloud Computing, Machine Learning and Data Analytics.
Ms. Indrani Inapakolla is a researcher in the Department of Computer Science and Engineering at
ICFAI Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad,
India. Her research interest includes Cloud Computing, Data Analytics and Data Visualization.
XX | List of Contributors
Mr. SVB Revanth is a researcher in the Department of Computer Science and Engineering at ICFAI
Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad, India.
His research interest includes Cloud Computing, Data Analytics and Data Visualization.
Mr. Siliveru Akhil Durga is a researcher in the Department of Computer Science and Engineering at
ICFAI Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad,
India. His research interest includes Cloud Computing, Data Analytics and Data Visualization.
Mr. A. D. Sriram Kumar is a researcher in the Department of Computer Science and Engineering at
ICFAI Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad,
India. His research interest includes Cloud Computing, Machine Learning, Industry 4.0 and IoT.
Ms. B. Rahini is a researcher in the Department of Computer Science and Engineering at ICFAI Foun-
dation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad, India. Her
research interest includes Cloud Computing, Machine Learning, Industry 4.0 and IoT.
Ms. Ramya Reddy P is a researcher in the Department of Computer Science and Engineering at ICFAI
Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad, India.
Her research interest includes Cloud Computing, Machine Learning and Artificial Intelligence.
Ms. Lavanya Reddy P is a researcher in the Department of Computer Science and Engineering at
ICFAI Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad,
India. Her research interest includes Cloud Computing, Machine Learning and Artificial Intelligence.
Ms. M. Vaishnavi is a researcher in the Department of Computer Science and Engineering at ICFAI
Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad, India.
Her research interest includes Cloud Computing, Machine Learning, Vanet and Network Security
Ms. K. Sahaja is a researcher in the Department of Computer Science and Engineering at ICFAI
Foundation for Higher Education, IcfaiTech (Faculty of Science and Technology), Hyderabad, India.
Her research interest includes Cloud Computing, Machine Learning, Vanet and Network Security
Sachi Nandan Mohanty, Sirisha Potluri, V. Bhanu Prakash, B.
Srinath, B. Manjunath
Cloud Security Concepts, Threats and
Solutions: Artificial Intelligence Based
Approach
Abstract: Artificial intelligence is an advanced technology that helps companies to
manage complex operations efficiently and improve productivity. In this genera-
tion, many business communities are using AI-based networks to maximize organi-
zational performance but also to evade risks and threats. Security and privacy are
both major issues with AI technology that contributes to data privacy and leads to
hacking problems. The proposed study focused on security issues of AI technology
and explored effective counter measures to improve data privacy. Privacy-
preserving cooperative filtering recommendation systems are aiming to supply users
with correct recommendations to maintain bound assurances regarding the privacy
of their information. This survey examines the latest literature on collaboratively
secured collections, provides an overview of the sector and distinguishes significant
contributions. The study also focuses and comforts to identify the kind of vulnera-
bility they address and also the form of approach they use to handle it.
||
Sachi Nandan Mohanty, Department of Computer Engineering, College of Engineering Pune,
Wellesley Rd, Shivajinagar, Pune, Maharashtra 411005, India, [email protected]
Sirisha Potluri, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarpalli Road, Hyderabad, Telangana
501203, India, [email protected]
V. Bhanu Prakash Reddy, Department of CSE, IcfaiTech (Faculty of Science and Technology),
ICFAI Foundation for Higher Education, Donthanapally, Shankarpalli Road, Hyderabad,
Telangana 501203, India, [email protected]
B. Srinath, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarpalli Road, Hyderabad, Telangana
501203, India, [email protected]
B. Manjunath Reddy, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarpalli Road, Hyderabad, Telangana
501203, India, [email protected]
https://doi.org/10.1515/9783110732573-001
2 | Sachi Nandan Mohanty, Sirisha Potluri, V. Bhanu Prakash, B. Srinath, B. Manjunath
1 Introduction
Cloud Computing is one of the pioneers to add to the field of computer technology in
recent times to redesign the possession value using pay-as-you-go model. However,
in terms of security, the current methods: anti-virus programs, authentication
mechanisms, firewall safety features do not appear to be able to withstand the se-
verities of threats.
Therefore, the user identification system, registers user activity to investigate
system performance, adds a protection system in an efficient and collaborative way
which is combined with latest practices to provide increased security. Our work
focuses on developing an efficient user identification program to exploit the envi-
ronment in normal way and course of conduct (of the user identification program)
and proposes an efficient replacement hybrid approach, which will bring a compre-
hensive user safety identification program in cloud computing [1-3].
Artificial
Internet of things
intelligence
Cloud computing
Blockchain
set of past experiences and socio-economic status; Film and book recommendation
sites are consistently used to select new top choices of their viewers and readers;
online music streaming management generates dynamic playlists to suit the trends
of their listeners.
It is magnificent that the new era of history and new technological change is on
the rise in every platform. We tend to believe that a new era of “Internet and artifi-
cial intelligence (AI)”, characterized by ubiquitous networks, data technologies,
shared services, border integration, automation, and mass production is coming.
The rapid development and integration of the latest AI and web technologies, new
data technologies, new energy technologies, mechanical technologies, and biotech-
nology are a necessary requirement in this new era, which can transform models,
methods and natural resources, welfare and national security.
Cloud platform provides significant services such as software package resources
with many benefits such as data storage, server maintenance and accessibility for
cloud tip users using data access. Due to the rising popularity of the cloud, a large
number of databases have been exported to reduce the amount of storage and cost.
In addition, data integrity (DI) is an ongoing problem in the cloud to deal with data
security and data consistency. Therefore, data usage (DU) face the risk of using
cloud computing for storage and data transfer applications, due to the shortage of
DI. For the purpose of partitioning the DI problem, the cloud has a high reliability
band using trusted third party based encryption scheme (TTP). The TTP function is
to ensure continuous DU authentication with continuous DI protection. To ensure
data privacy, cloud must use efficient data encryption methods.
Cloud Computing is an expanding field in the area of computing. It is a way to
increase resource usage and computing power without having the financial burden
of buying new infrastructure on the users. Cloud computing services witnesses
many features such as efficiency, reliability, flexibility, profitability, elasticity,
availability and on demand assets delivery using utility computing. Cloud resources
are usually measured based on their usage to complete the execution of the tasks in
the given assignment.
Cloud computing provides services through internet and web applications. Re-
sources dynamically go up or down based on the demand and in addition to that
cost efficient pricing is followed by a simple payment policy by using pay as you go
model. Therefore, cloud computing platform has several resources which are pro-
vided by cloud service provider and the cloud storage processes are changing dy-
namically to meet the demands of ongoing data and information growth. However,
the benefits of cloud storage go progressively with a group of cyber security related
protocols and methods.
The privacy issue is one of the most serious threats to data loss, malicious alter-
ations, server crashes with other cyber threats samples such as Yahoo’s 3 billion
account exposure by hackers in 2013, Apple’s iCloud leak in 2014, infringement of
information privacy of Drop box In 2016, a leaked iCloud event, wherever the vari-
4 | Sachi Nandan Mohanty, Sirisha Potluri, V. Bhanu Prakash, B. Srinath, B. Manjunath
ous photos of Hollywood actors were unveiled and caused a lot of outcry. Those
events have a profound effect on the company’s reputation.
Fog integration includes the cloud computing paradigm to the edge of the net-
work, thus providing a new type of applications, services and security in the cloud
environment. Therefore, we are often ready to develop cloud technology with pro-
tected and secured user information using artificial intelligence mechanisms.
2 Literature Analysis
Artificial intelligence is one of the siginificant research area related to cloud
computing. Emerging research areas of cloud computing are artificial intelligence,
blockchain and internet of things as shown in fig. 1. The importance and
significance of our research is to determine safety risks and problems associated
with AI technology and explore the results of recent studies.
information society, and the integration of data and information with the society,
the physical environment, and cyberspace, the information environment: AI 2.0
(Pan, 2016) observes great changes in cloud. The arrival of latest technologies em-
powers a new phase of AI. Key features of AI 2.0 include the emergence of visual
acuity driven by in-depth learning data, internet-based intelligence, human and
technology-based mechanisms, and high-level media thinking (Pan, 2016).
The continued emergence of smart cities, robots in medical care, automated
transport, virtual assistants, mechanical device, automated cars, smart phones,
smart toys, smart communities and smart economies provide a wider market de-
mand which urges for the new developments in both AI technologies and applica-
tions.
The functions of learning, understanding, making decisions, solving problems
and spontaneous thinking such as human thinking is called Artificial Intelligence.
The various methods of AI are: fuzzy programs (powerful for language representa-
tion), artificial neural networks (which mimic the structure of the human brain;
contain highly complex connections of simple mathematical units representing
complex problem-solving tasks), genetic algorithms (on purpose of the evolution of
human genes to find the right solution) etc. provides machine learning and automa-
tion solutions for problem solving [10].
Cloud computing is growing rapidly, and CDC (Centralized Data Center) have
become an integral part of prominent industries such as Amazon, Apple, Microsoft,
Google, IBM, Facebook. However, it is burdensome to monitor the operations of
large data centers manually.
Yotascale is a next-generation computing and automated performance monitor-
ing solution to reduce human response. Yotascale uses historical data to make pre-
dictions or decisions about cloud costs using artificial intelligence and helps to save
lot of expenditure. In addition, real-time analysis can be done using Yotascale to
detect unfavorable trends using in-depth reading strategies (super-
vised/unsupervised or forecasting models) and find the cause and provide future
predictions based on cloud usage and its cost. Research specialization in distributed
and cloud computing are given shown in fig. 2 and fig. 3.
In Artificial Intelligence, ANN- artificial neural network is one of the best classi-
fication method can be used as an intrusion detection system. Artificial neural net-
work is an efficient information processing method that is motivated by the natural
and biological nervous structure. It tries to signify the physical brain, functionality
and its thinking process by means of a network, electronic circuit and set of pro-
grams.
Cloud Security Concepts, Threats and Solutions: Artificial Intelligence Based Approach | 7
Distributed Computing
Cloud computing
Cloud Computing
Utility computing
Software engineering
Bitcoin currency Software defined network
Big data analytics and
Security and privacy Energy management
data science
Resource management Autoscaling
Deep learning
AI technology facilitates the development of new models, methods, and forms, sys-
tem design, and technology systems in the field of intelligent production. AI is used
in the intelligent manufacturing sector with an intelligent production system. The
use of AI beyond the intelligent production system makes no sense. Against the
8 | Sachi Nandan Mohanty, Sirisha Potluri, V. Bhanu Prakash, B. Srinath, B. Manjunath
3 Security
Security is a major factor to consider while adapting to the cloud. Users will store a
lot of secure information on their computers. When using cloud computing technol-
ogy this data will be transferred from their computer to the cloud. Therefore, the
cloud must have effective security measures to protect this data. Threats and attacks
observed in cloud computing are shown in fig. 4.
Pan, (2016) determined that there are a number of security risks or problems
that occur in the AI networks such as security threat of technology abuse, induced
by technical defects and many more. It is important to find the risk factors linked
with AI technology in order to defend cyber-crimes and risks from the developed
systems. From recent literature, it is found that AI is a neutral technique that con-
nects numbers of technologies and computing devices to each other for performing
operations effectively [11].
The following are list of security issues observed in cloud computing and same
can be efficiently addressed by artificial intelligence practices.
– Control management
– Risk management
– Compliance
– Vulnerability management
– Patch management
– Physical security
– Data security
– Operational security
– Legal issues
– Identity management
– Application security
– Storage security
– Network security
– Information security
– Cyber security
– Virtualization security
– Auditing and maintenance
– Data encryption and key generation
Cloud Security Concepts, Threats and Solutions: Artificial Intelligence Based Approach | 9
Cloud components
- Virtual machine
- Web server
- Operating system
- Application
- Data sources
Threats
- Spoofing
- Tampering
- Repudiation
- Information disclosure
in cloud
computing Attacks
- Abuse functionality
- Data structure attack
- Embedded malicious code
- Exploitation of authentication
- Injection
- Path traversal attack
- Probabilistic techniques
- Protocol manipulation
- Resource depletion
- Resource manipulation
- Sniffing attack
- spoofing
Most of the companies suffer cyber-attacks due to technology abuse where the crim-
inals transfer unwanted signals and impact on the developed systems by which the
sensitive data can be leaked. Pesapane, et al., (2018) identified that criminals use
10 | Sachi Nandan Mohanty, Sirisha Potluri, V. Bhanu Prakash, B. Srinath, B. Manjunath
malicious programs for transferring fraud signals that help to reduce the perfor-
mance of the communication channels and technologies used in the AI systems are
not able to detect unwanted signals by which hackers can perform data breach.
Because of some technical defects, the AI networks are not capable to protect data
against cyber-crimes and more than 34% of the companies are facing such prob-
lems.
Ransbotham, et al., (2017) supported the argument and examined that lack of
awareness is a key problem where companies do not provide complete training to
the employees wherein hackers can obtain login credentials of computing devices
using malicious programs.
Cloud computing has advantages such as easy implementation, accessibility,
distribution, reliability, error tolerance, shared resources, increased storage capaci-
ty and cost-saving technology. While Cloud computing has many advantages, it still
suffers with many security issues and violations with respect to both cloud service
providers and cloud users.
According to a Cloud Security Alliance article, “Data breaches, unfortunate in-
formation, recording or administrative tasks, unauthorized integration with Appli-
cation Programming Interfaces (APIs), DoS attacks, bad content, cloud abuse, inef-
ficiency due to inefficiency, eventually shared new risks”, are identified as the top
nine threats to cloud computing. Significance of AI in cyber security is shown in
fig. 5.
Delivery Exlpoitation
4 Privacy
Privacy and security often confuse words. Data security ensures that data is available
when those with authorized access need it. Data privacy ensures that data is used
properly. Privacy is defined as the individual’s right to determine how and to whom
information is transmitted. Data privacy can be protected by restricting access to data
through access control methods or by anonymously disclosing information.
A lot of research on the topic of privacy protection has been done and in recent
years, there are a number of important review topics that analyse data confidentiali-
ty, privacy protections, proposed structures, and data privacy measures; their pros
and cons are published. Suggested methods of data privacy protection are divided
into initial methods, statistical analysis used, helpful computer-based information,
and machine learning methods.
The privacy of artificial intelligence can be violated by blocking communication
channels and accessing corporate private networks. In the area of artificial intelli-
gence, there are three major privacy risks that have taken place including privacy
issues, identity theft crimes, and unauthorized signs transmitted by criminals.
Therefore, it is important to focus on privacy while using AI networks in business
and companies should ensure that they only use independent networks rather than
third parties [12].
In order to effectively solve the data privacy protection problem, encrypted
storage of cloud data is a very outstanding solution. After encryption, the data is
stored in the server provided by cloud service provider in the form of ciphertext, and
in the meantime, the server is also required to return the data to user when the user
requires. When the user needs to use the data frequently, it requires a lot of network
bandwidth and user’s time to conduct communication with the server and realize
data encryption and decryption, which will significantly reduce the usability of
cloud computing.
In the meantime, after the encrypted data stored in cloud server has developed to
a certain scale, effective retrieval of encrypted data has become a new problem that
needs to be solved, while the traditional information retrieval technology can no long
satisfy the requirement of mass data retrieval in the cloud storage environment.
The homomorphic encryption technology is an encryption method which can
directly process the encrypted data, and it can effectively protect the security of
user’s data content, which has very broad development potential under the back-
ground of cloud storage application.
By utilizing the homomorphic encryption algorithm, it can not only ensure that
the encrypted data won’t be statistically analysed to decrypt corresponding
plaintext, but also conduct homomorphic operation (such as addition and multipli-
cation) to the ciphertext, while maintaining corresponding plaintext order of this
ciphertext during operation.
12 | Sachi Nandan Mohanty, Sirisha Potluri, V. Bhanu Prakash, B. Srinath, B. Manjunath
During the retrieval process, the used index file and keyword are both in the
form of ciphertext, and the cloud server cannot obtain any information of user data
from the retrieval results. The index file is small, which will not increase the storage
pressure of cloud server. In the meantime, the retrieval speed is fast, and it supports
retrieval of multiple keywords, which will be convenient for the users and provides
high security and strong practicability. Significance of AI in cyber safety in fig. 6.
Recurrence prevention
Initial response to alert
measures
The following are list of privacy issues observed in cloud computing and same can
be efficiently addressed by artificial intelligence practices.
– Loss of control
– Information misuse
– Physical risk
– Identify theft
– Privacy related to internet based activates
– Privacy laws
– Network suspicious activity
– Information hacking
– Data privacy
Cloud Security Concepts, Threats and Solutions: Artificial Intelligence Based Approach | 13
ownership of the research topic and the ability to provide depth details related to
artificial intelligence protection. It uses in such a way that the quality of research is
also improved to get the right points.
geted attacks are widely available, readily available, and inexpensive on the black
market to facilitate the identification and use of weapons are the first stages of
cyber-killing series.
Now, hackers enjoy a situation where they can launch multiple targeted attacks
in a short period of time using the tools available on the black market. This has
blurred the line between indiscriminate attacks and targeted attacks. It is now un-
derstood that normal human resources and response speed will not be able to keep
pace with the rapid changes in cyber-attacks. This is a vision that leads security
professionals to place their trust in AI technology where rapid progress is being
made.
In terms of improving efficiency and faster response, efforts are being in pro-
gress to provide a type of solution called security orchestration and automation
(SOA) for attracting attention in the United States since about 2014 and the Hexadite
of Israel. In SOA, anti-defence strategies called playbooks are described in advance.
In line with these processes, SOA can automatically perform data collection, analy-
sis, and implementation of resistance measures as shown in fig. 5 and fig. 6. Here
again, AI is expected to play a key role in dynamic planning and revitalization of
playbooks.
9 Results
The proposed study provides details about implants intelligence and their security
concerns against companies. It turns out that AI is an efficient technology that helps
companies to solve complex tasks reliably. Safety is the big deal of anxiety associat-
ed with assisted artificial intelligence technology because criminals have to obtain
sensitive information and access to computer devices of companies. A review of the
literature done and shows that ignorance is a major problem with employees as a
result they can use unauthorized networks in computer programs as well as suffers
from data breach problems.
It is found that selected search terms have been provided full details regard-
ing the security of artificial intelligence. A big part of artificial intelligence is that
it connects a person, mechanical equipment etc. so that companies can work with
a number of jobs simultaneously. Therefore, it is important for companies to use
appropriate safety tools while operating artificial intelligence at work and em-
ployees do not know about security attacks related to computer devices. Available
that there are three safe attacks that occur in the implant site.
Fraud includes malware, identity theft, and refusal to work on attack. The
proposed study provided effective combat strategies which can be used to address
privacy concerns and connected security issues with artificial intelligence tech-
nology. Data security and privacy is ensured with efficient data encryption and
Cloud Security Concepts, Threats and Solutions: Artificial Intelligence Based Approach | 17
Input-Plain text
Import data
Encryption
process
Encrypted message
Decrypt message
Decryption using data
process
decryption algorithm
10 Conclusion
From the above discussion, it can be concluded that security is a major problem
associated with AI technology that helps criminals commit data breaches and hack-
ing activities in companies. This paper provided information about artificial intelli-
gence and examined the security problems associated with AI technology.
It is found that the conducted literature search reviewed each and every point
related to the artificial intelligence security attacks. There are numerous attacks
occur in AI technology including malware, phishing, and DoS attack that need to be
addressed on the priority basis in order to protect private details from the criminals.
It is determined that the utilization of firewall and encryption methods can help the
companies to protect data against cybercrimes and attacks. The company should
provide training to the employees by which they can avoid the involvement of third-
party networks and unauthorized signals from the AI-based systems.
Cloud Security Concepts, Threats and Solutions: Artificial Intelligence Based Approach | 19
11 References
[1] Mazur S, Blasch E, Chen Y, Skormin V, Mitigating cloud computing security risks using a self-
monitoring defensive scheme, Proceedings of the 2011 IEEE National Aerospace and Electron-
ics Conference (NAECON), Dayton, OH, 2011, pp. 39-45, doi: 10.1109/NAECON.2011.6183074
[2] Alabdulkarim A, Al-Rodhaan M, Tian Y, Al-Dhelaan A, A privacy-preserving algorithm for clinical
decision-support systems using random forest, Computers, Materials & Continua, 2019,
Vol.58, No.3, pp.585-601, doi:10.32604/cmc.2019.05637
[3] Chen J, Wang Y, Wang X, On-demand security architecture for cloud computing, Computer,
2012, vol. 45, no. 7, pp. 73-78, doi: 10.1109/MC.2012.120
[4] Li B, Hou B, Yu W et al., Applications of artificial intelligence in intelligent manufacturing: a
review, Frontiers Inf Technol Electronic Eng, 2017, 18, 86–96
[5] Rasim A, Ramiz A, Fargana A, Privacy-preserving deep learning algorithm for big personal data
analysis, Journal of Industrial Information Integration, 2019, Volume 15, Pages 1-14, ISSN 2452-
414X, https://doi.org/10.1016/j.jii.2019.07.002
[6] Sukhpal G, Shreshth T, Minxian X, Inderpreet S, Karan V, Lindsay D, Shikhar T, Smirnova D,
Manmeet S, Jain U, Pervaiz H, Sehgal B , Sukhwinder K, Sanjay M, Sadegh A, Harshit M,
Stankovski V, Garraghan P, Transformative effects of IoT, Blockchain and Artificial Intelligence
on cloud computing: Evolution, vision, trends and open challenges, Internet of Things, 2019,
Volume 8, 100118, ISSN 2542-6605, https://doi.org/10.1016/j.iot.2019.100118
[7] Wan J,Yang J, Zhongren W, Qingsong H, Artificial intelligence for cloud-assisted smart factory,
IEEE Access, 2018, PP. 1-1, 10.1109/ACCESS.2018.2871724
20 | Sachi Nandan Mohanty, Sirisha Potluri, V. Bhanu Prakash, B. Srinath, B. Manjunath
[8] Chen J, Dongyong Y, Data security strategy based on artificial immune algorithm for cloud
computing, Applied Mathematics & Information Sciences, 2013, 7, 149-153,
10.12785/amis/071L21
[9] Sun L, Jiang X, Ren H, Guo Y, Edge-cloud computing and artificial intelligence in internet of
medical things: architecture, technology and application, IEEE Access, 2020, vol. 8, pp.
101079-101092, doi: 10.1109/ACCESS.2020.2997831
[10] Tabrizchi H, Rafsanjani K, A survey on security challenges in cloud computing: issues, threats,
and solutions, J Supercomput, 2020, 76, 9493–9532, https://doi.org/10.1007/s11227-020-
03213-1
[11] Barona R, Anita E, A survey on data breach challenges in cloud computing security: issues and
threats, 2017 International Conference on Circuit, Power and Computing Technologies (IC-
CPCT), Kollam, 2017, pp. 1-8, doi: 10.1109/ICCPCT.2017.8074287
[12] Alia A, Al-Rodhaan M, Al-Dhelaan Y, A privacy-preserving algorithm for clinical decision-
support systems using random forest, Computers, Materials & Continua, 2019, 58, 585-601,
10.32604/cmc.2019.05637
[13] Wang T, Jiyuan Z, Chen X, Guojun W, Anfeng L, Yang L, A three-layer privacy preserving cloud
storage scheme based on computational intelligence in fog computing, IEEE Transactions on
Emerging Topics in Computational Intelligence, 2018, 2, 3-12, 10.1109/TETCI.2017.2764109
[14] Ram P, Murali S, Siva A, Privacy preservation techniques in big data analytics: a survey, J Big
Data, 2018, 5, 33, https://doi.org/10.1186/s40537-018-0141-8
[15] Muhammad N, Cloud computing: security issues and challenges, Journal of Wireless Commu-
nications, 2016, 1 (1), 10-15, https://doi.org/10.21174/jowc.v1i1.73
Shagun S Lokre, Shanmukhi Priya, Vihas Naman, Sachi Nandan
Mohanty, Sirisha Potluri
Addressing Security and Privacy in Cloud
Computing: Blockchain as a Service
Abstract: In recent times, the IT industry has been marked as a new era of software
advancement with the introduction of cloud computing technology. This technology
has become very essential for delivering infrastructure and has been adopted widely
due to its performance and availability. Cloud computing allows us to access many
applications and services over the Internet. A majority of the activities performed by
this technology revolves around different forms of data, making it an invaluable
resource. The importance and usage of data have reached new heights and like all
precious resources, even data requires security and privacy. Unfortunately, this is
an issue that concerns many cloud computing users as the data proprietors cannot
have complete control over certain aspects like the location of the data storage and
access permissions. Blockchain Technology, one of the emerging technologies can
be used to complement the issues concerning cloud users. This technology provides
features like decentralization, distribution, authenticity, immutability, trust, etc.
that can be used to face the threats of data integrity. In this chapter, we will address
the issues concerning the security and privacy of the data in the cloud model and
how the features of the blockchain technology can enhance the integrity of this
model. Although, there are certain limitations like high latency and low throughput,
decreasing the practical utility of blockchain technology
||
Shagun S Lokre, Department of CSE, IcfaiTech( Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanpally, Shankarpalli Road, Hyderabad, Telangana 501203,
India, [email protected]
Shanmukhi Priya, Department of CSE, IcfaiTech( Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanpally, Shankarpalli Road, Hyderabad, Telangana 501203,
India, [email protected]
Vihas Naman, Department of CSE, IcfaiTech( Faculty of Science and Technology), ICFAI Foundation
for Higher Education, Donthanpally, Shankarpalli Road, Hyderabad, Telangana 501203, India,
[email protected]
Sachi Nandan Mohanty, Department of Computer Engineering, College of Engineering Pune,
Wellesley Rd, Shivajinagar, Pune, Maharashtra 411005, India, [email protected]
Sirisha Potluri, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarpalli Road, Hyderabad, Telangana
501203, India, [email protected]
https://doi.org/10.1515/9783110732573-002
22 | Shagun S Lokre, Shanmukhi Priya, Vihas Naman, Sachi Nandan Mohanty, Sirisha Potluri
1 Introduction
Even before cloud computing was developed, it was the IT industry that faced some
tough challenges related to storing and accessing data, hosting, and data privacy to
name a few. Before the cloud, client/server computing was essentially centralized
storage where all the software, data, and control is located on the server-side. This
created a major setback for the IT industry since centralized databases rely heavily
on network connectivity, which means the slower the internet connection, the long-
er the access time for the database is needed. Although data redundancy is limited
or no, if a collection of data is lost accidentally, it is very difficult to recover it man-
ually. Earlier if a user desired to view some information or execute a program,
he/she would have to connect to the server and then obtain access to it and then do
his/her work. That’s not all, if the IT firm is huge with a large number of employees
then it becomes difficult for the company to arrange adequate hardware and soft-
ware to carry out their tasks. It is not possible to purchase software and applications
for every system and every employee. But it did not take much time to find a solu-
tion that changed the face of the IT industry, “Cloud Computing” [1-2]. Cloud com-
puting in simple terms means that the services provided of computer resources are
controlled and managed by the cloud provider rather than the end-user. These re-
sources include everything from browser-based web applications, third party data
storage devices, or third-party servers used to support an industry, research, or
personal project’s computer infrastructure.
Before the widespread use of cloud computing, businesses and general comput-
er users usually had to purchase and maintain the software and hardware they
wanted to use. Based on the increasing availability of cloud-based apps, storage
services, and machines, firms and consumers have access now as Internet services
to a wealth of on-demand computing resources [3]. If on-the-job software and hard-
ware are shifted to a remote networked and distributed resource, cloud users are no
longer required to invest the work, equity, or expertise needed to buy and maintain
the data. This unprecedented access to computer resources has resulted in a new
group of cloud-based companies and changed IT practices across industries and
turned many computer-aided practices into everyday ones. Many organizations
started to use the cloud to store records, supply corporate applications, and deploy
services and goods digitally. These kinds of cloud-based technologies and adoptions
are unique to the field. In the education world, educators and scholars use cloud-
based teaching and research applications [4]. As they say, nothing is perfect in this
world, cloud computing has few drawbacks which need to be taken into considera-
tion before moving ahead. In cloud computing, confidentiality and privacy are
amongst the most questionable. By the use of cloud storage infrastructure, we are
completely committed to providing cloud-based application protection and confi-
dentiality of the data. This means that if we encounter any problem, we cannot
Addressing Security and Privacy in Cloud Computing: Blockchain as a Service | 23
claim damages to the server for data errors or any kind of mistakes in the data. An-
other major disadvantage in cloud computing is its vulnerability in the event of an
attack. There are several concerns about cloud computing since cloud computing is
online, any aspect of cloud computing can be exposed to a wide range of servers
allowing data attacks and server storage activities. In this chapter, we are going to
propose how Blockchain Technology can be useful to make the whole system decen-
tralized, tamper-proof, and transparent [5].
2 Literature Survey
As of now, blockchain technology faces core obstacles related to scalability, regula-
tory limits, identity registration, consumer protection, laws and regulations, and
compliance requirements. This chapter is written based on the literature of the pre-
vious research, combines blockchain technology and the concept of cloud to create
a secure cloud system with selected access permissions [6]. This chapter consists of
a detailed study of the combination of cloud systems and blockchain technology.
With the current progress of science and technology, the need for secure and fast
systems has become the top priority for any information retrieval. The current uses
of blockchain include assistance to an IoT system and cloud computing system
assisting blockchain technology to make a home environment more efficient, se-
cure, and faster in terms of any processes, this uses Cloud Service Provider [7], Edge
Service Provider, and a Lightweight client; each of these modules assists in the stor-
age and usage of data.
Another application using blockchain is secure network computing for light-
weight clients, this application is used for mobile devices that do not have enough
computing power for heavy usage [8]. This application uses mobile resource man-
agement that connects nearby mobile phones using Bluetooth technology, with the
combined resources of the phones nearby we use Secure Authentication Manage-
ment human-centric Scheme (SAMS) to authenticate mobile devices using block-
chain, with all the devices giving authentication data falsification can’t take place
[9]. The major usage of blockchain technology is the medical sector, the medical
history of any patient is really important for the diagnosis of specific illnesses [10].
The easier it is to store and securely share this data as confidentiality is of utmost
importance, the easier it is to diagnose and cure any illness. Using a decentralized
application, we will upload all the medical history to the blockchain, allowing the
patient to grant access to any specific doctor to check and add the diagnosis to the
existing data. This concept is known as Electronic medical records. We have also
used multiple survey papers related to the security and privacy issues present in
cloud computing. There are multiple types of cloud services such as Software, Plat-
form, and Infrastructure as a service [11].
24 | Shagun S Lokre, Shanmukhi Priya, Vihas Naman, Sachi Nandan Mohanty, Sirisha Potluri
Each of these models has complexities and security issues of its own. The main
challenges being confidentiality, Integrity, availability of data [12]. The supporting
concept for cloud computing is virtualization, the process which allows easy up-
loading of data onto any cloud service. There are multiple challenges present in
technology related to cloud computing using blockchain. From the blockchain per-
spective, there are scalability issues. From the cloud computing point of view, there
are security problems and financial problems since cloud services can be expensive
[13].
SaaS: NIST describes this service in cloud as being able to access the provider’s
cloud computing applications. Applications can be accessed from separate client
devices by either a thin client interface such as a web browser or a software inter-
Addressing Security and Privacy in Cloud Computing: Blockchain as a Service | 25
face. With the likely exception of minimum user specific configuration require-
ments, the user does not track or manage the cloud resources including network
processors, operating systems, memory and even individual software functionality.
SaaS
CRM, Office suit, Email, Games
PaaS
Cloud Client
Applications, Development, Deployment
Web browser, Mobile App, etc.
tools
IaaS
Applications, Development, Deployment
tools
IDE (Developers)
Platform as a service
Integrated Development Environment
Block
Block header
Block Information
Block version
Merkle tree root hash
Nounce
Previous block hash
Timestamp
Difficulty target
List of transactions
PaaS: As per NIST, the platform as a service definition in cloud computing is de-
scribed as: The functionality offered to the user is to execute consumer-created or
purchased software to the cloud infrastructure by writing a set of codes, using li-
braries, APIs, and resources funded by the vendor. The user neither operates nor
monitors the underlying cloud resources, including the network, servers, operating
systems, or storage, but has control over the software installed and likely configura-
tion settings for the application-hosting environment.
PaaS vendors provide a platform for creating applications as shown in fig. 2. The
vendor usually creates a toolkit, implementation specifications and channels for
distribution and payment. In PaaS models, cloud vendors include a computing in-
frastructure, usually providing an operating system, a programming-language exe-
cution environment, a database, and a web server.
The benefits of using PaaS include:
– Higher administrative overheads
– Adjustable options
– More modern software for the framework
4 Consensus Mechanisms
Cloud computing provides multiple advantages when it comes to the business and
IT sectors. It allows us to create what is indeed a virtual workplace, so that we can
communicate everywhere at all times. With the number of web-enabled gadgets
used in today’s corporate world (ex. smartphones, tablets), access to your data is
now simpler. Moving on to cloud storage will decrease the IT systems administra-
tion and maintenance costs. It will reduce the expenses by leveraging the services of
the cloud computing platform rather than buy costly systems and appliances for our
business. Majority of the companies with more than 1000 employees do not have the
same IT requirements as a start-up [16]. Cloud usage is a great choice as it enables
28 | Shagun S Lokre, Shanmukhi Priya, Vihas Naman, Sachi Nandan Mohanty, Sirisha Potluri
The tab.1 gives an outline of the comparison of the three blockchain structures:
The mining process requires the nonce, the difficulty target, and the timestamp.
A transaction is initiated
and it is broadcasted to
the other participants in
the network
Listing 1: Blockchain as a service to declare the data of transactions and blockchain mining
#Transactions declaration
def get_transdata(self, sender, receiver, amount):
self.current_data.append({
'sender': sender,
'receiver': receiver,
'amount': amount
})
return True
#Blockchain mining
def blockchain_mining(self, details_miner):
self.get_data(
sender="0",
receiver=details_miner,
quantity=1,
)
last_block = self.latest_block
last_proof_number = last_block.proof_number
proof_number = self.proof_of_work(last_proof_number)
last_hash = last_block.compute_hash
block = self.build_block(proof_number, last_hash)
return vars(block)
grows, security vulnerabilities also increase. The cloud attack surface is higher than
the conventional service models, as the associated modules have several different
endpoints and protocols to handle in different ways. A variety of methods are need-
ed to recognise and resolve both identified and new threats.
Distributed-Denial-of-Service (DDoS) attacks are only one common security
threat in cloud computing. Providers typically provide a variety of architectural
solutions to configure a protected infrastructure to avoid these kinds of attacks,
such as traffic separation (the ability to isolate clusters of virtual machines in groups
of virtual different networks) or access control lists to establish guide-lines that
specify multiple-level component permissions.
The second most significant problem for conventional cloud paradigms is Data
Management. One part of data management that needs to be discussed is the con-
sistency of the data. This means that all cloud users can see the same data simulta-
neously. This is no easy job, since hardware (data resources) are paired with the
transactional status of operations in line with physical network constraints which
can affect continuity by linking the user.
The third major concern is Resilience and Cloud compatibility. Resilience is the
ability to manage errors gracefully and to restore the whole system. This is a mas-
sive problem for services and applications where modules fight for resources and
depend on other internal or external components/services that malfunction or may
rely on faulty software. Planning the manner in which those errors are observed,
logged, repaired and restored re-quires not only developers but all teams as part of a
cloud strategy.
To support, applications are available to replicate random problems, from
hardware problems to major external threats, including failed implementations or
suspicious device behaviour [26-27].
The major part of these problems can be resolved using blockchain technology.
Blockchain as a service is shown in fig. 5. The characteristics of blockchain such as
decentralization, Immutability, consensus mechanism, enhance security. The fol-
lowing problems can be solved using blockchain technology.
36 | Shagun S Lokre, Shanmukhi Priya, Vihas Naman, Sachi Nandan Mohanty, Sirisha Potluri
To solve security and privacy issues that are prevailing in cloud computing,
blockchain uses secure exchange of transaction framework as shown in the fig. 6.
Input- A transaction
Emission of
request
transaction
A block that
represented the Packaging of
transaction
trasaction is created
Validation of
Nodes validate the
transaction
transaction
Nodes receive a
Rewarding of reward for the proof
transaction
of work
Reception of
transaction Output- Transaction
7.1 Encryption
Although cloud services providers implement the best security standards and great
certifications. Storing sensitive information will always come with the risk of mali-
cious users and hackers trying to get the information. For example, the hacking of
AWS EC2 console at Code Space, which led to data deletion and eventually the clos-
ing of the company. In Blockchain-as-a-Solution (BaaS), data is broken down into
many encrypted segments, which are connected by a hashing feature.
These protected portions are split throughout the network and are decentralised
in each segment. Security provisions are high such as account ledgers, pub-
lic/private key encryption and haze blocks. It provides accurate and stable hacker
protection. Due to sophisticated 256-bit encryption even experienced hackers can-
not decrypt info.
8 Conclusion
Cloud computing has given us multiple systems to store and manipulate data. We can
definitely use blockchain to improve security systems and data sharing as compared to
Addressing Security and Privacy in Cloud Computing: Blockchain as a Service | 39
the system that is present now. In this chapter, we addressed blockchain technology and
associated key innovations and looked at the pattern of studies to date to explore more
fields to be explored. Various existing concerns for the usage of blockchain in the cloud
computing world should be taken into consideration. Blockchain is causing many prob-
lems right now, such as transaction stability, wallet, and applications, and multiple
types of research have been conducted to fix the above-mentioned issues. The anony-
mous information of the user should be maintained in a secure manner by using block-
chain in the cloud computing environment, and user information should be deleted
when the user is withdrawing or discontinuing the usage of the service. If the infor-
mation of the user is not discarded, it can be used to figure out who the user is and the
identity of the user is exposed, the information retrieved can be used for malpractice.
Cloud infrastructure is here to remain, but be careful—Traditional methods will
not be enough to solve the demands of current cloud workloads. Cloud storage, data
management, and resource compatibility are real issues that need to be taken into
consideration as part of a modern cloud strategy.
9 References
[1] Smith F, Waterman S, Identification of common molecular subsequences, J. Mol. Biol, 1981,
147, 195–197
[2] May P, Ehrlich H, Steinke T, ZIB structure prediction pipeline: composing a complex biological
workflow through web services, Nagel W, Walter W, Lehner W, Euro-Par 2006 Parallel Pro-
cessing, LNCS, 2006, vol. 4128, pp. 1148–1158, Springer, Heidelberg
[3] Toby V, Anthony V, Elsenpeter R, Cloud computing, A Practical Approach (1st. ed.), McGraw-
Hill, Inc., USA, 2009
[4] Sabahi F, Cloud computing security threats and responses, 2011 IEEE 3rd International Confer-
ence on Communication Software and Networks, 2011, pp. 245-249, doi:
10.1109/ICCSN.2011.6014715
[5] Jin P, Jong P, Blockchain security in cloud computing: use cases, challenges, and solutions,
Symmetry, 2017, 9, no. 8: 164
[6] Ravishankar B, Kulkarni P, Vishnudas M V, Blockchain-based database to ensure data integrity
in cloud computing environments, 2020 International Conference on Mainstreaming Block
Chain Implementation (ICOMBI), Bengaluru, India, 2020, pp. 1-4, doi:
10.23919/ICOMBI48604.2020.9203500
[7] Saurabh S, In-ho R, Weizhi M, Maninder K, Cho G, SH-BlockCC: A secure and efficient Internet
of things smart home architecture based on cloud computing and blockchain technology, In-
ternational Journal of Distributed Sensor Networks, 2019, 15(4), 155014771984415,
10.1177/1550147719844159
[8] Yang X, Guojun W, Jidian Y, Ju R, Yaoxue Z, Cheng Z, Towards secure network computing ser-
vices for lightweight clients using blockchain, Wireless Communications and Mobile Compu-
ting, 2018, 1-12, 10.1155/2018/2051693
[9] Hyun-Woo K, Young-Sik J, Secure authentication-management human-centric scheme for trust-
ing personal resource information on mobile cloud computing with blockchain, Human-centric
Computing and Information Sciences, 2018, 8 (1), 10.1186/s13673-018-0136-7
40 | Shagun S Lokre, Shanmukhi Priya, Vihas Naman, Sachi Nandan Mohanty, Sirisha Potluri
[10] Yue X, Wang H, Jin D, Mingqiang L, Jiang W, Healthcare data gateways: found healthcare intel-
ligence on blockchain with novel privacy risk control, Journal of medical systems, 2016,
40(10),218, 10.1007/s10916-016-0574-6
[11] Simanta S, Application of blockchain in cloud computing, International Journal of Innovative
Technology and Exploring Engineering (IJITEE), 2019, ISSN: 2278-3075, Volume-8 Issue-12
[12] Rajeswari S, Kalaiselvi R, Survey of data and storage security in cloud computing, 2017 IEEE
International Conference on Circuits and Systems (ICCS), 2017, pp. 76-81, doi:
10.1109/ICCS1.2017.8325966
[13] Ashok G, Siddiqui S, Alam S, Mohammed S, Cloud computing security using blockchain, JETIR,
2019, Volume 6, Issue 6, 791-794
[14] Jadeja Y, Modi K, Cloud computing - concepts, architecture and challenges, 2012 International
Conference on Computing, Electronics and Electrical Technologies (ICCEET), Kumaracoil, 2012,
pp. 877-880, doi: 10.1109/ICCEET.2012.6203873
[15] Gibson J, Rondeau R, Eveleigh D, Tan Q, Benefits and challenges of three cloud computing
service models, 2012 Fourth International Conference on Computational Aspects of Social Net-
works (CASoN), Sao Carlos, 2012, pp. 198-205, doi: 10.1109/CASoN.2012.6412402
[16] Kawanami Y, Kato H, Yamaguchi H, Tanimura M, Tagaya Y, Mechanism and control of cloud
cavitation, J. Fluids Eng, Dec 1997, 119(4), 788-794 (7 pages),
https://doi.org/10.1115/1.2819499
[17] Li X, Zhou L, Shi Y, Guo Y, A trusted computing environment model in cloud architecture, 2010
International Conference on Machine Learning and Cybernetics, Qingdao, China, 2010, pp.
2843-2848, doi: 10.1109/ICMLC.2010.5580769
[18] Liang Y, Blockchain for dynamic spectrum management, Dynamic Spectrum Management,
Signals and Communication Technology, Springer, Singapore, 2020, pp 121-146,
https://doi.org/10.1007/978-981-15-0776-2_5
[19] Nguyen C, Hoang D, Nguyen D, Niyato D, Nguyen H, Dutkiewicz E, Proof-of stake consensus
mechanisms for future blockchain networks: fundamentals, applications and opportunities,
IEEE Access, 2019, 7, 85727–85745
[20] Liu Z, Luong N, Wang W, Niyato D, Wang P, Liang Y, Kim D, A survey on blockchain: a game
theoretical perspective, IEEE Access, 2019, 7, 47615–47643
[21] Perboli G, Musso S, Rosano M, Blockchain in logistics and supply chain: a lean approach for
designing real-world use cases, IEEE Access, 2018, 6, 62018–66202
[22] Konstantinidis I, Siaminos G, Timplalexis C, Zervas P, Peristeras V, Decker S, Blockchain for
business applications: a systematic literature review, Abramowicz W, Paschke A, Business In-
formation Systems, BIS 2018, Lecture Notes in Business Information Processing, 2018, vol
320, Springer, Cham, https://doi.org/10.1007/978-3-319-93931-5_28
[23] Umesh B, Sudeep T, Karan P, Pimal K, Sudhanshu T, Neeraj K, Mamoun A, Blockchain for In-
dustry 4.0: a comprehensive review, 2020, IEEE Access, vol. 8, pp. 79764-79800, doi:
10.1109/ACCESS.2020.2988579
[24] Kshetri N, Can blockchain strengthen the internet of things?, IT Professional, 2017, vol. 19, no.
4, pp. 68-72, doi: 10.1109/MITP.2017.3051335
[25] Arora D, Gautham S, Gupta H, Bhushan B, Blockchain-based security solutions to preserve
data privacy and integrity, 2019 International Conference on Computing, Communication, and
Intelligent Systems (ICCCIS), 2019, pp. 468-472, doi: 10.1109/ICCCIS48478.2019.8974503
[26] Houshyar H, Rashid M, Fakhrul A, Demidenko S, Multi-layer blockchain-based security archi-
tecture for internet of things, Sensors 2021, 2021, 21(3), 772,
https://doi.org/10.3390/s21030772
[27] Rui Z, Rui X, Ling L, Security and privacy on blockchain, ACM Comput. Surv, 2019, 52, 3, Article
51, 34 pages, DOI:https://doi.org/10.1145/3316481
Sirisha Potluri, Sachi Nandan Mohanty, T. Kundana, D. Abhinav, P.
Sushrutha
Security and Privacy Preservation Model to
Mitigate DDoS Attacks in Cloud
Abstract: Denial-of-service (DoS) attack occurrences are among the key security chal-
lenges within the rising cloud computing models. Currently, a number of different
types of DoS attacks are conducted against the various cloud services and resources,
which target their availability, service level agreements SLAs, and performance. A
successful DDoS attack would possibly lead to service degradation or complete out-
age. DDoS attacks will reduce the network re-sources which may result in bandwidth
depletion. The main objective of DDoS attacks is to prevent certain users from access-
ing the services in the cloud. In this research, we propose a privacy-preserving cross-
domain at-tacks detection scheme for SDNs. Predis may be a combination of perturba-
tion encryption and encoding to guard the privacy and uses a computationally simple
and efficient machine learning algorithm k-Nearest Neighbour (KNN) for its detection.
Here we also improve the KNN to achieve much better efficiency. Through extensive
simulations and theoretical analysis. The DEMO of this algorithm is capable to realize
the detection process efficient and accurate attack detection by keeping sensitive
information secure. Virtualization enables simultaneous sharing of resources from a
single server to some applications or services, this induces a certain amount of threats
and security issues for the cloud. This module focuses on identifying challenges relat-
ed to cloud security and tries to introduce ways in resolving these issues
||
Sirisha Potluri, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarpalli Road, Hyderabad, Telangana
501203, India, [email protected]
Sachi Nandan Mohanty, Department of Computer Engineering, College of Engineering Pune,
Wellesley Rd, Shivajinagar, Pune, Maharashtra 411005, India, [email protected]
T. Kundana, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI Foundation for
Higher Education, Donthanapally, Shankarapalli Road, Hyderabad, Telangana 501203, India,
[email protected]
D. Abhinav, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI Foundation for
Higher Education, Donthanapally, Shankarapalli Road, Hyderabad, Telangana 501203, India,
[email protected]
P. Sushrutha, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI Foundation
for Higher Education, Donthanapally, Shankarapalli Road, Hyderabad, Telangana 501203, India,
[email protected]
https://doi.org/10.1515/9783110732573-003
42 | Sirisha Potluri, Sachi Nandan Mohanty, T. Kundana, D. Abhinav, P. Sushrutha
1 Introduction
The practice of employing a network of remote servers hosted on the web to store,
manage, and process data, instead of a local server or a private computer is called
cloud computing. It is a pay-for-use model. Cloud computing can be considered as
the future of the emerging technologies because of the combination of emerging
technologies like virtualization and service oriented architecture. Based on the de-
ployment models there are various types of clouds [1].
– Public/Internet Cloud
– Private/Enterprise Cloud
– Hybrid/Mixed Cloud
– Community Cloud
Public cloud is designed for a substantial set of public clients, Private clouds ser-
vices are available only for the cloud owners. The combination of two or more
clouds can be considered as hybrid cloud where in the two clouds can be either
public or community or private clouds, broadly community clouds services are
shared between several organizations.
Cloud provides services using various models like Software as a Service, Plat-
form as a Service and Infrastructure as a Service.
– SaaS: It provides user access to software applications. These software applications
which are present in the cloud are used for an enormous range of tasks.
– PaaS: It provides all the hardware and software components that are required to
build cloud-based applications.
– IaaS: It dispenses services like storage, security tools, and networking for end users.
Several critical security attacks are designed and proposed against various cloud
deployment models which pose severe security risks to the adaptor. Attacks such as
wrapping, malware injection, and other attacks can be conducted against cloud
computing. One such security attack is the Denial of Service (DoS) attack. It is an
event or malicious behaviour that mitigates or prevents the cloud’s security to per-
form its expected functions and services. A distributed form of DoS attack is called a
Distributed Denial of Service (DDoS) attack which applies numerous network hosts
to inflict more effects on the dupe [2].
DDoS attacks can be classified into the subsequent categories
– Attacks on Bandwidth
– Physical Disruption.
– Limitation Exploitation
– Attacks on Connectivity
– Exhaustion of Resources
– Process disruption
– Data corruption
Security and Privacy Preservation Model to Mitigate DDoS Attacks in Cloud | 43
Therefore, clearly there should be goals for the information security that should
be satisfied which are:
C – Confidentiality
I – Integrity
A – Availability
Confidentiality means making sure that the information that has to be kept secured
is secured and there shall be no access for unauthorized users to read the infor-
mation. Integrity means making sure that unauthorized users cannot modify or
destroy the information. Availability means making sure that authorized people are
not prevented from accessing the information.
Cloud architecture and its disparity from standardized traditional onsite system
makes the identification and separation of different aspects in cloud security an
arduous task.
This module is an attempt in exploring various security challenges and propos-
ing suitable solutions for cloud security.
2 Literature Analysis
In the DDoS attacks, the attacker dispatches an order to a system called as com-
mand and control server (C&C server) which will coordinate and trigger a botnet.
Generally, a botnet can be considered as a set of compromised hosts, which obscure
the attacker by providing a level of indirection. The C&C server orders the botnet to
launch a DDoS attack against the victim (server), and afterward, the bots will direct
the attack packets to the victim whose content depends on the type of attack. Thus,
the attacker host is separated from its victim by one or by tons of intermediate layers
of zombie hosts. A zombie or bot is a compromised computer under the control of an
attacker who controls many other machines which altogether form a botnet [5-7].
In this case, the botnet which performs the attack comes from an exterior target
system. The attack can target a net entrée of the Cloud infrastructure or the servers.
If a specific client in a virtual machine becomes a victim of an attack, it’ll also affect
the opposite virtual machines present on the equivalent server of the Cloud.
In this case, the attack can tackle by taking possession of a virtual machine that is
running within the Cloud. This can be done with a Trojan horse. A Trojan horse is
malicious software or a code that can take control of the system. The choice of
which depends on the customer’s virtual machine to infect is important because if a
customer owns a large number of virtual machines, the Trojan horse can probably
spread all over the virtual machines, thus forming a botnet.
In the Cloud infrastructure, an internal botnet is formed which can attack another
target inside the system such as a single virtual machine or a bunch of virtual ma-
chines. All the Cloud infrastructures may break down under these kinds of attacks.
Different kinds of attacks approach different types of attackers where each type of
attack scenario correlates to a particular attacker with a specific location and goals.
These attacks take advantage of the known weaknesses which are present in the
protocol such as flaws in design or implementation of triggers, inappropriate activi-
ties, and can change the data that goes to and from a particular goal. Depending on
the design certain protocol steps might be created to check the potential for DoS
attacks.
46 | Sirisha Potluri, Sachi Nandan Mohanty, T. Kundana, D. Abhinav, P. Sushrutha
A malformed packet attack are often launched against many protocols. For instance
malformed packet attack against IP protocol. In IP packet options attacks, mal-
formed packets can randomize the optional fields which are within an IP packet and
can set all the standard of service bits to at least one, which could cause more pro-
cessing within the victim for packet handling
Flooding attack is also called Bandwidth distributed Dos (BW-DDoS), the attacker
tries to flood the victim with unwanted traffic to prevent legitimate traffic. Based on
the type of protocol flooding attacks differs. Few of the strong attacking agents in-
clude privileged zombie which has control over its host whereas weak agents in-
clude programs that are downloaded automatically and run in sandboxes.
They are the devastating version of reflective DDoS attacks. They utilize the inherit-
ed nature of network protocols to increase the amount of traffic that is reflected in
the victim. As a result, the traffic that reaches the victim is amplified by the reflector
server. Amplification DDoS attacks are created by the amplification through flow
multiplication attacks or through payload magnification where a large number of
responses are reproduced or response messages bigger than the corresponding re-
quests are issued by the reflector
Another method that’s applied by the DDoS attackers is the reflective method. This
method helps the attacker to send traffic to the victim indirectly and helps the attacker
to stay undetected. During this method, all attack packets, which the attacker sends
contain the IP address of the victim within the source address field of IP packets.
Classification of DDoS attacks is given fig. 1.
Security and Privacy Preservation Model to Mitigate DDoS Attacks in Cloud | 47
Reflective attacks
Flood packets
Protocol Attacks by
vulnerability exploited
exploitation
vulnerability
Amplification
attacks
Malformed
packets
4.2 CDN’s
CDN’S distributes the content and boosts the performance by minimizing the space
between resources and between the end-users. It stores the cached version of the
content in multiple locations and this eventually mitigates DDoS attacks by avoid-
ing one point of failure, when the attacker is trying to pivot on a single target.
5.2 Response
Once the attack is detected now there is a necessity to seek out how to respond to
those attacks.
5.3 Routing
By intelligent routing, one can break the remaining traffic into manageable chunks
which will be handled by cluster resources to which it’s being routed.
5.4 Adaption
This is the of the foremost important stage of DDoS mitigation where one has got to
search for patterns of DDoS attacks and check if this analysis can further strengthen
the mitigation techniques.
The KNN features for ease of use are very useful for us when we want to embed other
special functions in the separator to protect the privacy of test data. On the other
hand, KNN, as a partitioning algorithm, works well with precision, and KNN is not
sensitive to vendors who can maintain high accuracy when there are certain sounds
in the database.
The European vector n dimensional formula is:
𝑑 ∑ 𝑋 𝑋 ∗2 (1)
8.2 SDNs
– Self- organizing map B
– Support Vector Machine
– Entropy variation of the destination IP address
– Deep Learning
– Bayesian Networks
The attackers of DDoS can simultaneously control several computers and make an
attack architecture that contains control puppets/dummies and attack pup-
pets/dummies in the computing environment. The traditional attack architecture is
analogous to the dumbbell shape structure. Wherein an intermediate network is
mainly responsible for data forwarding, security events and control functions are
done by the management, while the network itself can’t detect network attacks and
deal with them.
10 Models
10.1 System model/approaches and threat model
We first go through the overview of the system model/approaches and the roles
included in Predis. Then we present the threat model, followed by security.
It has three sorts of roles:
– Server for Computation (CS)
– Server for Detection (DS)
– Software Defined Networks SDNs domain 3
Domain D n is the nth domain that participates in the attack detection and provides
the data to CS and DS. Which in turn, provides computing & encryption services for
domain Dn. Each domain sends traffic information to CS for the calculation purpose
and receives the detection results from DS. CS provides computational service and
sends the intermediate results to DS. Where this later provides detection service
based on intermediate results and replies to the detection results of each domain.
Thus, CS and DS perform computation in collaboration with each other. Predis pro-
vides accurate DDoS attacks detection service for domains wherein each domain is
not willing to share privacy traffic information.
Here, we provides a formal definition of privacy. The knowledge of the flow ta-
ble is provided by domains that participate within the detection is called privacy.
Importantly, privacy includes IP Source, IP Destination, Port Source, Port Destina-
tion, Length, and Flow Packets. The basic operations includes these three roles
mentioned earlier as functions with input and output. Each function is meant to run
on continuous inputs in real-time data partitioned into a particular interval and
Predis features a set of n input peers with it. Sample code of DDoS is given as below.
import socket
import sys as s1
import os
print("DDoS Attacking: "+s1.argv[1]+" Initiating...")
print("Inject Code "+s1.argv[2])
def attackFunc():
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((s1.argv[1], 80))
print(">>> GET Message /" + s1.argv[2] + " HTTP/1.1\n")
s.send("GET Message /" + s1.argv[2] + " HTTP/1.1\n")
s.send("From Host Initiate: " + s1.argv[1] + "\n");
Security and Privacy Preservation Model to Mitigate DDoS Attacks in Cloud | 53
s.close()
for var in range(1, 10000):
attackFunc()
13 Vulnerabilities in Cloud
Virtualization is the backbone to cloud and it comes in three levels. First at the op-
erating system level, second at application level and finally at hypervisor level.
In the operating system level, multiple guest operating systems run on the host
operating system making guest operating systems vulnerable as the control is at the
host operating system. If the host OS is compromised, then so is the guest OS.
The application level is located just above the host OS layer. Hence the virtual
machines which run guest OS along with its subsequent applications also suffer
from the same vulnerability which is present at the operating system level.
At the hypervisor level, as the virtual monitor (VMM) or the hypervisor which is
a software layer runs on the host operating system, every other virtual machine
which runs on guest operating systems are controlled by the hypervisor at host OS
making it a vulnerable case because when hypervisor at host OS is compromised,
then so are virtual machines at guest OS. A small flaw at the hypervisor level creates
risk for the entire infrastructure of the cloud; also the breaches in hypervisor create
cross virtual machine attacks.
Since the cloud services are acquired by its users through the application inter-
faces (APIs) provided by cloud service providers, we can say that the security of
these APIs directly affects the security of the cloud. Loopholes in TCP/IP protocol
explicitly cause vulnerabilities typically to public clouds
13.1 Threats
As the computing infrastructure of the cloud is present off-premises, the organiza-
tion or the users who have opted for the cloud services must assess the risk involved
when there is a loss of control of these services.
In the beginning stages of users acquiring the cloud services, there is a chance
that with insufficient knowledge, they can set the whole infrastructure of cloud at
risk by improper usage of storage capabilities, processing, and by the deployment of
dubious applications. This kind of threat is highly relatable to PaaS and IaaS.
Also by knowing the entire or part of the system, an attacker knows how to go
through security mechanisms. The attacker also can have privileges to bypass fire-
walls and also for intrusion detection systems. Virtualization, sharing of resources,
and multi-tenancy are the concepts that also help the attacker in exploiting the
loopholes and give the ability to manipulate the service models.
The data in cloud services traverse across the continents where there is a chance
for issues arising in terms of jurisdiction as different geographic locations have dif-
ferent obligations in laws than the service provider.
Security and Privacy Preservation Model to Mitigate DDoS Attacks in Cloud | 55
Deceptive mechanisms and weak passwords may lead to the user being the suf-
ferer of identity theft.
An attacker can launch denial of service attacks by flooding the users with re-
quests, can attack virtualization using hypervisor root kits, can do phishing, and
can do meta-data spoofing with the above-mentioned vulnerabilities and threats.
14 Security Issues
14.1 Security issues layer-wise
Cloud can be viewed in distinct layers such as a physical, Virtualization, Service
provider and User layer. There are certain security issues associated with each layer.
Searchable Encryption I-En Liao & Jyun-yao Secret sharing and 1. Non-numeric file
Hung searchable encryption search
(2012) 2. Data Encryption
Onion Encryption Curino et al. Adaptable security 1. Query Execution
(2011) providing different 2. Data Encryption
layers of encryption in
order to maintain the
confidentiality of the
user data
Fully Homomorphic Tebba et al. Allowing the clients in 1. Encryption
Encryption (2012) encrypting their data 2. Key - Generation
before storing at cloud 3. Evaluation
service provider there-
by ensuring the data
confidentiality
Encryption for secure Yu et al. To Protect user data by 1. Key - Generation
scalable fine grained (2010) using cryptographic 2. Setup
access control based techniques and also to 3. Encryption
on attributes induce overheads of 4. Proxy Re
key distribution and 5. Decryption
management on the
client data.
VM live migration
Trusted cloud compu- Santos, Gumadi and Targets at preserving 1. VM Launch
ting platform Rodrigues confidential execution 2. Node Registration
(TCCP) (2009) of VM’s
Self-service cloud Ganapathy V To solve the issues 1. Create_MTSD
computing scheme (2015) related to uninterrupt- 2. Create_UDom()
(SSC) ed cloud service pro- 3. Cre-
vider access on the ate_Userdomain
client CPU contents, 4. Bootstrapping_SSL
memory and registers. 5. Grant_Privilege
TVDC IBM Concept in which each 1. Authorization of
(2008) VM is restricted from VMM
accessing any other 2. Resource Access
VM thus ensuring 3. Infrastructure
protection from un- Integrity and
wanted data leakage Network Isolation
4. Inter VM
communication
These algorithms take the use of keys such as RND, DET, OPE, HOM.
1. Randomized Encryption Key (RND): It provides similarity under an adaptive chosen plain text
attack.
2. Order preserving Encryption Key (OPE): For the queries which involve choices based on compari-
son, this key provides secured execution.
3. Homomorphic Encryption Key (HOM): For the queries which involve server side aggregates calcu-
lation, this key is used for execution.
4. Deterministic Encryption Key (DET): Queries which involve a selection on equality for a specific
value, this key is used for execution.
17 Conclusion
Cloud computing comes with known vulnerabilities because of the combination of
technologies like network links, web servers, virtual machines, etc., since cloud
computing has an advantage of scalability and elasticity it offers adequate re-
sistance to attacks. Among those, the DoS and DDoS are easy to escalate and are
more destructive. Security should be considered as shared responsibilities of both
cloud providers and users. Traditional computing has been completely transformed
to a cost effective, optimized computing by cloud computing. Yet there are some
challenges and issues in regard with secured information sharing in cloud. Existing
security measures needed to be enhanced and also new security mechanisms are
needed in order to eradicate security issues in cloud environment.
In this paper few of the mitigation techniques, solutions, and schemas are pre-
sented through which the security and privacy of the cloud can be preserved. Few of
the solutions could not perfectly mitigate all the possible attacks, but other solu-
tions are efficient. An SDN-based cross-domain attacks detection scheme was pre-
sented that provides privacy protection. Also, we came across cross-domain privacy
protection problems and also the DDoS attacks detection based on SDNs, in which
we combined geometric transformation and data encryption methods in the inten-
tion to protect privacies, broke down the detection process into two steps, disturb-
ance, and detection, which involved two of the servers that work together to com-
plete the detection process by using the concept of cloud virtualization. An
60 | Sirisha Potluri, Sachi Nandan Mohanty, T. Kundana, D. Abhinav, P. Sushrutha
enhanced KNN algorithm for low time consumption and high accuracy was repre-
sented. Extensively experiment of different authors results showed that Predis is
proficient in detecting cross-domain anomalies while preserving privacy with the
best time complexity and high accuracy. The overall paper can be used to further
reduce the time consumption of Predis in attack detection in the future.
18 References
[1] Saurabh S, Young-Sik J, Hyuk J, A survey on cloud computing security: issues, threats, and
solutions, journal of network and computer applications, 2016, Volume 75, Pages 200-222,
ISSN 1084-8045, https://doi.org/10.1016/j.jnca.2016.09.002
[2] Shankarwar M, Pawar A, Security and privacy in cloud computing: a survey, Satapathy S,
Biswal B, Udgata S, Mandal J, Proceedings of the 3rd International Conference on Frontiers of
Intelligent Computing: Theory and Applications (FICTA) 2014, Advances in Intelligent Systems
and Computing, 2014, vol 328, Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_1
[3] Andrew C, Mohammad H, Omar A, Defence for distributed denial of service attacks in cloud
computing, Procedia computer science, 2015, Volume 73, Pages 490-497, ISSN 1877-0509,
https://doi.org/10.1016/j.procs.2015.12.037
[4] Mohammad M, Marzie J, A survey and taxonomy of DoS attacks in cloud computing, Sec. and
Commun. Netw, 2016, 9, 16, 3724–3751, DOI:https://doi.org/10.1002/sec.1539
[5] Potluri S, Mangla M, Satpathy S, Mohanty S N, Detection and prevention mechanisms for DDoS
attack in cloud computing environment, 2020 11th International Conference on Computing,
Communication and Networking Technologies (ICCCNT), Kharagpur, India, 2020, pp. 1-6, doi:
10.1109/ICCCNT49239.2020.9225396
[6] Priyanka K, Munesh T, Virendra Y, Vikash S, Detection techniques of DDoS attacks: a survey,
2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Elec-
tronics (UPCON), Mathura, India, 2017, pp. 675-679, doi: 10.1109/UPCON.2017.8251130
[7] Zhang P, Huang X, Sun X, Wang H, Ma Y, Privacy-preserving anomaly detection across multi-
domain networks, 2012 9th International Conference on Fuzzy Systems and Knowledge Dis-
covery, Chongqing, China, 2012, pp. 1066-1070, doi: 10.1109/FSKD.2012.6234272
[8] Jelena M, Peter R, A taxonomy of DDoS attack and DDoS defense mechanisms, SIGCOMM
Comput. Commun, 2004, Rev. 34, 2, 39–53, DOI:https://doi.org/10.1145/997150.997156
[9] Soule A, Ringberg H, Silveira F, Rexford J, Diot C, Detectability of traffic anomalies in two adja-
cent networks, Uhlig S, Papagiannaki K, Bonaventure O, Passive and Active Network Measure-
ment, PAM 2007, Lecture Notes in Computer Science, 2007, vol 4427, Springer, Berlin, Heidel-
berg, https://doi.org/10.1007/978-3-540-71617-4_3
[10] Yaar A, Perrig A, Song D, Pi: A path identification mechanism to defend against DDoS attacks,
2003 Symposium on Security and Privacy, 2003, Berkeley, CA, USA, pp. 93-107, doi:
10.1109/SECPRI.2003.1199330
[11] Shui Y, Yonghong T, Song G, Dapeng W, Can we beat DDoS attacks in clouds?, IEEE Transac-
tions on Parallel and Distributed Systems, 2014, vol. 25, no. 9, pp. 2245-2254, doi:
10.1109/TPDS.2013.181
[12] Keromytis A, Misra V, Rubenstein D, SOS: An architecture for mitigating DDoS attacks, IEEE
Journal on Selected Areas in Communications, 2004, vol. 22, no. 1, pp. 176-188, doi:
10.1109/JSAC.2003.818807
Security and Privacy Preservation Model to Mitigate DDoS Attacks in Cloud | 61
[13] Mousavi S, St-Hilaire M, Early detection of DDoS attacks against SDN controllers, 2015 Interna-
tional Conference on Computing, Networking and Communications (ICNC), Garden Grove, CA,
USA, 2015, pp. 77-81, doi: 10.1109/ICCNC.2015.7069319
[14] Saied A, Richard O, Tomasz R, Detection of known and unknown DDoS attacks using artificial
neural networks, Neuro computing, 2016, Volume 172, Pages 385-393, ISSN 0925-2312,
https://doi.org/10.1016/j.neucom.2015.04.101-393
Sirisha Potluri, S. Sunaina, P. Neha, Ch. Govind, J. Raghavender,
V. MNSSVKR Gupta
A Secure Cloud Infrastructure towards Smart
Healthcare: IoT Based Health Monitoring
Abstract: The magnitude of big data is estimated to grow in the field of healthcare.
Big Data when focused on the sector of health care can be best described as struc-
tured, unstructured and semi structured way of representing a patient’s personal
data such as his/her medical conditions, prescriptions, etc. Handling and pro-
cessing such huge chunks of data can be a daunting task. To avoid scenarios of this
type, many of the healthcare sectors have adapted cloud computing as the solution.
Amidst the pandemic such as the novel covid-19, remote working has become the
new normal. Healthcare sectors are gradually adapting to the idea of remote treat-
ment also known as telemedicine. A patient’s medical condition has to be coordi-
nated with a team of specialists, nutritionists, nurses, etc. By using cloud computing
one can completely avoid a physical interaction, it’s very useful in current situations
like covid-19. Hence cloud computing is chosen by many health sectors to receive
and store huge chunks of patients data and manage their electronic records. This
huge chunk of electronic records helps in the process of mining the data, identifying
the patterns and developments in the big data healthcare sector. Main things that
are to be taken care of : Privacy related issues and Security related concerns, Dy-
namically acceptable storage, Regulatory issues , Electronic documents containing
patients data, handwritten medical editions ,various images such as X-ray, MRI
scan, radiology images, etc. can be retrieved at any time and from any place. This
||
Sirisha Potluri, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarpalli Road, Hyderabad, Telangana
501203, India, [email protected]
Sai Lalitha Sunaina, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarapalli Road, Hyderabad, Telangana
501203, India, [email protected]
Neha Pavuluri, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI Foundation
for Higher Education, Donthanapally, Shankarapalli Road, Hyderabad, Telangana 501203, India,
[email protected]
Chennu Sai Sri Govind, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarapalli Road, Hyderabad, Telangana
501203, India, [email protected]
Raghavender Rao Jakileti, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarapalli Road, Hyderabad, Telangana
501203, India, [email protected]
V. MNSSVKR Gupta, Department of Computer Science Engineering, SRKR Engineering College,
Chinnamiram, Bhimavaram, Andhra Pradesh 53420, India, [email protected]
https://doi.org/10.1515/9783110732573-004
64 | Sirisha Potluri, S. Sunaina, P. Neha, Ch. Govind, J. Raghavender, V. MNSSVKR Gupta
can be an advantage and a disadvantage at the same time. The main challenges
involved are failures of the network, security related concerns, and privacy related
issues of patient information that is being ill-treated by users/customers, hackers,
network downtime, malware, and etc.
1 Introduction
Cloud computing is a distributed computing model, helps in delivery of computer
system services including computing power and data storage. Cloud model uses
dynamically provisioning of resources to meet the varying and dynamic resource
requirements of a customer by the concept of distributed systems in which various
virtual machines are grouped together. Virtualization is the core and has an im-
portant role in cloud computing. Virtualization technology involves creation of a
virtual version of a server, a storage device, a desktop, an operating system. Pro-
gramming level virtualization helps in PaaS offerings whereas IaaS is based on the
idea of hardware virtualization [1].
In the last decade, information technology has played a major role in the field of
healthcare. Many of the healthcare sectors have adapted cloud computing as the
solution. Hospitals and healthcare providers are exempted from the need to pur-
chase the hardware and servers. You can have huge cost savings by only purchasing
the resources you actually use with the help of cloud. Patients can have control over
their own health by using Cloud computing which democratizes data. By storing
Patient records and medical images on the cloud, data can be easily retrieved. With
help of Cloud computing healthcare providers can give prescriptions and treatment
protocols by easily gaining access to the patient data. Irrespective of geographical
locations Cloud computing also helps the specialists to review patient cases and
give their opinions. A number of healthcare-related utilities such as telemedicine,
pre- hospitalization, post-hospitalization etc. can be improved by applying cloud
computing models in healthcare [2].
The primary concern in the healthcare practices and observations for online ac-
cess of the EHR record -Electronic Health Record is Security and privacy. In order to
protect the patient’s information the sensitive records of Healthcare data should
not be made available to unauthorized people. However cyber gaps in cloud compu-
ting posture an adversarial impact and influence on the security and privacy of
patients’ electronic health records. The online access of patient records and transac-
tions related to diagnosis have many benefits for patients as well as healthcare or-
ganizations and professionals but it also raises serious security and privacy issues
related to private data of patients. Due to risk associated with EHR record -Electronic
A Secure Cloud Infrastructure towards Smart Healthcare: IoT Based Health Monitoring | 65
an enterprise to move data and applications between private and public environ-
ments.
Community Cloud
(Used by
organizations with
shared interests)
Hybrid Cloud
(Combination of
clouds)
require the client to maintain anything, including the storage of data and the net-
work and are managed by the vendor.
4.2 Integrity
Integrity guarantees that the security property of an asset has not been modified by
some unauthorized third-party personnel. It maintains the accuracy, reliability and
consistency of data throughout its entire ‘life-cycle.’ Integrity ensures an asset’s
accuracy and correctness with respect to its owner. In healthcare, the accuracy of a
patient’s personal details, health summary, clinical notes, test results etc. can be
maintained by integrity.
68 | Sirisha Potluri, S. Sunaina, P. Neha, Ch. Govind, J. Raghavender, V. MNSSVKR Gupta
4.3 Availability
One of the most important aspects of security that needs to be maintained is Availa-
bility. A service-level agreement is a bond between the customer and the service
provider about services to deliver in terms of availability and response to demand.
Earlier, the SLA were negotiated between the service consumer and a client. But
today there are different levels of SLA like customer based SLA, Service based SLA,
Multi-Level SLA.
Software as a service
(SaaS)- Ex: Communication,
email and games
Platform as a Service
(PaaS)- Ex: Web, application
development
Infrastructure as a service
(IaaS)- Ex: Server, storage,
network
Three important factors to be considered for the evaluation of the cloud system se-
curity are represented in fig. 3.
A Secure Cloud Infrastructure towards Smart Healthcare: IoT Based Health Monitoring | 69
Integrity
Confidentiality Availability
Factors to be
considered for
cloud system
security evaluation
Fig. 3: Factors to be considered for the evaluation of the cloud system security
5 Review of Literature
Various security and privacy preservation methods and approaches in health care
are discussed in table 1 as shown below.
4 Nabil Giweli Enhancing Data Privacy and Data Centric Security approach
(2013) Access
Anonymity in Cloud Computing
5 Miao Zhou Enhanced Privacy Cloud key- Innovative tree-based key man-
(2013) word search and Remote public agement scheme
integrity audit for private data
6 Sudhansu Ranjan Enhancing Data Security in The RSA algorithm is used for
Lenka et al. Cloud encrypted correspondence and
(2014) Computing using RSA Encryp- file encryption and decryption
tion and MD5 Algorithm while the digital signature of the
MD5 algorithm is used.
7 Aastha Mishra Security Advanced Secret Sharing Key
(2014) and privacy of user’s data Management Scheme
8 Nesrine Kaaniche Cloud Data ID-Based
(2014) Storage Security based on Cryptography (IBC) and CloudSec
Cryptographic
Mechanisms
9 Afnan Ullah Khan Data Confidentiality and Risk Access Control and Data Confi-
(2014) Management in Cloud Compu- dentiality(ACDC)
ting
10 Sarojini et al. (2016) Trusted and Reputed Services Enhanced Mutual Trusted Access
Using Enhanced Mutual Trusted Control
and Reputed Access Control Algorithm (EMTACA)
Algorithm in Cloud
Analytics as a
service
Healthcare as a
IoT as a service
service
Cloud computing
technologies
Network as a Healthcare as a
service service
Big Data as a
service
7.2 Federated
Many small clouds together form a large cloud. It’s very useful when the clients
require a high confidentiality in data when distributing the data geographically.
A Secure Cloud Infrastructure towards Smart Healthcare: IoT Based Health Monitoring | 73
The important factors to consider from them are listed above and we want to take all
these into consideration so we propose a model which has a p2p cloud architecture
followed by a combination with BDaas, Saas and Paas. This is complying with all of
the key components in their proposed system. There is scalability since in p2p there
is no centralization and only consists of independent resources and peers. There is
flexibility and interoperability in the services we provide and execution is the most
effective trait of the proposed model. The model emphasizes on the combination of
mobile applications and cloud computing.
Considering all the factors and different approaches provided by various au-
thors and keeping in mind all the challenges are the failures observed in network,
security challenges, and privacy issues of patient information that is being abused
by users, hackers, malware, and etc. Conferring to the analysis and study of the
above articles, many investigators and researchers have focused on reducing pa-
tient response time, increasing safety protection, and speeding up the medical
treatment for patients, we take the help of Paas (Platform as a service), Saas (Soft-
ware as a service) and BDaas (Big Data as a service) alongside P2P and that is our
approach.
8 P2P Architecture
P2P cloud computing combines existing usages and technologies in a more interest-
ing way. There are many security issues regarding user information, credit card
74 | Sirisha Potluri, S. Sunaina, P. Neha, Ch. Govind, J. Raghavender, V. MNSSVKR Gupta
information, etc. Two methods that can help with this are Data security and connec-
tion security. Each storage device in P2P cloud architecture should use data en-
cryption at a higher level.
This technique of storing data can ensure the content level protection such that
stored data cannot be reached by those who have no privilege in accessing it. In a
classic approach, users are directly connected to the servers via a protocol like a
web service.P2P ensures there is a secured connection.
We believe combining P2P architecture and cloud computing is the best solu-
tion for analytics and management of big data. On one hand, P2P networking helps
in decentralization such that peers can control their data and share resources via
clouds. It also provides storage resources, computing and networking required for
big data analytics. Overall architecture of P2P is represented in fig. 5 as shown be-
low.
Cloud user
Node to node
interface
Cloud
interface-
Cloud node
P2PCS
daemon
A great deal of study has been carried out on the subject of privacy security, and in
recent years there have been many significant review articles reviewing data privacy
taxonomy, privacy protection mechanisms, proposed architectures, and data priva-
cy protection methods; their advantages and disadvantages have been published.
Suggested data privacy security techniques can be categorized into initial ap-
proaches, mathematical analysis, soft computing based on information and ma-
chine learning methods.
Privacy issue is one of the major threats in addition to loss of data, malicious
modification, server crash are some examples of cyber threats such as Yahoo’s three
billion accounts exposure by hackers in 2013.
We proposed CNN based data privacy protection approach to ensure better qual-
ity standards in cloud computing environment. The extraction and inference phases
of the function are divided here and the former takes place locally, while the latter
takes place in the cloud. In this way, during the function extraction stage on the
edge node, confidential information is extracted from the data and data transmis-
sion rates to the cloud are reduced. The privacy-preserving issue in the processing of
data classification is taken into account through the application of deep neural
networks. The CNN (Convolutional Neural Network) algorithm is used here as a deep
neural network. Here, both in the learning and classification processes, a law-
degree non-linear polynomial is replaced to obtain the high precision activation
function. A classical deep neural network (with the ReLU activation function) is
retained to provide data privacy security for the training process, after which the
network changes only when it is used for classification. Combining the above poly-
nomial approximation with batch normalization is the theoretical main innovation
of this work.
In order to effectively solve the data privacy protection problem, encrypted
storage of cloud data is a very outstanding solution. After encryption, the data is
stored in the server provided by the cloud service provider in the form of cipher text,
and in the meantime, the server is also required to return the data to the user when
the user requires it. When the user needs to use the data frequently, it requires a lot
76 | Sirisha Potluri, S. Sunaina, P. Neha, Ch. Govind, J. Raghavender, V. MNSSVKR Gupta
of network bandwidth and user’s time to conduct communication with the server
and realize data encryption and decryption, which will significantly reduce the
usability of cloud computing. In the meantime, after the encrypted data stored in
cloud servers has developed to a certain scale, effective retrieval of encrypted data
has become a new problem that needs to be solved, while the traditional infor-
mation retrieval technology can no long satisfy the requirement of mass data re-
trieval in the cloud storage environment [11-13].
Tab. 2: Comparison of cloud security and privacy preserving algorithms which are used in healthcare
Listing 1: Real time healthcare dashboard for tracking a patient health condition- blood pressure
readings
health_readings['future_reading']['x'] += '"' +
next_pdate.strftime('%Y/%m/%d %H.%M.%S') + '",'
health_readings['past_reading']['systolic_p'] +=
str(p_measure.systolic_p_blood_pressure) + ','
health_readings['past_reading']['diastolic_p'] +=
str(p_measure.diastolic_p_blood_pressure) + ','
raw_readings_p['systolic_p'].append(p_measure.systolic_p_blood_pressure)
raw_readings_p['diastolic_p'].append(p_measure.diastolic_p_blood_pressur
e)
if p_measure.heart_pulse and p_measure.heart_pulse>33:
raw_readings_p['pulse_p'].append(p_measure.heart_pulse)
health_readings['past_reading']['pulse_p'] +=
str(p_measure.heart_pulse) + ','
p_counter += 1
return health_readings
13 Conclusion
Based on the investigations observed in the literature, the performance and enact-
ment of telemedicine service through hosting and presenting options and choices of
Amazon EC2. The efficiency and proficiency is examined and studied by answering
the number of requests per seconds. According to the description provided by them,
dynamic resource provisioning on web tier with medium type instances is much
better than static allocation with large and extra-large instances. A feasible solution
is obtained but it’s not implemented in real time.
Cloud-based homecare cloud model is best suited for patients with respiratory
diseases. They have a conscious platform that can dispense and store a patient’s
respiratory data alongside caregivers, families, and infirmaries quickly. By utilizing
mobile technologies and models, the saturation and capacity of oxygen can be mon-
itored and examined and the information can be distributed to patients and medical
specialists.
In P2P there are no centralizing and monitoring components. It consists of in-
dependent resources and peers and division of peer’s costs is very low and it leads
to minimal management. The PaaS provider will fund much of the infrastructure
and other IT related services, which users can access anywhere in a distributed
environment via a web browser it is affordable as well PaaS offerings are usually
used for mobile apps , cross platform apps and devops tools. SaaS and BDaas will
help in the all-round development of cloud computing in healthcare.
80 | Sirisha Potluri, S. Sunaina, P. Neha, Ch. Govind, J. Raghavender, V. MNSSVKR Gupta
14 References
[1] Rajkumar B, Chee Y, Srikumar V, James B, Ivona B, Cloud computing and emerging IT plat-
forms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation
Computer Systems, 2009, Volume 25, Issue 6, Pages 599-616, ISSN 0167-739X,
https://doi.org/10.1016/j.future.2008.12.001
[2] Peter M, Timothy G, The NIST definition of cloud computing, National Institute of Standards
and Technology: Special Publication (NIST SP), 800-145, 2011
[3] Al-Issa Y, Ashraf O, Tamrawi A, eHealth cloud security challenges: a survey, Journal of
Healthcare Engineering, 2019, vol. 2019, Article ID 7516035, 15 pages,
https://doi.org/10.1155/2019/7516035
[4] Harika K, Manisha G, Potluri S, An IoT based solution for health monitoring using a body-worn
sensor enabled device, Journal of Advanced Research in Dynamical and Control Systems
(JARDCS), 2018, Volume 10, Issue 9, PP: 646-651, ISSN 1943-023X
[5] Potluri S, Avinash M, Health record data analysis using wireless wearable technology device,
Journal of Advanced Research in Dynamical and Control Systems (JARDCS), 2018, Volume 10,
Issue 9, PP: 696-701, ISSN 1943-023X
[6] Avinash M, Potluri S, A study on technologies in cloud-based design and manufacturing, Inter-
national Journal of Mechanical and Production Engineering Research and Development
(IJMPERD), 2018, Volume 8, Issue 6, PP: 187-192, ISSN(P): 2249-6890, ISSN(E): 2249-8001
[7] Potluri S, Achyuth S, Elham T, Mohanty S N, IOT enabled cloud based healthcare system using
fog computing: a case study, Journal of Critical Reviews, 2020, ISSN- 2394-5125, Vol 7, Issue 6,
PP: 1068-1072, doi: 10.31838/jcr.07.06.186
[8] Goyal S, Public vs private vs hybrid vs community - cloud computing: a critical re-
view, International Journal of Computer Network and Information Security, 2014, 6, 20-29
[9] Jansen W, Grance T, Guidelines on security and privacy in public cloud computing, NIST Special
Publication, 2011, 800-144, pp. 5
[10] Koufi V, Malamateniou F, Vassilacopoulos G, Ubiquitous access to cloud emergency medical
services, Proceedings of the 10th IEEE International Conference on Information Technology and
Applications in Biomedicine, Corfu, Greece, 2010, pp. 1-4, doi: 10.1109/ITAB.2010.5687702
[11] Haider W, Iqbal W, Bokhari S, Bukhari F, On providing response time guarantees to a cloud-
hosted telemedicine web service, Zhang Y, Peng L, Youn CH, Cloud Computing, CloudComp
2015, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommu-
nications Engineering, 2015, vol 167, Springer, Cham, https://doi.org/10.1007/978-3-319-
38904-2_24
[12] Risso A, Neyem A, Benedetto J, Carrillo M, Farías A, Gajardo M, Loyola O, A cloud-based mobile
system to improve respiratory therapy services at home, J Biomed Inform, 2016, 63, 45-53, doi:
10.1016/j.jbi.2016.07.006
[13] Navimipour J, Navin H, Rahmani M, Hosseinzadeh M, Behavioral modeling and automated
verification of a cloud-based framework to share the knowledge and skills of human resources,
Computers in Industry, 2015, 68, 65–77
[14] Neghabi A, Navimipour J, Hosseinzadeh M, Rezaee A, Load balancing mechanisms in the soft-
ware defined networks: a systematic and comprehensive review of the literature, IEEE Access,
2018, 6, 14159–14178
[15] Akinsanya, Opeoluwa O, Papadaki M, Sun L, Current cybersecurity maturity models: how effec-
tive in healthcare cloud?, CERC (2019)
A Secure Cloud Infrastructure towards Smart Healthcare: IoT Based Health Monitoring | 81
[16] Duncan B, Pym D, Whittington M, Developing a conceptual framework for cloud security assur-
ance, IEEE 5th International Conference on Cloud Computing Technology and Science, Bristol,
UK, 2013, pp. 120-125, doi: 10.1109/CloudCom.2013.144
[17] Kumari S, Kamal A R, Optimal integrity policy for encrypted data in secure storage using cloud
computing, Indian J Sci Technol, 2016, vol.9, no.8, 2016, pp.1–10, 2016
[18] Monikandan S, Arockiam L, A security service algorithm to ensure the confidentiality of data in
cloud storage, Int J Eng Res Technol, 2014, 3(12), 1053–1058
[19] Shabbir A, Shabbir M, Rizwan M, Ahmad F, Ensuring the confidentiality of nuclear information
at cloud using modular encryption standard, Security and Communication Networks, 2019, vol.
2019, Article ID 2509898, 16 pages, https://doi.org/10.1155/2019/2509898
[20] Singh N, Singh A, Data privacy protection mechanisms in cloud, Data Sci. Eng, 2018, 3, 24–39,
https://doi.org/10.1007/s41019-017-0046-0
[21] Delettre C, Boudaoud K, Riveill M, Cloud computing, security and data concealment, Proceed-
ings, 16th IEEE Symposium on Computers and Communications, Kerkyra, Greece, 2011, 424
431, 10.1109/ISCC.2011.5983874 2-s2.0-80052768216
I. Indrani, SVB Revanth, S. Akhil Durga, Sirisha Potluri, Sachi
Nandan Mohanty
Internet of Cloud: Secure and Privacy Preserving
Cloud Model with IoT Enabled Service
Abstract: Security and safety are among the critical difficulties of Internet of Things
(IoT). Updating inappropriate gadgets, the lack of productive and powerful security
meetings, customer ignorance, and viewing a well-known powerful gadget are some of
the problems IoT faces. In this work, we explore the basis of IoT frameworks and security
efforts, and we see other safety and security matters, methods used to verify IoT-based
components and structures, security arrangements in place, and the best protection
models are important and suitable for the various layers of IoT-operated applications. In
this work, we have proposed another embossed IoT model: standard and expanded with
security and safety components and layers of physical evidence. The proposed
cloud/edge IoT framework is developed and tested. The background below spoke to IoT
centres created via Amazon Web Service (AWS) such as Virtual Machines. The centre
layer (edge) has been developed as a resource unit for Raspberry Pi 4 with the help of
Greengrass Edge Environment in AWS. We used cloud-enabled IoT weather in AWS to
create the top layer (cloud). Security meetings and basic management meetings were
among all these areas to ensure the security of customer data. We have verified security
announcements to allow data to flow between layers of the proposed cloud-enabled
model. Not only does the proposed framework model eliminate the perceived security
vulnerabilities, but it can also be used alongside the best security measures to combat
network security risks facing all the latter layers; cloud, edge, and IoT
||
Indrani Inapakolla, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarapalli Road, Hyderabad, Telangana
501203, India, [email protected]
SVB Revanth, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI Foundation
for Higher Education, Donthanapally, Shankarapalli Road, Hyderabad, Telangana 501203, India,
[email protected]
Siliveru Akhil Durga, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarapalli Road, Hyderabad, Telangana
501203, India, [email protected]
Sirisha Potluri, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarpalli Road, Hyderabad, Telangana
501203, India, [email protected]
Sachi Nandan Mohanty, Department of Computer Engineering, College of Engineering Pune,
Wellesley Rd, Shivajinagar, Pune, Maharashtra 411005, India, [email protected]
https://doi.org/10.1515/9783110732573-005
84 | I. Indrani, SVB Revanth, S. Akhil Durga, Sirisha Potluri, Sachi Nandan Mohanty
1 Introduction
Internet of Things (IoT) points to the concept of articles related to gadgets of many
kinds on the Internet or wireless Internet. The popularity of IoT or Internet of Things
has grown rapidly, as these new devices are used for a variety of purposes, includ-
ing literature, travel, education and business improvement. IoT introduced the con-
cept of connectivity, which means that organizations and individuals can communi-
cate from far and wide easily. Kevin Ashton coined the term ‘IoT’ in 1999 to promote
the concept of Radio Frequency Identification (RFID), which combines sensors and
actuators. Nevertheless, the first idea was introduced in the 1960’s. At the time, the
idea was inevitable to register or install the Internet. Ashton presented the IoT’s idea
of promoting good exercise with chains. Be that as it may, the versatility of IoT has
helped to boost strong availability during 2010. The Chinese government gave
greater demand to the IoT by introducing a five-year plan. Approximately 26.66
billion IoT device resides in the rotating earth. The big bang started in 2011 with the
introduction of home appliances, wearable gadgets, and sharp energy meters. The
rapid explosion of IoT has helped organizations and in various ways improved sta-
tistical and business research methods. In addition, IoT has improved the way peo-
ple live by introducing computer management. However, uncontrolled explosions
have exacerbated security and safety challenges [1].
The unrecognized use, not the emergence of passwords, and the absence of up-
dates to gadgets have increased the risks of online security and the acceptance of
malicious applications on sensitive IoT frameworks. Such improper training in-
creases the likelihood of information leaks and accidents. The vast majority of secu-
rity experts view the IoT as a vulnerable area for digital attacks due to weak security
meetings and arrangements. Unless a few security items are designed to protect IoT
gadgets from digital attacks, security rules are not properly documented. In line
with these lines, end clients have not been able to use defensive tactics to destroy
information attacks. The developers of the program have created a variety of mal-
ware to contaminate IoT gadgets from the night before 2008. They are organizing
various forms of crime to steal sensitive information in order to arouse public repre-
sentatives to share sensitive information. Similarly, workplaces and certain compa-
nies are constantly facing security breaches due to prominent attacks. If gadget
manufacturers and security experts assess digital risks accurately, they can create a
protective component to prevent or kill digital accidents [2].
IoT enabled gadgets used for automated applications and for various business
purposes. Applications help these organizations achieve their rivals. However, due
to the unnecessary selection of various savvy gadgets that share information and
connectivity, access to security and information becomes a major concern for many
organizations, as it interferes with workflow, exercise, and organizational manage-
ment. It is important for professionals to overcome these dangerous concerns and
Internet of Cloud: Secure and Privacy Preserving Cloud Model with IoT Enabled Service | 85
make comprehensive safety efforts and strategies to protect the resources of their
business and ensure the continued integrity and integrity of management. For ex-
ample, powerful IoT kitchen appliances associated with a local organization can be
a source of entry for planners to gain business acceptance and in addition to rele-
vant information or to control and disrupt the business process.
New developments are emerging, or changes are being made in existing ones.
Consider the latest developments in the 5G organization, for example. 5G is required
to take a basic role in IoT frameworks and applications. It is upright enough to be
recognized and is interested in the safety and security risks you can imagine, with
its high frequency and data transfer. However, the shorter frequency necessitates
adjustment at the base, as a result of which the need for additional channels to cov-
er the same region is covered by new different remote techniques [3].
In this work, we plan to provide a framework for IoT applications, benefits, and
expected risks. In addition, building a structure that needs to be considered and further
enhances the best practice by doing or researching existing programs or developing
new ones. Based on the findings, we offer suggestions for avoiding such dangers and
treating potential safety concerns. This work will direct management organizations to
continue to implement strategies, instruct storage clients and objects, and IoT-related
partners to create and implement appropriate security and protection measures.
We developed our model using Amazon Web Service (AWS) as a confirmation of
ideas, which later referred to real sensory frameworks that mimic the overall IoT
structure. By creating a draft, we can post and consider different security measures
by creating real locations and benchmarks.
We have embraced account research philosophy to explore a set of experiences
and the basis of IoT frameworks, their security and security issues, and comparative
measures. We have expressed our opinion about the inclusive and expanded IoT
model and its protection and security. We designed and tested the cloud/elevated
IoT model with the optical device (sensors), the hub edge (Raspberry Pi), and cloud
management (AWS). This provision was intended to test the model we have pro-
posed in the sections accompanying this paper. Our work does not give cunning to
different IoT applications (well-being, intelligent urban communities, good chain,
transport, etc.); their highlights, their preferences, and their challenges, or security
risks that can be considered within these applications. The text is rich in such a
thing. In this work, we wanted to have a complete review of the evidence and to lay
the groundwork for further testing and evaluation.
The rest of the paper is organized as follows: the next section introduces
bookkeeping followed by IoT security and protection challenges. In Section 4, we
examine the end of the Internet of Things at the end. Section 5 introduces the pro-
posed cloud-based/edge IoT models: standard and extended with protective and
security components and layers of visual evidence. This section similarly illustrates
the use of the proposed AWS cloud model and the conditions on the edges and
package of the Raspberry Pi 4. Section 6 closes this function.
86 | I. Indrani, SVB Revanth, S. Akhil Durga, Sirisha Potluri, Sachi Nandan Mohanty
2 Review of Literature
The creators have pointed out that there are various problems, for example, sticking
to and emphasizing attacks and other unauthorized access, which has reduced re-
spect for customer information. There are potential programs that can assist a per-
son in making various security measures that can help ensure their IoT gadgets. As
mentioned, various security risks have arisen at the moment, and they can access
IoT Technologies with their integrated organization. Organizations should provide
testing and filtering tools to all IoT gadgets that can detect any type of risk identified
safely and try to eliminate the risk of intrusion. Trainers and traffic analysts help
identify and evaluate various digital risks [4].
Many administrators have introduced part of the difficulty or loading of widgets
to various IoT gadgets and its porters. The different reproductive tools, models, and
accessibility of the various components that can ensure this security meeting can
also help to create a well-defined IoT security meeting for the novel. Most would
agree with the rapid development of the IoT security tests and the various simula-
tion tools as long as the actors supported this experiment. If IoT gadgets are likely to
attack, then the problems will get worse.
The creators acknowledge that, while there are great benefits to clients for the
Internet of Things, there are joining forces that should be taken seriously. Online
security and security opportunities are the most important issues discussed. These
two represent the tremendous difficulties in some business organizations as an open
organization. The usual attacks of network protection have shown the weakness of
new IoT devices. This is simply because the interaction of organizations on the In-
ternet of Things brings openness to the anonymous and unreliable Internet, which
requires security arrangements for novels. Also, it is important to emphasize the
important norms and standards of the IoT Cyber Security framework regarding the
creation of an IoT security framework. As noted, one of the key steps to consider is
the conclusion of an agreement with a variety of gadgets with different book confer-
ences. Differences in meetings prevent separate service contracts from operating
and are essential elements to be found in the security structure of each Internet of
Things network. He pointed out that to ensure the reliability of the IoT system in the
online security sector, little progress should be made to help reduce the security
complexity of the IoT network. Likewise, the founders have shown that doing more
things is an important part of the success of the Internet of Things network security
program. The researchers said the IoT climate should work with a variety of factors
to address the billions of Internet-related challenges and network security. Accord-
ingly, the journal has suggested that the weather protection of the IoT network
should also keep testing, for example, installation testing, partial testing, frame-
work testing, and consistency testing, adequately minimizing complications and
Internet of Cloud: Secure and Privacy Preserving Cloud Model with IoT Enabled Service | 87
risks. In a similar vein, the creators have introduced part of the current IoT network
security systems [5].
Some important safety efforts have been made by the provider, and have shown
that it does not prepare the provider to make better arrangements. Due to the online
protection of the Internet of Things, organizations will probably not make the nec-
essary arrangements. Also, the creators are introducing real-time flexible and digital
frames as a whole, from mechanical control frameworks, current vehicles to the
basic framework. Recent features and functions, for example, Industry 4.0 and In-
ternet of Things (IoT), ensure the innovation and innovation plans of new customers
through a strong network and the effective use of the new age of installed gadgets.
These frameworks produce, rotate and trade a wide range of functional infor-
mation. Security and the secretive beliefs that make digital attacks an attractive goal
of the Internet of Things cause real corruption and disrupt people’s lives. Network
security and security are important on the grounds that they may pose a risk. The
multiplicity of these frameworks and the potential consequence of digital attacks
present new dangers in today’s related IoT frameworks. Potential answers to the
security and safety challenges are the standard security frameworks of modern IoT
frameworks. The current IoT frameworks have not been adequately developed to
ensure appropriate capabilities.
As such, there has been a remarkable increase in the investigation and evalua-
tion of various security issues on the IoT. One of the main objectives of IoT security
is to protect, maintain, and ensure that each client can develop the assurance,
foundations, and assurance of access to the different management provided by the
IoT biological system. Similarly, alternative IoT security testing enhances basic
capabilities with the help of various recreational tools such as multi-component
computers [6].
3.1 Safety
IoT is integrated from standard PCs and gadget registrations, making it incapable of
dealing with security challenges of various types:
– Many Internet of Things gadgets are designed for large size layouts.
– Typically, IoT configurations contain a number of similar or almost indistin-
guishable resources with comparable features. This similarity enhances the
magnitude of any security vulnerabilities that could completely affect a large
number of them.
– This advancement means that the potential number of connections between IoT
gadgets is staggering. It is even more certain that most of these gadgets can set
up organizations and talk about different gadgets as a result in an unexpected
way. This needs to be considered with the available devices, methods, and
techniques available for IoT security.
Indeed, while the issue of data security and innovation is not a new phenomenon,
the use of IoT has brought about different measures to lean towards. Consumers
need to rely on Internet technology and management is safe from mistakes, espe-
cially as these innovations continue to gain more time and are incorporated into our
normal days of life. With partially enhanced IoT devices and management, this is
one of the major routes used for digital attacks such as the importation of customer
information by leaving information streams unsatisfactory.
The concept of IoT gadget connectivity means that if the gadget is poorly veri-
fied and connected to it has the potential to influence global security and flexibility
around the world. This behaviour is achieved by testing a large IoT gadget function.
Aside from the ability of certain gadgets to have the option to interact directly with
different gadgets, it means that clients and developers of IoT are all committed to
ensuring that they do not expose separate clients such as the Internet itself from
potential damage. The standard approach required to build a robust and efficient
response to a crisis is as seen now in IoT [9-10].
In terms of validation, for example, IoT faces a different weakness, which re-
mains a major problem in security systems in many systems. The authentication
used is limited by the way it protects against just one risk, for example, Denial of
Service (DoS) or retaliation. Data security is one of the most critical regions in IoT
authentication due to the increase in unsafe use due to their diverse IoT climate
information. If possible, for example, we have taken a picture of Visa contacts.
Internet of Cloud: Secure and Privacy Preserving Cloud Model with IoT Enabled Service | 89
These cards are equipped to allow card numbers and names to be used without IoT
verification; this makes it possible for program planners to have the opportunity to
purchase merchandise using the cardholder’s financial balance number and their
personality.
Another notable attack on IoT is the man in the middle, where an outdoor pho-
tography channel is shown to photographing characters of large areas involving
network trading. The man, at the centre of the attack causes the bank employee to
see the exchange as a legal term because the enemy does not need to know the
character of the suspect.
3.2 Secret
The concept of easy-to-use IoT depends on how well it looks at people’s safety pref-
erences. Concerns about the safety and potential harm of joining an IoT may be
crucial in maintaining full IoT acceptance. It is fundamental to see that customer
protection and management rights are critical to ensuring customer confidence and
confidence in the Internet of Things, compatible gadget, and related advertising
management. A lot of work is trying to get the assurance that IoT is reconsidering
security issues such as increased monitoring and tracking. The explanation behind
the concern for security is the direct result of the inevitable understanding of the
complexity of the past where the cycle of testing and dissemination of data on IoT
can be done almost anywhere. Universal access to the Internet is equally a funda-
mental figure that helps to understand this problem on the grounds that unless
there is an exciting system, then it will be explicitly acceptable to access individual
data from any aspect of the earth [11].
3.3 Cooperation
A separate climate for IoT specialization is known to suppress customer motivation.
Apart from the fact that full integration is rarely practical in real estate and man-
agement, clients are reluctant to purchase and manage items when there is no flexi-
bility and concern about getting inside the vendor. Inadequate IoT naming can
mean that there will be a negative reversal of the assets of the management systems
we work with.
Cryptography is one of the most widely used cornerstones to provide security in
many ways. A powerful system of self-defence against potential attacks is not con-
sidered using a single security system. This, in turn, requires different levels of pro-
tection from the risks of IoT authentication.
By improving the improved safety points and adding these excellent features,
hacks can be prevented. This avoidance is due to the fact that clients will purchase
90 | I. Indrani, SVB Revanth, S. Akhil Durga, Sirisha Potluri, Sachi Nandan Mohanty
items that currently have legal security that exposes the preventing vulnerabilities.
Online security programs are part of the measures in place to ensure IoT is secure.
Alternatively, features and minor concerns may affect the negotiation efforts of
the Internet of Things gadgets; this includes:
– Periodic updates: for the most part, IoT manufacturers are updating security
updates on a quarterly basis. OS forms and security patches are also redesigned.
In this way, program planners get ample opportunity to break the security con-
ventions and take the details involved.
– Embedded passwords: IoT gadgets store embedded passwords, enabling help
professionals to investigate OS issues or deliver important updates remotely. Al-
ternatively, programmers can use the feature to securely access gadgets.
– Automation: regular, performance and end customers using computer equip-
ment for IoT social media frameworks or to improve business practices. Alterna-
tively, if retaliatory areas are not displayed, the installed AI can access those re-
sources, which will allow risks to enter the framework.
– Remote access: IoT gadgets use various organizational conferences for remote
access such as Wi-Fi, ZigBee, and Z-Wave. Often, clear limitations are not ad-
dressed, which can be used to deter cybercriminals. Therefore, program plan-
ners can quickly establish a revenge organization through these remote access
conferences.
– Several integration of external applications: a number of application programs
are available online, which can be used by organizations to perform specific
tasks. In any case, the functionality of these applications was not detected
without a problem. In the event that final clients and representatives present or
access such programs, risk specialists will enter the framework and damage the
database.
– Incorrect gadget authentication: most IoT applications do not use authentica-
tion management to block or limit network risks. In this way, the attackers enter
the entrance and undermine security.
– Weak Device Recognition: In general, all IoT manufacturers set up identifiable
gadget identifiers to monitor and track gadgets. In any case, few manufacturers
do not keep their safety strategies. After all, following questionable internet
tests becomes very dangerous [12-16].
more aims to talk about the dangers of digital. Web-authorized content becomes the
responsibility of cyber criminals. The expansion of the IoT market increases the
magnitude of the potential risks, which could affect the profitability and well-being
of gadgets and therefore our security. Reports include the frequency of information
breaks that are definitely extended since 2015; 60% in the USA only. A review of all
that has led to Japan, Canada, the UK, Australia, the USA and France found that
63% of IoT consumers thought these gadgets were a threat due to poorly regulated
security. The test findings also included that 90% of customers are unsure about IoT
network security.
Momentum research has investigated various creative processes to measure dig-
ital attacks and enhanced security arrangements. Part of the experimental detected
arrangements are recorded below; Transfer encryption processes: authorizing ro-
bust and robust encryption methods can extend online protection. Encryption as-
sembly performed on both cloud and gadget environments. As a result, the editors
of the program were unable to comprehend the intangible and abusive data struc-
ture. Consistent assessment of emerging risks: safety risks are regularly assessed.
Such groups analyse the impact of IoT threats and develop effective control
measures through continuous testing and evaluation.
Adding duplication of updates: gadget manufacturers should grow fewer fixes
than counter important updates. Such a procedure can reduce the uncertainty of
starting the adjustment. Also, continuous updates will help clients by misleading
dangerous digital assets from various sources.
Transfer solid gadget test devices: a large part of the new test is designed to
make heart-focused gadget viewing strategies so that those questionable tests can
be tracked and controlled without any problem. Many IT organizations are familiar
with a gadget capable of viewing hazardous materials. Such devices are very im-
portant in risk assessment, which helps organizations to build modern control tools.
Create archived customer rules to create security assumptions: a large part of
the break breaks and IoT attacks occur due to a lack of customer thinking. For the
most part, IoT security efforts and regulations are not identified when clients pur-
chase these gadgets. In the event that gadget makers explicitly determine potential
IoT risks, clients may end up with these issues. Organizations can similarly organize
preparatory projects to improve security awareness. Such projects guide clients to
build strong passwords to update them consistently. Also, clients are told to restart
security adjustments consistently. Clients add more and are said to maintain a range
of strategies from spam messages, external applications, or sources that can sell IoT
security.
There will be more than 30 billion IoT gadgets by 2025. Before that, people knew
about IoT work, yet they discarded the idea by looking at how confusing the idea
looks and how tempting it is to do it. However, with the development of new inven-
tions, it is now possible for people to believe that this is only possible as the level of
development of IoT increases the new steps step by step. In 2020 and earlier, for
92 | I. Indrani, SVB Revanth, S. Akhil Durga, Sirisha Potluri, Sachi Nandan Mohanty
example, intelligent home controls and bright lighting are just a few examples of
how IoT is used to protect energy and reduce tariffs and this can add to the amazing
motivation of why so many people choose IoT gadgets.
Many urban communities will shine. There will be better traffic management;
roads will be freed from closures, urban areas will benefit from reduced pollution,
safety will be the high expectations for this with a massive IoT massacre.
Management of medical care is very expensive, with the majority of diseases
persisting in ascendancy. We are heading for a time when essential medical services
can be integrated to find other people, especially as people are more prone to infec-
tion. Other than that, apart from the fact that the new product is not designed to
prevent people from growing, it could help make medical services easier on the
pocket to the point of availability. For example, by delivering regular clinical checks
from an emergency clinic to a patient’s home, this will be of great help to patients.
Ongoing testing using Internet-related gadgets is one of the ways in which it will
help save the lives of many patients. Timely alarms are critical in case of emergency
situations, the same number of IoT gadgets in clinics will continue to be associated
with the most important details for continuous follow-up. Patient satisfaction will
be fundamentally improved.
In this work, we propose another perspective on IoT models: inclusive and ex-
tended with security and security components and ID and team layers. We have
designed a cloud/raised edge of the IoT framework to make the proposed IoT mod-
els. Therefore, in this work we begin by introducing inclusive and expanded models,
at which point we demonstrate our experimental design and climate (use of a con-
centrated model), and then present and discuss the results and findings [17].
ers or modules is installed to ensure the strength of the air support network. To
ensure that data is sent and managed quickly to provide basic options that will not
stand until the data is sent to the cloud, we present the edge-finding capabilities
that can stay in such a great option, and simultaneously save duplicate information
and send it to cloud layer to prepare and store long-term retrieval. In some cases, we
need to send orders or references to certain wearable gadgets to update their pur-
chase or usability ratio, and this will require alternative assembly and security
measures.
Fig. 2, shows the extended extension of the excluded model. We are seeing an ex-
pansion of new layers; on the brink of misery. These two layers can overcome the
issues of inactivity from the dependence of the benefits of the cloud layer and can be
resolved in a quick selection. Edge registration occurs on gadgets where the sensors
are plugged into or actually turned off. They provide continuous selection and control
over the sources of information, and at the same time, discuss the various layers to
convey information by integration, remote, and investigative. The haze enrolment
layer motivates edge-testing experiments on all the most notable intellectual property
associated with neighbours and is actually removed from the nerves and sources.
These additional benefits create significant safety and security challenges [18].
End User
Cloud
Fig. 1: Internet of Things (IoT) generic model with privacy and security policies
On the cloud layer, security efforts need to ensure organizational meeting between
edge areas and mass areas and periodically from sensors. Converting meeting mes-
sages, highlighting encryption points, and enabling all provides minimal infor-
mation for check-in and login. At the data management and final client level, we
need to ensure that data retention and retrieval of fixed data is protected from SQL
attacks, smells, and attacks of sensitive identity theft documents, providing renew-
able support and following HIPPA procedures (in social frameworks) [30) ]. The
integration of the information can familiarize the department with the programmers
to isolate the client, as a result of which security comes in. As IoT gadgets can join
and leave the organization of sensors and sources, this can add a lot of confusion to
the general security effort strategies, hence the need for new smart and diverse se-
curity efforts [20].
Internet of Cloud: Secure and Privacy Preserving Cloud Model with IoT Enabled Service | 95
Cloud compuitng
layer
Edge computing
Fog compuitng Data storage,
Device Layer layer
layer feature
Multiple sensors Local data and extraction,
Multi- Sensor
and data sources real time anamoly
data fusion
analysis detection,
decision system
and control
The Raspberry Pi was designed with an outstanding addition to the Linux durabil-
ity. Creating a partnership between AWS and Raspberry. We used the AWS Green
grass Core to create a circle with the centre gadget, as well as any remaining IoT
gadgets to allow them to speak on the edge.
We need announcements to verify all gadgets with AWS. We have issued rec-
ommendations, private and public keys for safe and secure relations with AWS.
Institutional certification is generated by AWS once we have done the Greengrass
circle, as shown in Fig. 4 below. We downloaded the documents produced on the
Raspberry Pi and started Green grass Core.
Edge node
Raspberry Pi,
Cloud
Hard and soft links
AWS IOT
Certificate, Pricate and
public keys
IOT nodes
Virtual machines
Instances in AWS within edge node
secure group
– In every model, IoT gadgets are either portable or come with AWS IoT Core. 5
– In our model we added an edge view using the Green grass IoT centre view on AWS, and spoke to
it via Pi, so that we could see it as an additional middle ground between IoT and AWS IoT Core
gadgets and then a cloud.
– Each gadget needs its own authentication, private key, and CA Root announcement (this is an
AWS IoT agreement). There are different types of CA Root agreement based on IoT gadget types.
– Each gadget needs a strategy, this setting indicates which functions this gadget can perform
(interface/find/distribute/purchase, etc.)
The x-axis: days of the month, and the y-axis: the number of connections. Along
these lines, we made a gadget, strategy, and testament. At that point we joined the
arrangement to the declaration, at that point appended the authentication to the
gadget. A default strategy is demonstrated in the code listing beneath:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "iot:*",
"Resource": "*"
}
]
}
Internet of Cloud: Secure and Privacy Preserving Cloud Model with IoT Enabled Service | 99
The modified version of our model appears in the following code listing. In our case,
the books are finalized using the MQTT assembly which is a machine assembly sys-
tem. MQTT is used for reasons that it is lightweight (small-sized messages and re-
quires low power), so it makes sense for forced weather (sensors as a metaphor for
real applications).
Listing 2: Modified device policy to include the edge layer in the proposed model
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"iot: Publish",
"iot: Subscribe",
"iot: Connect",
"iot: Receive"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"greengrass:*"
],
"Resource": [
"*"
]
}
]
}
100 | I. Indrani, SVB Revanth, S. Akhil Durga, Sirisha Potluri, Sachi Nandan Mohanty
In addition, note that IoT gadgets in AWS are copied as MQTT clients (if they are
visible - in what is important in our case), and MQTT clients transmit the MQTT title.
The association can be regarded as a secure channel between customers, it is
formed, at which time customers can buy from it, and various customers spread the
message to it.
Now, the Raspberry Pi setup process involves installing JAVA JDK8, green grass
files, in addition to the appropriate Core software (depending on the device used —
for us, it’s Raspberry Pi 4).
All these files have been transferred to Raspberry Pi 4 as shown in Fig. 6 below.
After setting the weather and making sure it was right, we made the MQTT theme for
our situation and named it (my/point). At that time, we made the gadget to be pur-
chased on my/subject and made another gadget to be the presenter on my/theme.
All technologies can play all functions with any remaining gadgets (default strate-
gy), and all messages are successfully sold. Fig. 8 shows the different types of mes-
sages traded in one day. Meeting time is influenced by many factors including the
inertness of the organization and the pre-management stage.
The proposed IoT model has shown that we can ensure the safety and security
measures put in place before allowing the IoT enabled gadget or hub to transmit or
share its information. When properly designed and built, we ensure that our re-
sources are secure. The model shown in this paper can be used to provide secure IoT
shapes and structures with haze/edge processing layers and a combination of sen-
sors. Some real-time applications can use this model, for example, medical care,
military, debacle recovery, and many more. Allow us to look into the case of medical
services; for example, through a proposed strategic-based model, clients will be
able to trust their medical service providers to allow them to be protected to see that
they are being cared for. Medical care organizations incorporate resources into
clothing with the assurance that they will help improve employee benefits, reduce
unemployment, and reduce the cost of medical services. Another major factor in
wearable gadgets is the belief that it can provide for people with disabilities. For
example, a person with special needs will have the option of placing orders and
text, say, by moving a finger here and there. The final, but unrestricted, strategy is
the number of security customers who can work on their records. For example, indi-
viduals can classify who can see their social media posts or policies that specify the
amount of additional security is added to their record (e.g., two-factor authentica-
tion)
While the developers of IoT applications (medical services for this condition) try
to do the best for their customers, there are still a few principles that will fail. One of
the inefficiencies will be how client information is removed and how outsiders han-
dle it. It is often up to the supplier himself to ensure that they set the rules and pro-
pose an arrangement that will enable them to behave responsibly with vendors and
their customers. The same thing applies with customer segregation. More often than
not, outsiders, (for example, insurance agencies) can obtain customer data in case
they “agree” with it, and then from there, it can be dangerous to determine if it is
solid. In the following figure, on the X- axis hours of the day and on the Y- axis one
day message readings are represented.
102 | I. Indrani, SVB Revanth, S. Akhil Durga, Sirisha Potluri, Sachi Nandan Mohanty
9 Conclusion
IoT devices and applications play an important role in our modern life. We can see
IoT devices almost everywhere from our homes, offices, shopping centres, schools,
airports, and many other places to provide us with secure and sought-after services.
IoT gadgets support collaboration with partners and help in understanding
business needs and outcomes. In addition, IoT-based testing and information pro-
cessing can enhance the profitability and productivity of a modern framework
In addition, IoT frameworks are implementing a variety of innovative new de-
velopment applications in a variety of areas. Retailers and many organizations are
finding a large proportion of arrangements to protect their gadgets related to mali-
cious attacks. With the large number of these gadgets associated with our private
organizations and the Internet, additional concerns and protections are also being
taken into account. We read and hear that our espresso machine is watching our
conversations; our excellent department sends our guests photos of government
agencies. Some real models emphasize the seriousness of the security vulnerabili-
ties associated with the use of IoT gadgets.
In this work, we have introduced new IoT models: standard and accessible with
insurance and security components and highlights. The proposed cloud/edge struc-
ture is maintained and tested. The low level is considered by IoT institutions devel-
oped by Amazon Web Service (AWS) as Real Machines. Medium level (Edge) has
been achieved as a Raspberry Pi 4 gear pack with a source of Greengrass Edge Envi-
ronment in AWS. The high level, which is a cloud, is eliminated using IoT cloud
Internet of Cloud: Secure and Privacy Preserving Cloud Model with IoT Enabled Service | 103
computing in AWS. Security meetings and basic management meetings were held
between each of these layers to ensure the protection of customer data
In the future work, further research should be done on cryptographic security
strategies that are best suited to operating IoT-compressed IoT (Light Weight Crypto)
devices. It will help to ensure that clients with a variety of connections can use and
set up IoT frames without the lack of consumer integration that comes with the large
number of these IoT gadgets. In addition, there is a real need to make a variety of
information and sharing methods available for Internet-related IoT gadgets. Such
guidelines will reduce the number of unexpected vulnerabilities and related attacks
in non-identical categories.
We study the benefits and risks associated with IoT. With all the various bene-
fits, risks can be misused to harm end clients by allowing unauthorized acceptance
of sensitive information, enabling framework attacks, and endangering the health of
individuals. With IoT enabled gadgets marketed, we need to deliver them with ap-
propriate security efforts that facilitate their use, function, and join existing struc-
tures. We relied on the help of analysts to create a unique security structure to re-
duce, not really kill, security and protection opportunities, and be bright enough to
adapt to changes in the new literature development and various organizational
conditions for application.
10 References
[1] Sharma N, Shamkuwar M, Singh I, The history, present and future with IoT, Balas V, Solanki V,
Kumar R, Khari M, Internet of Things and Big Data Analytics for Smart Generation, Intelligent
Systems Reference Library, 2019, vol 154, Springer, Cham, https://doi.org/10.1007/978-3-
030-04203-5_3
[2] Khanna A, Kaur S, Internet of things (IoT), applications and challenges: a comprehensive re-
view, Wireless Pers Commun, 114, 2020, 1687–1762, https://doi.org/10.1007/s11277-020-
07446-4
[3] Chang D, Chen Y, Chen L, Chao C, Internet of things and cloud computing for future internet,
Chang S, Kim T, Peng L, Security-Enriched Urban Computing and Smart Grid, Communications
in Computer and Information Science, 2011, vol 223, Springer, Berlin, Heidelberg,
https://doi.org/10.1007/978-3-642-23948-9_1
[4] Heena W, Rajni A, Fog computing with the integration of internet of things: architecture, appli-
cations and future directions, 2018, 987-994, 10.1109/BDCloud.2018.00144
[5] Adel A, Utilizing technologies of fog computing in educational IoT systems: privacy, security,
and agility perspective, J Big Data, 2020, 7, 99, https://doi.org/10.1186/s40537-020-00372-z
[6] Anand P, Hameed P, Won-Hwa H, Hyun S, Seungmin R, Fog computing-based IoT for health
monitoring system, Journal of Sensors, 2018, vol. 2018, Article
ID 1386470, 7 pages, https://doi.org/10.1155/2018/1386470
[7] Michele D, Koen T, Nicola D, Foundations and evolution of modern computing paradigms:
cloud, IoT, edge, and fog, IEEE Access, 2019, vol. 7, pp. 150936-150948, doi:
10.1109/ACCESS.2019.2947652
104 | I. Indrani, SVB Revanth, S. Akhil Durga, Sirisha Potluri, Sachi Nandan Mohanty
[8] Aazam M, Huh E, Fog computing and smart gateway based communication for cloud of things,
2014 International Conference on Future Internet of Things and Cloud, Barcelona, 2014, pp.
464-470, doi: 10.1109/FiCloud.2014.83
[9] Lee K, Kim D, Ha D, Rajput U, Oh H, On security and privacy issues of fog computing supported
internet of things environment, 2015 6th International Conference on the Network of the Future
(NOF), Montreal, QC, 2015, pp. 1-3, doi: 10.1109/NOF.2015.7333287
[10] Chen Y, Chang Y, Chen C, Lin Y, Chen J, Chang Y, Cloud-fog computing for information-centric
internet-of-things applications, 2017 International Conference on Applied System Innovation
(ICASI), Sapporo, 2017, pp. 637-640, doi: 10.1109/ICASI.2017.7988506
[11] Elazhary H, Internet of things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile
edge, and edge emerging computing paradigms: disambiguation and research directions,
Journal of Network and Computer Applications, 2019, Volume 128, Pages 105-140, ISSN 1084-
8045
[12] Potluri S, Achyuth S, Elham Y, Mohanty S N, IOT enabled cloud based healthcare system using
fog computing: a case study, Journal of Critical Reviews, ISSN- 2394-5125, 2020, Vol 7, Issue 6,
PP: 1068-1072, doi: 10.31838/jcr.07.06.186
[13] Xuan-Qui P, Eui-Nam H, Towards task scheduling in a cloud-fog computing system, 2016 18th
Asia-Pacific Network Operations and Management Symposium (APNOMS), Kanazawa, 2016,
pp. 1-4, doi: 10.1109/APNOMS.2016.7737240
[14] Potluri S, Subbarao K, Improved quality of service-based cloud service ranking and recommen-
dation model, TELKOMNIKA Telecommunication, Computing, Electronics and Control, 2020,
Vol. 18, No. 3, pp. 1252~1258, ISSN: 1693-6930, accredited First Grade by Kemenristekdikti,
Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i3.11915
[15] Potluri S, Subbarao K, A hybrid PSO based task selection and recommended system for cloud
data, Test Engineering and Management, 2020, Vol-83, ISSN: 0193-4120, PP: 10210 – 10217
[16] Potluri S, Subbarao K, Hybrid self-adaptive PSO and QoS based machine learning model for
cloud service data, International Journal of Control and Automation, 2020, Vol. 13, No. 2s, pp.
36 - 50, ISSN: 2005- 4297
[17] Binh M, Huynh T, Thanh B, Bao D, Evolutionary algorithms to optimize task scheduling problem
for the IoT based bag-of-tasks application in cloud–fog computing environment, Appl.
Sci, 2019, 9, 1730, https://doi.org/10.3390/app9091730
[18] Goiuri P, Iglesias-Urkia M, Barcelo M, Gomez R, Moran A, Bilbao J, Fog computing based effi-
cient IoT scheme for the industry 4.0, 2017 IEEE International Workshop of Electronics, Control,
Measurement, Signals and their Application to Mechatronics (ECMSM), Donostia-San Sebas-
tian, 2017, pp. 1-6, doi: 10.1109/ECMSM.2017.7945879
[19] Yi S, Qin Z, Li Q, Security and privacy issues of fog computing: a survey, Xu K, Zhu H, Wireless
Algorithms, Systems, and Applications, WASA 2015, Lecture Notes in Computer Science, 2015,
vol 9204. Springer, Cham, https://doi.org/10.1007/978-3-319-21837-3_67
[20] Alrawais A, Alhothaily A, Hu C, Cheng X, Fog computing for the internet of things: security and
privacy issues, IEEE Internet Computing, 2017, vol. 21, no. 2, pp. 34-42, doi:
10.1109/MIC.2017.37
Srikanth Pothuri
Marketing analytics as a Service: Secure
Cloud Based Automation Strategy
Abstract: Efficient marketing strategies for business to business marketing (content,
inbound, social media, SEO, SEM, account based, earned media, referral programs,
industry events, conversational and step ahead as resolutions) and business to
customer marketing (social network, paid media, internet, email, direct, point of
purchase, cause, conversational, earned media and storytelling) are greatly height-
ened by using cloud based marketing automation solutions. Cloud governance en-
sure to meet business desires and needs through professional practices. Significant
factors to ensure security in cloud marketing are embedded in each phase of market-
ing life cycle. Various cloud based secure marketing solutions are detailed and their
performance is compared and illustrated in this work. To meet next generation mar-
keting needs cloud based solutions are foremost preference for implementing effi-
cient marketing strategies.
1 Introduction
Cloud based efficient solutions in marketing, sales, promotion and CRM saves mon-
ey by converting capital expenses or capital expense (CapEx) into operating expens-
es or operating expenditure (OpEx). Flexibility, availability and ease of use features
of cloud based marketing automation suite provides public cloud services based on
pay as you use model to avoid investing on servers, storage devices and other com-
puting infrastructure. For storing sensitive data, maintaining greater flexibility,
security, privacy and control, the private cloud offers necessary business solutions.
Hybrid cloud aimed at combining public and private clouds to meet the business
objectives. To bring business groups or organizations together which are having
common business interest, concern or goal in order to share CapEx and OpEx and
observe reduced costs, community cloud is an abundant choice [1-3]. Various cate-
gories of clouds which are available to meet business objectives of diverse forms of
organizations is given in fig. 1.
||
Srikanth Pothuri, Research Scholar, ICFAI Business School, ICFAI University Dehradun, Dehradun,
Uttarakhand 248197, India, [email protected]
https://doi.org/10.1515/9783110732573-006
106 | Srikanth Pothuri
Public cloud
Converts CapEx to OpEx
Provides Pay as you use model
Allows several users
Private cloud
Control existing CapEx
Supports to redce OpEx
Limited to single tenant
Hybrid cloud
Combines public and private clouds
Supports to costs by manipulating CapEx and
OpEx
Business resource portability
Community cloud
Supports to costs by manipulating CapEx and
OpEx
Business resource portability
Bring business groups or organizations together
– Identify: Ask yourself -Who you are and what you are for 1
– SWOT: Examine yourself- What are your strengths, weaknesses, opportunities, limitations
– Target- Identify yourself- Who is your target market, their behaviour and needs
– Inspection- Examine yourself- Where your target and your contributions intersect
– USP- Create yourself- What is your unique selling point
– Refine- Review yourself- what is your feedback and corrective measures
SWOT
Identify
Examine yourself-
Ask yourself -Who
What are your
you are and what
strengths and
you are for
weaknesses
Refine
Target
Review yourself-
Identify yourself-
what is your
Who is your target
feedback and
market, their
corrective
behavior
measures
USP Inspection
Examine yourself-
Create yourself- Where your target
What is your and your
unique selling contributions
point intersect
Cloud governance lets your organization to bring everything together to satisfy vari-
ous business needs: business monitoring, recommendations, operations manage-
ment, cost transparency, cost optimization, scheduled policies, lead dashboard,
lead analytics, report generation, auditing, budget management, and security and
compliance governance. The major disciplines cloud governance are shown in
fig. 3.
Cost Management
To evaluate and monitor
Security baseline
To ensure security
Resource consistency
To ensure resource consistency
Identity baseline
To identify roles and
assignments
Development accelaration
To standardize processes
Legal protections
Data Assurance
Indemnification
Data management
Intellectual property
Data security
Limitation of liability
Ownership and usage rights
Warranties
Data conversion
Fig. 4: Significance factors ensuring security in cloud based marketing automation process
4.1 Reach
Reach includes building product awareness, media usage and visibility through mes-
saging, live chat, website visits, social media posts, advertising and mouth publicity.
It ensures maximizing the reach over time of the customer by creating several interac-
tions using different ways of paid, unpaid, owned, public and earned media networks
and touchpoints. This is to bring awareness of a particular brand or product.
4.2 Act
It is a short form of interact. With interest and intent, sales team get leads through
conversations, chat, booked calls, webinars, email marketing, list building and
Marketing analytics as a Service: Secure Cloud Based Automation Strategy | 111
Conversions
Consistent trust building content
Live chat
Lead magnets
Booked calls
Inbound SEO content
Webinars
Word of mouth referrals
Email marketing
List building
The marketing
lifecycle
Maintaining relationships
Quotes
Customer reviews
Samples
Launching new content
Previous positive customer review
Launching new products
sales
Continually and consistently building trust
4.3 Convert
This step ensures online or offline lead conversion to sale. It includes getting your
target audience and customers to take the next important step of payment through
online transaction, ecommerce or offline modes. This step uses product quotes,
product samples, previous positive customer reviews and sales information to en-
gage the customer.
4.4 Engage
This is a long-term commitment and engagement, evolving a long-term association
and relationship with initial and first-time product buyers to form customer loyalty
as recurrence and repeat product purchases. Engage is ensured by using communi-
cations on your web site, social network posts and active presence, email interac-
tions, direct communications and messaging. Loyalty of the customer is maintained
through healthy relationships, competent reviews, launching new products, con-
tinuous positive feedback and consistently building trust.
payments are extended via feedback, live chat, email, slack, phone and other online
or accessible processes.
use model (subscription based- monthly). Advantages of this software are mining for
better metrics for users unified reporting and comprehensive examination.
5.10 SendinBlue
SendinBlue is a cloud enabled email based marketing, advertising and promotion
tool suited for large, medium and small size organizations. It offers automation of
marketing advertising and sales, email promotions, log of transactional emails and
customized free range SMS messages functionalities within a package.
116 | Srikanth Pothuri
SendinBlue lets users to produce, schedule, automate or deliver mobile based re-
sponsive and dynamic emails using customization tools and APIs. This software has
rich customer communication management through introducing contacts, classifying
and grouping lists, collecting and designing forms, communicative forms and many
more. SendinBlue allows reporting, content management, e-commerce administra-
tion, exporting and importing results and responsive website management.
It has artificial intelligence powered sales assistant for strong customer rela-
tionship management, data indicators, dynamic statistics and well-organized inte-
gration to third parties such as Google Suite, WordPress API, MailChimp automation
tool, Evernote App and Unbounce.
Using this tool, users can gather and evaluate their email replies. The applica-
tion offers an efficient GUI support for graphical representations and demonstra-
tions of data and customer connections/communications in various formats. Mail-
Chimp lets users to plan, share and identify email newssheets and letters from any
location all over the world. This tool provides interactive user friendly drag & drop
graphical user interface, data analytics tools, customized report generation, mobile
based application support for Android and iOS, customer relationship management,
social media activity subscription, campaign management and ecommerce based
retail marketing. Pricing is based on periodic basis (say monthly and yearly) sub-
scriptions and payments are extended via feedback through email and live chat.
S.No Software Overall Ease of use Value for Customer Functional- Recommen-
rating money support ity dation
S.No Software Overall Ease of use Value for Customer Functional- Recommen-
rating money support ity dation
SEMrush
Wrike
Constant Contact
HubSpot Marketing Hub
MailChimp
AiHello
Omnisend
Zoho CRM
Routee
Freshworks CRM
SendinBlue
InTouch
SendX
Sender
Agile CRM
EngageBay
BetterMetrics
WebEngage
Bitrix24 Software
Adzooma
0 1 2 3 4 5
Comparison of the given cloud based marketing models on their overall rating and
recommendation label is given in fig. 7.
100%
80%
60%
40%
20%
0%
Overall rating Recommendation
Fig. 7: Comparison of the given cloud based marketing models based on their over-all rating and
recommendation
7 Conclusion
There are various other cloud based marketing tools such as Sap Marketing Cloud,
Lengow, Basis, ZoomInfo, Evocalize, Jilt, FIREBusinessPlatform, Promoboxx, Ad-
sale, Influx MD, MailOptin, Involve.me, FunnelMaker, Converttri, Privy, Oracle
Datamanagement Platform, SutiCRM, Automizy, Morph.ai, SlickText, Vitalblocks
CRM, Synerise, Goody, MoonMail, EmailDelivery.com, Tabrasa, TractionNext,
Whatagraph, Texting Base, TargetEveryone, SugarCRM, SendPulse, SalesSeek,
Skyword, Rejoiner, Pure360, Prisync, QZZR, Post Planner, Voogy, Mission Suite,
iSalesCRM, marketing Automation Professional, Marketing Automation Enterprise,
BOTNATION AI, Mailify, LeadByte, Blackbaud Luminate Online, Instapage, Inter-
com, Greenrope, Genoo, Higher Logic, FreshMail, EverString, Ecrion, Dialog Insight,
AutoManager, ConvergeHub, Contactually, Click2Mail, ConnectAndSell, ClickDi-
124 | Srikanth Pothuri
8 References
[1] Kirtiş K, Karahan F, To be or not to be in social media arena as the most cost-efficient market-
ing strategy after the global recession, Procedia - Social and Behavioral Sciences, 2011, Vol-
ume 24, Pages 260-268, ISSN 1877-0428, https://doi.org/10.1016/j.sbspro.2011.09.083
[2] Muliana M, Nek K, Azhari A, An overview of private preschool in malaysia: marketing strategies
and challenges, Procedia - Social and Behavioral Sciences, 2014, Volume 130, Pages 105-113,
ISSN 1877-0428, https://doi.org/10.1016/j.sbspro.2014.04.013
[3] Joseph J, Jeffery S, Mark R, Ramirez E, Martinez J, Green marketing strategies: an examination
of stakeholders and the opportunities they present, J. of the Acad. Mark. Sci, 2011, 39, 158–
174, https://doi.org/10.1007/s11747-010-0227-0
[4] Nancy W, Innovative marketing strategies in academic libraries: an overview, innovations in
the designing and marketing of information services, Jeyasekar J, Saravanan P, IGI Global,
2020, pp. 1-15. http://doi:10.4018/978-1-7998-1482-5.ch001
[5] John P, Steven M, Marketing strategies that make entrepreneurial firms recession-resistant,
Journal of Business Venturing, 1997, Volume 12, Issue 4, Pages 301-314, ISSN 0883-9026,
https://doi.org/10.1016/S0883-9026(97)89449-9
[6] Baena V, Online and mobile marketing strategies as drivers of brand love in sports teams:
findings from real madrid, International Journal of Sports Marketing and Sponsorship, 2016,
Vol. 17, No. 3, pp. 202-218, https://doi.org/10.1108/IJSMS-08-2016-015
[7] Aspelund A, Madsen K, Moen, A review of the foundation, international marketing strategies,
and performance of international new ventures, European Journal of Marketing, 2007, Vol. 41
No. 11/12, pp. 1423-1448, https://doi.org/10.1108/03090560710821242
[8] Gabrielsson P, Gabrielsson M, Seppälä T, Marketing strategies for foreign expansion of com-
panies originating in small and open economies: the consequences of strategic fit and perfor-
mance, Journal of International Marketing, 2012, 20(2), 25–48,
https://doi.org/10.1509/jim.11.0068
[9] Cacciolatti L, Hee S, Revisiting the relationship between marketing capabilities and firm per-
formance: the moderating role of market orientation, marketing strategy and organisational
power, Journal of Business Research, 2016, Volume 69, Issue 12, Pages 5597-5610, ISSN 0148-
2963, https://doi.org/10.1016/j.jbusres.2016.03.067
[10] Adjei M, Clark M, Relationship marketing in a B2C context: the moderating role of personality
traits, Journal of Retailing and Consumer Services, 2010, Volume 17, Issue 1, Pages 73-79, ISSN
0969-6989, https://doi.org/10.1016/j.jretconser.2009.10.001
Sachi Nandan Mohanty, Gouse Baig Mohammad, Sirisha Potluri,
P. Ramya, P. Lavanya
Next Generation Cloud Security: State of the
Art Machine Learning Model
Abstract: Recent days have seen an obvious shift in computing platforms and envi-
ronments with the arrival of cloud computing. Most of the organizations moving
towards cloud technology to satisfy varied user demands and requests, and to guard
and safeguard the transactions and operations of the organizations. Over the cloud
platforms, it is extremely essential to produce a secure and strong environmental
support to ensure security and privacy. Machine learning (ML) based models have
well-tried their significance to anticipate in finest outcomes to boost the choice of
cloud based long-term course of actions. Efficient machine learning models have
long been utilized in several application domains that required the identification
and prioritization of adverse factors for a threat. The main objective of this paper is
to propose a best strategic cloud security enhancement model for next generation
computing standards. Efficient machine learning algorithms like convolution neural
network gives automatic and responsive approaches to reinforce security in a cloud
environment. These models give solutions that incorporate holistic approaches for
secure enterprise knowledge throughout all the cloud applications.
||
Sachi Nandan Mohanty, Department of Computer Engineering, College of Engineering Pune,
Wellesley Rd, Shivajinagar, Pune, Maharashtra 411005, India, [email protected]
Gouse Baig Mohammad, Department of CSE, Vardhaman College of Engineering, Hyderabad,
Telangana 501218, India, [email protected]
Sirisha Potluri, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarpalli Road, Hyderabad, Telangana
501203, India, [email protected]
Ramya Reddy Padala, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarapalli Road, Hyderabad, Telangana
501203, India, [email protected]
Lavanya Reddy Padala, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarapalli Road, Hyderabad, Telangana
501203, India, [email protected]
https://doi.org/10.1515/9783110732573-007
126 | Sachi Nandan Mohanty, Gouse Baig Mohammad, Sirisha Potluri, P. Ramya, P. Lavanya
1 Introduction
1.1 Cloud computing
Cloud computing is a new distributed and computing technology using which we
can achieve enhancement in the use of virtualized resources. These virtualized re-
sources are designed for the service provisioning of the end users in the dynamic
cloud environment in order to provide reliable and trusted services to cloud users all
the time. The main advantage of cloud computing environment is that we can im-
prove and optimize the utilization of physical resources as much as possible. The
beauty of this technology mainly lies by applying abstraction and isolation of physi-
cal resources so as to reduce the requirement of the hardware equipment. To handle
the dynamic tasks which are highly based on the demand, the cloud computing is
making use of virtualization. Virtualization is the technology using which many
virtual machines for a given single physical resource/server can be created to han-
dle/execute the multiple tasks. Resource management plays an important and vital
role here because of this dynamic provisioning of the resources to handle the on
demand service requirement of the cloud computing environment. The main objec-
tives of the resource management are to maximize the utilization time of resources,
to reduce the task execution time, to achieve high system throughput and to im-
prove load balancing. In any cloud system architecture mainly there are three main
modules namely application (source for task submission), mapping algorithms (us-
es various algorithms to map the submitted tasks to physical resources) and virtual
machine. Using mapping algorithms a set of cloudlets are mapped to resources by
estimating the expected time of completion of cloudlets and then execute the cloud-
lets on selected resources [1-2].
– Lack of specialized skill personnel and expertise due to insufficiency and absence of domain 1
knowledge
– Limited support to accomplish information integration and attachment at enterprise level
– Increased deployment cost to achieve required computational power through infrastructure and
workforce
– Basic engineering, easy and medium complex problems are addressed by using open source
machine learning tools such as Tensor Flow, MXNet and CNTK. Whereas these models may not
give efficient solutions for the problems with greater complexity and convolution
data applications from one CSP to another CSP without much dependency involved
in it [21].
Machine learning
algorithms
In cloud computing and other environments, there are many similarities and differ-
ences in resource planning. The objective of scheduling is to achieve remarkable
difference in resource usage. In traditional and conventional resource mapping
scheduling, objects used are threads, jobs and tasks that pertain to the well-defined
well- grained mapping and scheduling of entity resources. The cloud scheduling
objects such as tasks and jobs are virtual machines (VM) belonging to the well-
grained mapping and scheduling. Google cloud is machine learning models to ob-
serve revolutionary changes in cloud resource management.
Training of machine learning model on your data ensures training of the machine
learning model, evaluating the accuracy of the model and tuning the hyper parame-
ters of the model. Subsequent to training, deploying of your model takes place. Lat-
er than for prediction requests, model uses online or batch prediction [29-32]. Moni-
toring systematic or ongoing predictions is a continuous process to evaluate the
performance of the machine learning model. The designed model has to be man-
aged for its successive versions or deliveries.
Machine learning is a data analytics approach that trains computers to do as
expected naturally similar to humans and natures: learn and get trained from the
experience. Machine learning approaches use computational techniques to “learn”
information directly from data without depend on a pre-programmed rules.
With the intensification in big data, machine learning has turn out to be a key
method for solving difficulties in areas, such as:
– Computational finance
– Image processing
– Computer vision
– Computational biology
– Energy production
– Automotive
– Aerospace
– Manufacturing
– Predictive maintenance
– Natural language processing
Machine
Building
learning
logical model
algorithm
Input past
Output
data Based on
Based on
learning
training
works for new
learns from
data
data
Training service
Prediction service
Notebooks
Data labelling
service
Machine learning algorithms identify natural patterns in the given data that create
insight and aid you make improved decisions, forecasts and predictions. They are
used every day to make critical decisions in medical analysis, stock trade-off, energy
load prediction, and more.
Training service allows us to train the models and prototypes using a wide collec-
tion of different customization choices. Selection of different machine types allows
us to power your training jobs, facilitate distributed training, practise using hyper
parameter tuning, and accelerate with graphics processing unit or tensor processing
unit.
3.2.3 Notebooks
Notebooks service allows us to create, manage and destroy virtual machine instanc-
es using virtual machine manager that are available in JupyterLab. These services
contains pre-installed packages such as deep learning, TensorFlow and PyTorch.
These instances are protected by google cloud authentication and they are easily
integrate with GitHub repository.
Data labelling service allows us to human labelling of dataset with text, image or
video for training designed machine learning model. These services provides all the
possible labels for the given dataset and instructions in what way these labels are
given.
Deep learning VM image allows us to choose from a set from set of images optimized
for data science and ML tasks.
Next Generation Cloud Security: State of the Art Machine Learning Model | 135
Using cloud console, we can manage and deploy loud models, versions and proto-
types. This tool acts like an interface to work with AI resources by using tools such
as cloud logging and cloud monitoring.
Using Gcloud command line gcloud ai-platform, we can manage AI models, proto-
types and versions to accomplish AI tasks at the command line. Gcloud commands
and REST API are used for online predictions in AI platform.
– Global work culture in employees: Employees can access the services and in-
formation from anywhere in the world through web based applications of
Google.
– Supports quick collaboration: Cloud users quickly access the data which is
available in the cloud due to high availability of the services.
– Enhanced security with skilled personnel: Google has and hires skilled person-
nel to ensure next generation security in cloud.
– Ratio of data stored in cloud and local computers: Fewer data get stored in local
devices to avoid vulnerability, whereas high amount of information and ser-
vices are made available through cloud platform.
– High availability and reliability of the services: Due to redundant data centres,
the data and services are made available to the cloud users with high availabil-
ity and reliability.
– On demand scalable access and control to users: Through powerful Google apps
users can have on demand scalable access and control over the services.
– Less expenditure and more gains: Google cloud based services allows users to
access to them with less expenditure.
Collect
Security data globally
from enterprise cloud
Cloud SIEM-
Respond rapidly and Security Detect threats using
initiate automatic information and machine learning
protection event approach
management
Investigate security
threats guided by
machine learning
appraoch
Google cloud storage offers persistent disk storage using virtual machines and vir-
tual machine manager interface on a pay per usage basis for every user. $HOME
directory is mounted to provide this storage with various files such as home directo-
ry, software, scripts and configuration files.
4.2.2 Authorization
Google cloud API makes use of command line tools with authorization using Au-
thorize Cloud Shell’s dialog.
When the cloud shell is initiated the project will be given to gcloud
configuration system for immediate use. By using environment variable
GOOGLE_CLOUD_PROJECT application default credentials of the library and active
project also will be set in console.
Latest images of cloud shell gets updated with loud software development kit,
Docker and required runtime utilities and libraries.
When you create user account you have all the privileges on the allocated virtual
machine and you can execute workloads on it.
Next Generation Cloud Security: State of the Art Machine Learning Model | 139
These available tools are pre-installed and additional tools can be installed on a
requirement basis. Additional tools which are installed on the virtual machine will
not persist after instance gets terminated.
Various languages namely Java, Go, Python, Node.js, Ruby, PHP and .Net provides
pre-installed language support.
Google cloud is using cloudshellsafemode=true in the URL to ensure safe mode and
fix security issues in the files
Microsoft azure is a web based cloud computing platform launched in 2010 and
provides various products such as Microsoft azure cognitive service, Microsoft azure
data bricks, Microsoft azure bot service, Microsoft azure cognitive search and Mi-
crosoft azure machine learning.
Code for machine learning algorithms such as linear regression, support vector
machine and Naive Bayes classification is given as below.
Listing 1: Code for machine learning algorithms such as linear regression, support vector machine
and Naive Bayes classification
#Linear regression
lin_regr = linear_model.LinearRegression()
lin_regr.fit(X_train, y_train)
print(lin_regr.coef_)
Next Generation Cloud Security: State of the Art Machine Learning Model | 141
print(lin_regr.score(X_test, y_test))
plt.style.use('fivethirtyeight')
plt.scatter(lin_regr.predict(X_train), lin_regr.predict(X_train) -
y_train, color = "yellow", s = 10, label = 'Training data')
plt.scatter(lin_regr.predict(X_test), lin_regr.predict(X_test) - y_test,
color = "pink", s = 10, label = 'Testing data')
plt.hlines(y = 0, xmin = 0, xmax = 100, linewidth = 5)
plt.legend(loc = 'upper right')
plt.title("Demo")
plt.show()
#Support vector machine
from sklearn import svm as s
from sklearn import metrics as m
s_class = s.SVC(kernel='linear')
s_class.fit(X_train, y_train)
y_pred = s_class.predict(X_test)
print(m.accuracy_score(y_test, y_pred))
print(m.precision_score(y_test, y_pred))
print(m.recall_score(y_test, y_pred))
#Naive Bayes Classification
import numpy as n
import pandas as p
from sklearn.naive_bayes import GaussianNB
from sklearn.metrics import confusion_matrix, accuracy_score
NB_class = GaussianNB()
NB_class.fit(X_train, y_train)
y_pred = NB_class.predict(X_test)
ac_sc = accuracy_score(y_test,y_pred)
cm_ma = confusion_matrix(y_test, y_pred)
6 Conclusion
Machine learning has currently become a part of our daily lives, and is a new tech-
nology endowed, to handle security and privacy problems that arise in cloud com-
puting. In recent years, in depth analysis was administered on the protection and
privacy problems of cloud computing. Therefore, security and privacy become terri-
bly essential and vital and are to be addressed. For future work, it’s essential for the
researchers to deeply investigate different science primitive’s solutions for security
attacks in cloud computing. A mixed protocol technique will scale back the compu-
tation overhead on the protection and privacy protective solutions. Moreover, cus-
142 | Sachi Nandan Mohanty, Gouse Baig Mohammad, Sirisha Potluri, P. Ramya, P. Lavanya
tomization of the privacy and security protocols for machine learning is additionally
a noteworthy and open analysis space to develop a viable resolution. Research is
looking forward to perform their analysis within various applications of machine
learning such as space of astronomy, natural philosophy, nucleonics, physical sci-
ence, magnetism, machines, technology, mechanics, electro hydrokinetics, signal
process, power, energy, bioinformatics, economy, and finance.
7 References
[1] Dillon T, Wu C, Chang E, Cloud Computing: issues and challenges, 2010 24th IEEE International
Conference on Advanced Information Networking and Applications, Perth, WA, Australia, 2010,
pp. 27-33, doi: 10.1109/AINA.2010.187
[2] Wang L, Laszewski V, Younge A, Cloud Computing: a perspective study, New Gener. Comput,
2010, 28, 137–146, https://doi.org/10.1007/s00354-008-0081-5
[3] Naveen G, Ayushi G, Survey on machine learning based scheduling in cloud computing, Pro-
ceedings of the 2017 International Conference on Intelligent Systems, Metaheuristics & Swarm
Intelligence, Association for Computing Machinery, New York, NY, USA, 2017, 57–61,
DOI:https://doi.org/10.1145/3059336.3059352
[4] Umer A, Muhammad M, Shah S, Amin R, Shaukat W, Syed R, Suh Y, Piran J, A review of machine
learning algorithms for cloud computing security, Electronics, 9, 2020, no. 9: 1379,
https://doi.org/10.3390/electronics9091379
[5] Subramanian K, Tamilselvan L, A focus on future cloud: machine learning-based cloud securi-
ty, SOCA, 2019, 13, 237–249, https://doi.org/10.1007/s11761-019-00270-0
[6] Bhamare D, Salman T, Samaka M, Erbad A, Jain R, Feasibility of supervised machine learning
for cloud security, 2016 International Conference on Information Science and Security (ICISS),
Pattaya, Thailand, 2016, pp. 1-5, doi: 10.1109/ICISSEC.2016.7885853
[7] Nassif A, Talib M, Nasir Q, Albadani H, Dakalbab F, Machine learning for cloud security: a
systematic review, IEEE Access, 2021, vol. 9, pp. 20717-20735, doi:
10.1109/ACCESS.2021.3054129
[8] Han Q, Meikang Q, Zhihui L, Selective encryption on ECG data in body sensor network based on
supervised machine learning, Information Fusion, 2020, Volume 55, Pages 59-67, ISSN 1566-
2535, https://doi.org/10.1016/j.inffus.2019.07.012
[9] Potluri S, Mangla M, Satpathy S, Mohanty S N, Detection and prevention mechanisms for DDoS
attack in cloud computing environment, 2020 11th International Conference on Computing,
Communication and Networking Technologies (ICCCNT), Kharagpur, India, 2020, pp. 1-6, doi:
10.1109/ICCCNT49239.2020.9225396
[10] Karimipour H, Dehghantanha A, Parizi R, Choo K, Leung H, A deep and scalable unsupervised
machine learning system for cyber-attack detection in large-scale smart grids, IEEE Access,
2019, vol. 7, pp. 80778-80788, doi: 10.1109/ACCESS.2019.2920326
[11] Wu W, Alvarez J, Liu C, et al., Bot detection using unsupervised machine learning, Mi-
crosystTechnol, 2018, 24, 209–217, https://doi.org/10.1007/s00542-016-3237-0
[12] Çavuşoğlu Ü, A new hybrid approach for intrusion detection using machine learning meth-
ods, ApplIntell, 2019, 49, 2735–2761, https://doi.org/10.1007/s10489-018-01408-x
[13] Potluri S, Achyuth S, Elham T, Mohanty S N, IOT enabled cloud based healthcare system using
fog computing: a case study, Journal of Critical Reviews ISSN- 2394-5125, 2020, Vol 7, Issue 6,
PP: 1068-1072, doi: 10.31838/jcr.07.06.186
Next Generation Cloud Security: State of the Art Machine Learning Model | 143
[30] Chiba Z, Abghour N, Moussaid K, Amina E, Mohamed R, Intelligent approach to build a deep
neural network based IDS for cloud environment using combination of machine learning algo-
rithms, Computers & Security, 2019, Volume 86, Pages 291-317, ISSN 0167-4048,
https://doi.org/10.1016/j.cose.2019.06.013
[31] Bhamare D, Salman T, Samaka M, Erbad A, Jain R, Feasibility of supervised machine learning
for cloud security, 2016 International Conference on Information Science and Security (ICISS),
Pattaya, Thailand, 2016, pp. 1-5, doi: 10.1109/ICISSEC.2016.7885853
[32] Gulenko A, Wallschläger M, Schmidt F, Kao O, Liu F, Evaluating machine learning algorithms for
anomaly detection in clouds, 2016 IEEE International Conference on Big Data (Big Data), Wash-
ington, DC, USA, 2016, pp. 2716-2721, doi: 10.1109/BigData.2016.7840917
Sirisha Potluri, Gouse B. Mohammad, Sachi Nandan Mohanty, M.
Vaishnavi, K. Sahaja
Secure Intelligent Framework for VANET: Cloud
Based Transportation Model
Abstract: Vehicular cloud computing has a prodigious impact on information tech-
nology solutions. According to VCC the unexploited computing resources are park-
ing vehicles, vehicles stuck in congestion, parked cars in any place. VCC architec-
ture has three layers. Some of the developments that are taking place in the
automobile industry for the last few decades have been very interesting and resolu-
tion driven. A lot of safety applications, convenience and commercial applications
are proposed for the VANET’s by researchers and by the US department of transpor-
tation. The vehicles connect together through a network to form a vehicular cloud
which will offer space for storing, computing resources, sensor readings as an on-
demand service to clients. Traffic is becoming a daily and even growing phenome-
non which spoils the valuable time, fitness and energy of human. There is a need of
efficient computational, supervising and guiding solutions for the citizens to make
them to get rid of traffic related issues and problems. Finding an appropriate park-
ing lot within the area on the brink of university, shopping complex, or a commer-
cial complex in big and medium cities would enjoy the assistance of an automatic
parking management utility.
||
Sirisha Potluri, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI Foundation
for Higher Education, Donthanapally, Shankarpalli Road, Hyderabad, Telangana 501203, India,
[email protected]
Gouse Baig Mohammad, Department of CSE, Vardhaman College of Engineering, Hyderabad,
Telangana 501218, India, [email protected]
Sachi Nandan Mohanty, Department of Computer Engineering, College of Engineering Pune,
Wellesley Rd, Shivajinagar, Pune, Maharashtra 411005, India, [email protected]
M. Vaishnavi, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI Foundation
for Higher Education, Donthanapally, Shankarapalli Road, Hyderabad, Telangana 501203, India,
[email protected]
K. Sahaja, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI Foundation for
Higher Education, Donthanapally, Shankarapalli Road, Hyderabad, Telangana 501203, India,
[email protected]
https://doi.org/10.1515/9783110732573-008
146 | Sirisha Potluri, Gouse B. Mohammad, Sachi Nandan Mohanty, M. Vaishnavi, K. Sahaja
1 Introduction to VANET
Some of the developments that are taking place in the automobile industry for the
last few decades have been very interesting. Vehicles today are considerably more
fuel-efficient than they were before. Even in today’s time the vehicles are prone to
accidents due to mist, smoke, dust and various other death-traps on the road but
above all of that they are much more vulnerable to accidents that are taking place
due to human errors.
However much of these fatal human errors are about to reduce because the au-
tomobile industry can been working vigorously for many year to put different kinds
of sensors in the cars and connect them to an on-board computer system. With the
development in the technology telecommunications and broadcastings has now
become potential to connect vehicles to each other through wireless technologies to
enable them to interconnect and work together. Autonomous vehicles are being
supported by the governments in this present age.
A lot of funding is provided for research on driver-less cars from various gov-
ernments especially from UK. This funding is bringing about the merging of various
companies together which not only include the companies from automobile sector
but also from information technology, telecommunications to work together.
Many car manufacturers such as Ford, Hyundai, and Tata etc. have released ap-
plication development for their platforms by making their application program in-
terface- API available to other developers. The developers submit their apps and
approve them before making them available for download. The long term evolution-
LTE connectivity ensues to serve and improve the in-vehicle presentation services
by providing entrance and access to high-speed internet, streaming movies, naviga-
tion control, music applications, and live television and so on. The other feature is
commercial and profitable which offers location-based services and ads to the vehi-
cle travellers. The LTE connectivity helps in bringing the internet not only to the
vehicle but also makes the vehicle a part of the internet paving the way for the ve-
hicular ad hoc networks (VANETs).
The true future prospective of the connected vehicle can only be realized when
vehicles are interconnected to each other. This network that is formed by the inter-
connection of vehicles is referred to as VANET. This shift in vehicular technology
will bring about a new era of innovation and will open a huge range of application
areas that can help in improving road safety and reducing accidents on roads.
VANETs are considered to be significant because of their huge potential and
several applications that are being made accessible. VANETs not only offer strong
safety enhancements but also provide a lot of commercial openings and opportuni-
ties. Wireless access in the vehicular environment (WAVE) delivers the basic radio
standard for dedicated short range communication (DSRC) in VANETs.
Secure Intelligent Framework for VANET: Cloud Based Transportation Model | 147
Vehicles use DSRC radios to connect and communicate with each other in two
ways namely vehicle-to-vehicle communication (V2V) and vehicle-to-infrastructure
communication (V2I). The communication range of dedicated short range commu-
nication lies in the range between 300 to 1000 m. With the addition of 4G/LTE con-
nectivity in vehicles it has become obvious that connected and networked vehicles
have the facility to share data by means of the cloud. The gains of using cloud in
connected vehicles are enormous as the opportunities for using applications are
virtually limitless.
DSRC identifies one main type of message which is called as the basic safety
message (BSM) that a vehicle communicates and transmits every 100 milli seconds.
In basic safety message the vehicles broadcast the details of their location, speed,
acceleration, and several other useful parameters which can help other vehicles in
avoiding collisions and generate warnings for having improved safety measures.
These messages also help the vehicles and auto mobiles in maintaining the list of
their neighbours.
The navigation systems has been made available but the exact real-time loca-
tion information of other vehicles is not yet available. This is an area in the future
that can enable the driver to drive safely on roads even if there is nil visibility or
when the driver is not capable to drive the vehicle. Therefore, the vision is to gener-
ate a mutual understanding among all vehicles on the road that can lead to driver-
less cars.
All the vehicles can be programmed and automated by using software to trans-
mit and share their location and other related important information whenever they
observe an unexpected change in speed or position while driving. However, the
bandwidth in DSRC is quite limited, so when the vehicles try to transmit their loca-
tion or position and speed information there is a possibility of having a jammed
channel. The DSRC and 4G/LTE connectivity in vehicles can support each other and
answer the bandwidth problem to give great quality, consistent, reliable, and secure
information to VANET users [1-5].
2 Constraints of Cloud
Cloud computing offers on demand services to the customers using efficient re-
source usage and allocation based policies and protocols by matching with the ser-
vice level agreement. Service level agreement commonly includes various segments
like measuring the performance, managing the problems, customer satisfaction,
recovery from failures and finally termination of the agreement. SLA’s are consist-
ently checked and validated using which it creates a better communication channel
between consumer and the provider. SLA establishes the Quality of Service (QoS)
agreement between service-based system providers and users. With a violation of
148 | Sirisha Potluri, Gouse B. Mohammad, Sachi Nandan Mohanty, M. Vaishnavi, K. Sahaja
SLA, the provider must pay penalties. Continuous performance check is required in
order to ensure that these CSPs are providing services as mentioned in SLAs. SLA is
consistently met, these agreements are frequently designed with specific lines of
demarcation and the parties involved are required to meet regularly to create an
open forum for communication. Cloud computing is using collection of resources
and all these are supported by the interface and infrastructure concept of distribut-
ed and cloud computing environment. Service level agreement can be viewed as a
document between customer and provider and is mainly based on services and not
on customers [6-10].
3 Applications of VANET
A lot of safety applications, convenience, business and commercial applications are
proposed for the VANET’s by researchers and by the US department of transporta-
tion. Some of these applications are discussed briefly below. With numerous vehi-
cles on the roads having such as lot of computing power and sensors, it’s apparent
and logical to utilize all this data to make a highly mobile unplanned networks [11].
Some of the applications that are recommended for VANETs are as follows.
Some of the safety precautions might also include warning messages that are given
to drivers in order to inform them about approach of any emergency vehicles.
The connected and networked vehicles can play a really important role in situations
such as power disruption and network breakdown as they need on-board batteries
and lots of sensors including cameras which provide valuable images and SOS calls.
Furthermore, the driving force may have to form life-saving decisions that are sup-
ported by the knowledge received such as hand brake light, onward collision warn-
ing. It is therefore extremely important that the privacy, security, reliability, and
integrity of the messages are ensured and safeguarded in order that actions are
taken immediately after the knowledge is received.
Traffic
information
Broadcasting Weather
utilities information
Infotainment
Toll collection
services
Data storage
Vehicular cloud
Data storage
Secured
confidential Computing
information and resources
systems
Privately shared
virtualized Hotspot
resources
5 Autonomous/Self-Governing Vehicle
The autonomous or self-governing vehicle may be a certainty today through Google
car and it’s only logical to mention that the technology and expertise will improve
further and decrease in cost to become a feature within the near future. However,
Secure Intelligent Framework for VANET: Cloud Based Transportation Model | 153
it’ll take a while for it to develop a driver-less feature on a massive scale. Also, it’s
possible that very similar to control, this might become a feature that would be sim-
ulated and activated on the motorway or highway. Autonomous vehicles would
wish almost no input from the driving force. This is able to be possible with tons of
hardware like sensors, cameras, radars, locators and laser illuminated detection and
ranging (LIDAR) to sense approaching obstacles and hurdles. Image processing
practices are applied to pictures from the cameras to acknowledge, classify and
identify the various shapes and features. This permits the vehicle to sense the up-
coming hurdle or obstacle and spontaneously apply breaks or reduce speed far more
rapidly than the driving force would ever be ready to. The utilization of those and
other technologies therefore safeguards that human errors are often abridged to an
outsized extent and, as an outcome, roads are regularly made much safer. This is
able to enable the driving force to be more dynamic by doing something like read-
ing, evaluating and browsing on the web or making a call.
Autonomous vehicles aren’t only an opportunity but an essential for safe motor-
ing. Subsequent step in autonomous or self-governing vehicles is vehicle swarm [15].
6 Vehicle Platoon/Swarm
Travelling at great speeds take along more problems however, these problems are
often abridged if the vehicles form a gaggle then travel during the creation on high-
ways and motorways. This may have two benefits:
– Vehicles are synchronized and corresponded (i.e., vehicles travel during a line
and maintain a hard and fast distance from one another and therefore the vehi-
cle ahead informs the cars behind if they ought to reduce speed or change lanes
beforehand , then all of them can roll in the hay in tandem)
– The randomness within the immediate neighbourhood of the vehicles is re-
duced, which makes things much simpler and harmless.
Safe road trains for the environment (SARTRE) is an EU-endow more than 6 million
dollar project that has exhibit this idea together with Volvo, Ricardo and among
others. The purpose of the SARTRE development was to develop a road train or pla-
toon conception in vehicle traffic where a lead vehicle driven by well-informed driv-
er takes control of a platoon of vehicles that enter a semi-independent state. The
SARTRE project established successfully that vehicle platoons aren’t only safe but
are often very efficient in reducing congestion and improving safety. The vehicle
swarm are often imaginary by thinking of the motorway/highway as a conveyer belt,
but where a conveyer belt moves with a continuing steady speed, a gaggle of vehi-
cles on the auto route can move with any set sustained speed. This will be probable
by agreeing like-minded vehicles, i.e., vehicles that shall travel at roughly an equiv-
154 | Sirisha Potluri, Gouse B. Mohammad, Sachi Nandan Mohanty, M. Vaishnavi, K. Sahaja
alent speed, to team and form groups or a “vehicle swarm”. Ricardo, a British engi-
neering firm convoluted within the SARTRE project, considers that vehicle platoon-
ing is feasible with fully autonomous or self-governing vehicles [16].
covering the incomplete point of the planet and therefore the need for accessing
internet. The vehicles that form the VC during a specific area will accomplish real
time data of accessible parking spaces and initiate drivers to the most appropriate
position [19].
8 Characteristics of VANET
The characteristics of VANETs consist of high mobility and regular change in topol-
ogy. Some of the characteristics of VANETs are discussed below:
large amount of vehicles on the road can also lead to the regular disconnection in
the service.
of faulty and unpredicted conditions. This feature of availability has become ex-
tremely prone to some of the dangerous attacks as compared to some of the other
security services that are available. Hence a lot of trust-based and cryptography
practices can be used to secure the VANETs from these outbreaks.
In this type of attack attacker may use false certificates and keys of the other users
as an evidence of authentication without getting tracked. The main purpose of such
a type of attack is to create confusion and make it harder to identify the malicious
vehicle.
This type of attack finds the confidential and personal information when a non-
registered vehicle uses a valid and legal certificate to collect all of the valuable in-
formation of the vehicles such as user ID, vehicle location etc.
This is one of the most common outbreaks in VANETs, the attack occurs when the
fraudulent vehicle directs multiple messages which blocks all potential ways of
communication. The outbreak can be accomplished by many attackers simultane-
ously.
160 | Sirisha Potluri, Gouse B. Mohammad, Sachi Nandan Mohanty, M. Vaishnavi, K. Sahaja
Jamming attack is one of the unsafe attacks in VANETs security applications and it
takes place when one of the suspected vehicle tries to interrupt the streaming com-
munication through various kinds of techniques such as taking in heavy power with
equal frequency choice and alert injection.
It occurs when a large number of unreliable vehicles are located in the same zone or
they try to move forward together with the purpose of causing some kind of trouble
and removing reliable nodes from the network operation that are restricted for using
similar kind of bandwidth.
This kind of attack takes place when a reliable vehicle enters into a malicious node
and starts in sending fake messages by the node.
Data is received from the antenna and some of the information is collected from the
sensor and passed onto the hardware components.it helps in creation of warning
messages of the road conditions which help in creation of an illusion of the vehicles
that are nearby.
This type of attack takes place when an unreliable vehicles tries to create a fake
message or duplicate the same message or try to create a new type of message by
passing in some malicious information and modifying the original message in the
network and acts as master node in the inter vehicle communication network.
Secure Intelligent Framework for VANET: Cloud Based Transportation Model | 161
The security and privacy concerns within the VCC need care from the researchers to
develop a strong algorithm which might be ready to stop VCC from different sorts of
security threats.
12.1.1 Confidentiality
It certifies that the main data should not be reveal to the outside nodes.
12.1.2 Integrity
It certifies that message should be valid and the contents of the message are not
adjusted during communication process.
12.1.3 Availability
Whenever the vehicle requires some data resources they must be available.
12.1.4 Authentication
12.1.5 Privacy
The vehicles or passengers will be protected from the attackers by the sensitive and
confidential information.
It is a usual attack on vehicular cloud, these attacks happens to make the services
unavailable to other cloud users.
In this attack the registered user identity and security credentials will be misused by
evil user.
This attack happens when the attacker alters the previous messages data to be
transmitted. For instance, if the route is crowded, the attacker modifies the data to
empty the road which can affect the users to change their driving paths.
In the absence of data privacy this attack takes place by acquiring the useful data of
the system.
The other vehicular behaviour will get manipulated by these attackers and the vehi-
cle thinks that the information is transmitting from other vehicles. Thus they feel
that there is a crowding on the road, so they impose vehicles to change their way
and leave the road clear.
Vehicular cloud computing security and privacy related concepts are represent-
ed in fig. 4.
might essentially be beneficial for the user, e.g., insurance enterprises might offer to
measure back the insurance premiums if such details are shared. There are often simi-
lar reasons from other service providers to use vehicle sensor data communally for a
few rewards which will actually encourage contribution from the consumers.
Security
issues
Sybil attack Integrity
Information Confidentiality
disclosure
Identify
Privacy
spoofing
Denial of Authentication
service
Threats
authorities, i.e., the vehicle registration authority and therefore the driver license
authority. Each of the two authorities concerns the user token and secret keys which
are then working by the user to get their pseudonym. Therefore, even though the
passkey is compromised, the tokens can only be traced by the two authorities and
no individual authority can disclose truth uniqueness of the user. The performance
of the scheme is enhanced through conditional privacy preservation (ECPP) and
pseudonymous authentication-based conditional privacy (PACP).
Python code for anomaly detection- road condition is given in the following
code listing.
Listing 1: Python code for anomaly detection- road condition to avoid accidents
14 Conclusion
According to our report We conclude that the VANETs becomes very fashionable with-
in the traffic management system, which aims to make sure the security of human
lives on the road and supply comfort to travellers by broadcasting safety messages
among vehicles. As these safety messages are transmit in an open-approach environ-
ment that creates VANETs more permitting to the attacks, a strong security algorithm
must be designed for set about security threats and attacks which could make sure the
secure transmission within the VANETs and VCC.
In this report, we first present the introduction of the VANETs and its applications.
Then, about the VANET and clouds in that we described briefly about VANET within
cloud, vehicular cloud, Private cloud and autonomous vehicle. Second, we’ve dis-
cussed about the vehicle platoon/swarm and then the applications of vehicular cloud
computing. Third, we’ve discussed the VANET characteristics explained followed by
the safety and privacy problems with the VCC intimately. Finally, we’ve presented
some issues associated with VANETs and VCC that are considered as open research
challenges during a vehicular network.
The research management for VANETs basis on the safety and privacy issues like
trust model and cryptography-based technique to validate safety messages. Based on
these techniques, researchers could design a strong security system, which may be
ready to prevent VANETs from different sorts of security threats and attacks. In addi-
tion to VANETs, the VCC residue within the starting stage and expected to supply an
ideal solution to guard the network from different type of threats and improve the
organization of the traffic management system. In our opinion, supported the prevail-
ing VCC procedures, architectures, and practices, an improved algorithm might be
designed to scale back the trust and privacy issues in VCC.
168 | Sirisha Potluri, Gouse B. Mohammad, Sachi Nandan Mohanty, M. Vaishnavi, K. Sahaja
15 References
[1] Coady Y, Hohlfeld O, Kempf J, McGeer R, Schmid S, Distributed cloud computing: applications,
Status Quo, and Challenges, SIGCOMM Comput. Commun. Rev, 2015, 45, 2, 38–43,
DOI:https://doi.org/10.1145/2766330.2766337
[2] Kliazovich D, Arzo S, Granelli F, Bouvry P, Samee U, e-STAB: Energy-efficient scheduling for
cloud computing applications with traffic load balancing, 2013 IEEE International Conference
on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical
and Social Computing, Beijing, China, 2013, pp. 7-13, doi: 10.1109/GreenCom-iThings-
CPSCom.2013.28.
[3] Nayak J, Naik B, Jena A, Barik R, Das H, Nature inspired optimizations in cloud computing:
applications and challenges, Mishra B, Das H, Dehuri S, Jagadev A, Cloud Computing for Opti-
mization: Foundations, Applications, and Challenges, Studies in Big Data, 2018, vol 39,
Springer, Cham, https://doi.org/10.1007/978-3-319-73676-1_1
[4] Bahga A, Madisetti V, Synthetic workload generation for cloud computing applications, Journal
of Software Engineering and Applications, 2011, Vol. 4 No. 7, pp. 396-410,
doi: 10.4236/jsea.2011.47046
[5] Heap-Yih C, John W, Xiangyu W, An explanatory case study on cloud computing applications in
the built environment, Automation in Construction, 204, Volume 44, Pages 152-162, ISSN
0926- 805, https://doi.org/10.1016/j.autcon.2014.04.010
[6] Potluri S, Subbarao K, Quality of Service based task scheduling algorithms in cloud computing,
International Journal of Electrical and Computer Engineering, 2017, Vol. 7, No. 2, PP: 1088-1095
[7] Potluri S, Subbarao K, Improved quality of service-based cloud service ranking and recom-
mendation model, TELKOMNIKA Telecommunication, Computing, Electronics and Control,
2020, Vol. 18, No. 3, pp. 1252~1258 ISSN: 1693-6930, accredited First Grade by Kemen-
ristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i3.11915
[8] Potluri S, Subbarao K, A hybrid PSO based task selection and recommended system for cloud
data, test engineering and management, 2020, Vol-83, ISSN: 0193-4120 PP: 10210 – 10217
[9] Potluri S, Subbarao K, hybrid self-adaptive PSO and QoS based machine learning model for
cloud service data, International Journal of Control and Automation, 2020, Vol. 13, No. 2s, pp.
36 - 50, ISSN: 2005- 4297
[10] Potluri S, Subbarao K, Optimization model for QoS based Task scheduling in cloud computing
environment, International Journal of Electrical, Electronics and Computer Systems, 2020, Vol.
18 , No 2, pp. 1081-1088, ISSN: 2502-4752, DOI: 10.11591/ijeecs.v18.i2.pp1081-1088
[11] Whaiduzzaman M, Sookhak M, Abdullah G, Buyya R, A survey on vehicular cloud computing,
Journal of Network and Computer Applications, 2014, Volume 40, Pages 325-344, ISSN 1084-
8045, https://doi.org/10.1016/j.jnca.2013.08.004
[12] Qin Y, Huang D, Zhang X, VehiCloud: Cloud computing facilitating routing in vehicular net-
works, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and
Communications, Liverpool, UK, 2012, pp. 1438-1445, doi: 10.1109/TrustCom.2012.16
[13] Jiau M, Huang S, Hwang J, Vasilakos A, Multimedia services in cloud-based vehicular networks,
IEEE Intelligent Transportation Systems Magazine, 2015, vol. 7, no. 3, pp. 62-79, doi:
10.1109/MITS.2015.2417974
[14] Bitam S, Mellouk A, Zeadally S, VANET-cloud: a generic cloud computing model for vehicular
Ad Hoc networks, IEEE Wireless Communications, 2015, vol. 22, no. 1, pp. 96-102, doi:
10.1109/MWC.2015.7054724
Secure Intelligent Framework for VANET: Cloud Based Transportation Model | 169
[15] Zhao J, Li Q, Gong Y, Zhang K, Computation offloading and resource allocation for cloud assist-
ed mobile edge computing in vehicular networks, IEEE Transactions on Vehicular Technology,
2019, vol. 68, no. 8, pp. 7944-7956, Aug. 2019, doi: 10.1109/TVT.2019.2917890
[16] Euisin L, Eun-Kyu L, Mario G, Soon Y, Vehicular cloud networking: architecture and design
principles, IEEE Communications Magazine, 2014, vol. 52, no. 2, pp. 148-155, doi:
10.1109/MCOM.2014.6736756
[17] Alazawi Z, Altowaijri S, Mehmood R, Abdljabar M, Intelligent disaster management system
based on cloud-enabled vehicular networks, 2011 11th International Conference on ITS Tele-
communications, St. Petersburg, Russia, 2011, pp. 361-368, doi: 10.1109/ITST.2011.6060083
[18] Yu R, Zhang Y, Gjessing S, Xia W, Yang K, Toward cloud-based vehicular networks with efficient
resource management, IEEE Network, 2013, vol. 27, no. 5, pp. 48-55, doi:
10.1109/MNET.2013.6616115
[19] Hassan A, Luong T, Jin W, Sungyoung L, Saad Q, V-Cloud: vehicular cyber-physical systems and
cloud computing, In Proceedings of the 4th International Symposium on Applied Sciences in
Biomedical and Communication Technologies, Association for Computing Machinery, New
York, NY, USA,2011, Article 165, 1–5, DOI:https://doi.org/10.1145/2093698.2093863
Sirisha Potluri, Sachi Nandan Mohanty, A. D. Sriram Kumar, D.
Maheswari, B. Rahini
Cloud Manufacturing Service: A Secure and
Protected Communication System
Abstract: Cloud computing is the one of the most important technology in the cur-
rent world and it has the high ability to reduce the cost. Cloud computing allows
cloud users to put their information, data and requests on the cloud service provides
like Azure, Amazon AWS and Google suit. Cloud provides computing software like a
development platform where you can create or develop your own applications. The
cloud consumers can use all these resources provided by cloud service provider
from anywhere in the world through the internet facility. Using the cloud there are
many advantages, and also many security challenges for the organizations regard-
ing cloud based data storage solutions. Cloud manufacturing is a novel manufactur-
ing architype developed from prevailing innovative manufacturing prototypes and
enterprise level information expertise under the provision of cloud computing, IoT,
virtualization technology and service oriented computing, and cutting-edge compu-
ting technologies and expertise. Manufacturing as a service is an advanced manu-
facturing architype developed from the existing cutting-edge manufacturing models
such as ASP, AM, NM and MGrid. This work is to study and discuss about security
and privacy issues and solutions in cloud based manufacturing.
||
Sirisha Potluri, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI Foundation
for Higher Education, Donthanapally, Shankarpalli Road, Hyderabad, Telangana 501203, India,
[email protected]
Sachi Nandan Mohanty, Department of Computer Engineering, College of Engineering Pune,
Wellesley Rd, Shivajinagar, Pune, Maharashtra 411005, India, [email protected]
A. D. Sriram Kumar, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI
Foundation for Higher Education, Donthanapally, Shankarpalli Road, Hyderabad, Telangana
501203, India, [email protected]
D. Maheswari, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI Foundation
for Higher Education, Donthanapally, Shankarpalli Road, Hyderabad, Telangana 501203, India,
[email protected]
B. Rahini, Department of CSE, IcfaiTech (Faculty of Science and Technology), ICFAI Foundation for
Higher Education, Donthanapally, Shankarpalli Road, Hyderabad, Telangana 501203, India,
[email protected]
https://doi.org/10.1515/9783110732573-009
172 | Sirisha Potluri, Sachi Nandan Mohanty, A. D. Sriram Kumar, D. Maheswari, B. Rahini
1 Introduction
Cloud computing is a great blessing for the very fast grow in the world of infor-
mation technology. Cloud computing is delivering the required and on demand
resources for their customers through the internet such as data storage, servers,
data bases, networking and software. It is a sophisticated architecture which stores
the data on remote servers and it can be accessed through the internet. Cloud based
storage allows us to store all the data in a safe and secure way and we can access it
whenever we required from anywhere just through the internet. Cloud computing
uses the payment option namely pay as you go basis means pay for what you use.
Many cloud providers in the marketplace namely Amazon web services, Google
cloud platform and Azure are effectively providing on demand resources to the
cloud consumers.
The computing resources are pooled together by the cloud service provider over
the infrastructure and the same can be provisioned to the users when they need
them. The cloud users or consumers will be charged and billed only for what they
have used or consumed from the cloud. Significant advantages of the cloud compu-
ting includes enhanced privacy, improved security, reduced costs, agility based
development, location transparency, extremely scalable, easy maintenance, device
independence, high performance, flexible and increase in productivity. To safe-
guard the data and information which is stored by the cloud service providers integ-
rity, availability and confidentiality is maintained by them.
Cloud manufacturing is also known as a novel manufacturing architype that is
developed from an existing and cutting-edge manufacturing models. The idea of
cloud manufacturing was originally recommended by a research group that was
headed by Prof. Bo Hu Li and Prof. Lin Zhang from China in the year 2009. After that
good amount of related research and discussions are being conducted and some
similar definitions to cloud manufacturing were introduced [1-5].
SaaS- Software as a service makes use of all the software services through the
internet, they are like paid and use purpose. By using this SaaS, we do not need to
install any other kind of software applications on your computer. All these software
applications are available on the cloud and we can access them through the internet
when you require them.
PaaS- Platform as a service is one of the cloud computing service which uses vir-
tualization technology for the development platform for the cloud users and the
organizations. This platform is also include the memory, databases, computing,
storage, and also some other application development services. PaaS is mostly use-
ful for the environment for developing and the testing the applications. The main
advantages of this platform as a service is that it has no need to purchase hardware,
no need to spend more time, it will be speed up your applications, any person can
just login and use the applications from anywhere, and has high security for the
data being stored in it and no need to worry for the data loss [6-9].
Software as a service
Platform as a service
Infrastructure as a
service
Private cloud
Community cloud
Fabricated
metal
products
Electronics Automobile
Housing,
Heavy building
machines and
Applications of
furniture
cloud
manufacturing
Plastic and
rubber Textiles
products
Trans- Semicon-
portation ductors and
system computers
5.1 Scalability
Cloud centred software is a pay-as-you-go system, it means that during the demanding
times of the day/month/year the number of subscriptions that are used can be in-
creased. This helps to optimize the expenditures and keeps the spending predictable.
176 | Sirisha Potluri, Sachi Nandan Mohanty, A. D. Sriram Kumar, D. Maheswari, B. Rahini
5.3 Standardization
Standardization improves the consistency of the resource utilization and usage by
streamlining the business practices and creation of standardization across the entire
operation.
5.5 Agility
Due to agility entire manufacturing process involves less operational cost by using
cloud manufacturing model.
Cloud computing system can be divided into three categories according to man-
ufacturing resources are follows:
– Service oriented and adapted input
– Operating and working platform of the manufacturing resource
– Service oriented and adapted output
There are three categories of key stake holders in cloud manufacturing system. They
are:
– Providers
– Operators
– Consumers
Providers will publish their resources to cloud manufacturing platform, the opera-
tors manage all aspects of platform that are relevant to the platform running and
operation, and the consumers requests the services from cloud platform.
A cloud based manufacturing platform consists of five layers as shown in fig. 3.
They are:
– Business planning
Cloud Manufacturing Service: A Secure and Protected Communication System | 177
Cloud manufacturing is facing many challenges due to its integration with many
technologies. Cloud computing ensures high performance using semantic web,
internet of things and embedded systems. Several technical issues must be solved
such as cloud management engines, collaboration between cloud manufacturing
applications, knowledge base resource clouding and visualization and user inter-
face in cloud computing environments [17-18].
178 | Sirisha Potluri, Sachi Nandan Mohanty, A. D. Sriram Kumar, D. Maheswari, B. Rahini
6.1.1 Reliability
The consumers’ data are stored in third party’s server. They do not know where or
which location their data are being stored. They are not aware of what security
mechanisms provided to safeguard their data.
6.1.2 Privacy
All the cloud users store their data in the cloud and that is stored in some of the
physical machines in various places around the world. All the data is being trans-
ferred through the internet.
Data loss is the one of the most security challenge in the cloud computing. If any
cloud user stores the important data in the cloud, we need to concern about the
security issues. If the data is lost through natural disasters or accidents or through
the DDoS it leads to disastrous to the organisation.
Cloud Manufacturing Service: A Secure and Protected Communication System | 179
6.1.4 Bandwidth
When there is high demand of the resources or high volume of data is to be stored,
then high bandwidth is required.
6.1.5 Availability
At sometimes, when the huge amounts of resources are to be served at a time, then
the cloud becomes unable to give all the consumers’ demands.
6.1.6 Integrity
Cloud need to ensure the correctness and trustworthy of the consumers data. The
data should not be modified, maliciously fabricated, deliberately deleted or tam-
pered.
6.1.7 DoS
6.1.8 Authentication
Every cloud user should be checked and authenticated before accessing the cloud
resources.
The cloud users or consumers need to be categorized and given permissions accord-
ing to the type of the cloud users.
Cloud service providers like Google cloud platform, Microsoft Azure, Amazon
web services are providing the best sources to the users to shift to the cloud compu-
ting. And users need not worry about their data security, because it’s being main-
tained by set of policies and protocols, virtual machines and data security as per the
rules and regulations.
180 | Sirisha Potluri, Sachi Nandan Mohanty, A. D. Sriram Kumar, D. Maheswari, B. Rahini
6.2.1 Confidentiality
Confidentiality is very important using which our data is not accessible to unauthor-
ized parties. It means that the sensitive data is accessible to only the authorized
persons. A failure in maintaining confidentiality means that unauthorized person
has the access to all the required sources provided by the provider which will be
caused due to intentional behaviour or by accident. This failure is known as confi-
dentiality failure or breach. Once the confidential data is leaked like bank details it
leads to high risks.
Requirements of confidentiality are divided into two categories namely data
confidentiality and virtualization confidentiality.
6.2.2 Integrity
Integrity is asset that promises the data or information is not been modified by any
third-party personnel who is not an authorized individual for such activity. Thus the
correctness and accuracy of an asset is with respect to its owner to ensure integrity.
Usually delete, edit, and append operations are believed by the change in integrity.
Cloud Manufacturing Service: A Secure and Protected Communication System | 181
Consequently all the web related attacks are highly prevailing in cloud environment
that can alter or change the contents of the virtual machine metadata, databases,
user files/log files, and WSDL files.
Integrity requirements are divided into two categories namely data integrity and
virtualization integrity.
6.2.3 Availability
7 Comparison of Traditional/Conventional
Manufacturing and Cloud Manufacturing
Comparison of traditional/conventional manufacturing and cloud manufacturing
are given fig. 4 and fig. 5.
Traditional manufacturing suffers with the following limitations and are ad-
dressed by cloud manufacturing.
– Restricted and dedicated resources
– Static routing
– No interconnection and integration
– Independent control
– Isolated information
– Independent module setup
– Discrete work groups
– Lack of automation
– More manual work
Cloud Manufacturing Service: A Secure and Protected Communication System | 183
No interconnection
and integration
Independent
Static routing
control
Self
Instant orgnization
interconnecti Bigdata
on
Dynamic
routing and Iot and
resource analytics
provisioning
Distributed
Cloud based
and dynamic Integration
manufacturing
resources
S.No Authors Secure cloud manufacturing model and its key practices
1 Carsten Ellwein, Oliver Riedel, The manufacturing process observe frequent changes
Olga Meyer, Daniel Schel [19] due latest current trends and technologies of digitaliza-
tion such as IoT, cloud computing and data analytics.
Cloud manufacturing model does influence product
production and manufacturing life cycle.
Key practices:
1. Digitalization
2. Industrial Internet of Things
3. Cloud manufacturing
4. Secure technology stack
5. Service-oriented architecture for modular
computing
6. Secured rent and produce (RnP) as a service
7. Integrated computer aided manufacturing
8. Computerized numerical control
2 Zhi Li, Ali Vatankhah Barenji, New evolving manufacturing prototypes such as cloud
George Q. Huang [20] based manufacturing, IoT facilitated manufacturing and
service-oriented architecture, have observed many
benefits to the manufacturing industry.
Key practices:
1. Distributed network for cloud manufacturing
2. Blackchain technology to ensure security
3. Secure data sharing
4. IoT enabled manufacturing and service-
oriented manufacturing
5. Distributed peer to peer network architecture
to preserve security and privacy in cloud man-
ufacturing (CMfg)
6. Blockchain based cloud manufacturing
(BCmfg) allows secure data sharing
7. Five layer integrated model is proposed to
achieve more security and scalability
3 Christian Esposito, Aniello Smart manufacturing upturns effectiveness and compe-
Castiglione, Ben Martini, Kim- tence through interconnection and collaboration among
Kwang Raymond Choo [21] organizations or among physical/logical/human re-
sources within a single company. Latest improvements
due to industry 4.0 supports collaboration, integration
and cooperation among the organization for better
Cloud Manufacturing Service: A Secure and Protected Communication System | 185
S.No Authors Secure cloud manufacturing model and its key practices
5 Florin Anton, Theodor Borangiu, Cloud systems ensuring more production trough indus-
Silviu Răileanu, Silvia Anton, try 4.0 solutions, integrating shop-floor processes and
Nick Ivănescu, Iulia Iacob [23] managing higher-level enterprise modules.
Key practices:
1. Cloud based manufacturing system integra-
tion
2. Remote access and control to manufacturing
system
3. VM based custom configured cloud
186 | Sirisha Potluri, Sachi Nandan Mohanty, A. D. Sriram Kumar, D. Maheswari, B. Rahini
Raw materials
Production
process
Delivery
Customer
utilization
Disposal and
recycling
Plaintext
Encrypt
Sender
Recipient
Decrypt
Plaintext
The following code shows secure data encryption using python platform.
188 | Sirisha Potluri, Sachi Nandan Mohanty, A. D. Sriram Kumar, D. Maheswari, B. Rahini
# Key encapsulation
from pprint import pprint
import oqs
km = oqs.get_enabled_KEM_mechanisms()
pprint(km, compact="True")
kmmech = "DEFAULT"
with oqs.KeyEncapsulation(kmmech) as clnt:
with oqs.KeyEncapsulation(kmmech) as srv:
pprint(clnt.details)
p_k = clnt.generate_keypair()
c_txt, sh_s_s = srv.encap_secret(public_key)
sh_s_c = clnt.decap_secret(ciphertext)
print(sh_s_c)
# Random number generation
import platform, oqs.rand as oqsrand
ornd.randombytes_nist_kat_init_256bit(bytes(entropy_seed))
#Check system settings and switch the algorithm
# Key signature generation
s_sig = oqs.get_enabled_sig_mechanisms()
pprint(s_sig, compact="True")
msg = "This is message from key generation message".encode()
s_a = "DEFAULT"
with oqs.Signature(s_a) as i_sig:
with oqs.Signature(sigalg) as i_ver:
pprint(i_sig.details)
s_p_k = i_sig.generate_keypair()
sgn = i_sig.sign(msg)
is_v = i_ver.verify(msg, sgn, s_p_k)
#Post quantum key encryption
pip install pynewhope
from pynewhope import newhope
p_key, message1 = newhope.keygen()
s_key, message2 = newhope.sharedB(message1)
sh_key = newhope.sharedA(messsage2, p_key)
if sh_key == s_key:
print("Success")
else:
print("Fail")
Cloud Manufacturing Service: A Secure and Protected Communication System | 189
11 Conclusion
Mobile and instant communication for machines is increasing the importance of the
manufacturing industry. Smooth movement of operations, improving production,
automation of production life cycle, cloud based security, IoT based services and
offerings, service oriented computing paradigms, advanced encryption and decryp-
tion mechanisms, faster growth and platform safety are driving cloud manufactur-
ing to a next high. Cloud based manufacturing ensures reduced costs, on demand
delivery, efficient data management and efficient management of human resources
through competent practices and protocols.
12 References
[1] Tao F, Zhang L, Venkatesh V, Luo Y, Cheng Y, Cloud manufacturing: a computing and service-
oriented manufacturing model, Proceedings of the Institution of Mechanical Engineers, Part B:
Journal of Engineering Manufacture, 2011, 225(10), 1969-1976, doi:10.1177/0954405411405575
[2] Li B, Zhang L, Ren L, Chai X, Tao F, Luo Y, Wang Y, Yin C, Huang G, Zhao X, Further discussion on
cloud manufacturing, Comput. Integr. Manuf. Syst, 2011, 17(3), pp. 449–457
[3] Ren L, Cui J, Li N, Wu Q, Ma C, Teng D, Zhang L, Cloud-based intelligent user interface for cloud
manufacturing: model, technology, and application, ASME, J. Manuf. Sci. Eng, August 2015,
137(4), 040910, https://doi.org/10.1115/1.4030332
[4] Wu D, Thames J, Rosen W, Schaefer D, Towards a cloud-based design and manufacturing para-
digm: looking backward, looking forward, Proceedings of the ASME 2012 International Design
Engineering Technical Conferences and Computers and Information in Engineering Conference,
Volume 2: 32nd Computers and Information in Engineering Conference, Parts A and B, Chicago,
Illinois, USA, 2012, pp. 315-328, https://doi.org/10.1115/DETC2012-70780
[5] Wu D, Greer J, Rosen W, Schaefer D, Cloud manufacturing: strategic vision and state-of-the-art,
J. Manuf. Syst, 2013, 32(4), pp. 564–579, 10.1016/j.jmsy.2013.04.008
[6] Xu X, From cloud computing to cloud manufacturing, Rob. Comput. Integr. Manuf, 2012, 28(1),
pp. 75–86, 10.1016/j.rcim.2011.07.002
[7] Dazhong W, Matthew J, David W, Dirk S, Cloud manufacturing: strategic vision and state-of-the-
art, Journal of Manufacturing Systems, 2013, Volume 32, Issue 4, Pages 564-579, ISSN 0278-
6125, https://doi.org/10.1016/j.jmsy.2013.04.008
[8] Lin Z, Yongliang L, Fei T, Bo H, Lei R, Xuesong Z, Hua G, Ying C, Anrui H, Yongkui L, Cloud manu-
facturing: a new manufacturing paradigm, Enterprise Information Systems, 2014, 8:2, 167-187,
DOI: 10.1080/17517575.2012.683812
[9] Lei R, Lin Z, Fei T, Chun Z, Xudong C, Xinpei Z, Cloud manufacturing: from concept to practice,
Enterprise Information Systems, 2015, 9:2, 186-209, DOI: 10.1080/17517575.2013.839055
[10] Lihui W, Machine availability monitoring and machining process planning towards cloud manu-
facturing, CIRP Journal of Manufacturing Science and Technology, 2013, Volume 6, Issue 4,
Pages 263-273, ISSN 1755-5817, https://doi.org/10.1016/j.cirpj.2013.07.001
[11] Petri H, Duy P, Yuqiuge H, Cloud manufacturing – scheduling as a service for sheet metal man-
ufacturing, Computers & Operations Research, 2019, Volume 110, Pages 208-219, ISSN 0305-
0548, https://doi.org/10.1016/j.cor.2018.06.002
190 | Sirisha Potluri, Sachi Nandan Mohanty, A. D. Sriram Kumar, D. Maheswari, B. Rahini
[12] Potluri S, Primary methods to address the data security problems in cloud computing, The IUP
Journal of Computer Sciences, 2016, Vol. X, Nos. 1 & 2, pp. 18-24, 2016
[13] Avinash M, Potluri S, A study on technologies in cloud-based design and manufacturing, Inter-
national Journal of Mechanical and Production Engineering Research and Development
(IJMPERD), 2018, Volume 8, Issue 6, PP: 187-192, ISSN(P): 2249-6890; ISSN(E): 2249-8001
[14] Potluri S, Subbarao K, Quality of service-based cloud models in manufacturing process auto-
mation, Innovations in Computer Science and Engineering. Lecture Notes in Networks and Sys-
tems, 2019, vol 32, PP: 231-240, Springer, Singapore. https://doi.org/10.1007/978-981-10-
8201-6_26
[15] Zhang Y, Zhang G, Liu Y, et al., Research on services encapsulation and virtualization access
model of machine for cloud manufacturing, 2017, J Intell Manuf, 28, 1109–1123,
https://doi.org/10.1007/s10845-015-1064-2
[14] Wang X, Mohammad G, Lihui W, Manufacturing System on the Cloud: a case study on cloud-
based process planning, Procedia CIRP, 2017, Volume 63, Pages 39-45, ISSN 2212-8271,
https://doi.org/10.1016/j.procir.2017.03.103
[15] Yingfeng Z, Geng Z, Ting Q, Yang L, Ray Y, Analytical target cascading for optimal configuration
of cloud manufacturing services, Journal of Cleaner Production, 2017, Volume 151, Pages 330-
343, ISSN 0959-6526, https://doi.org/10.1016/j.jclepro.2017.03.027
[16] Yongkui L, Lihui W, Vincent W, Xun X, Lin Z, Scheduling in cloud manufacturing: state-of-the-art
and research challenges, International Journal of Production Research, 2019, 57:15-16, 4854-
4879, DOI: 10.1080/00207543.2018.1449978
[17] Ellwein C, Riedel O, Meyer O, Schel D, Rent ‘n’ Produce: a secure cloud manufacturing platform
for small and medium enterprises, 2018 IEEE International Conference on Engineering, Tech-
nology and Innovation (ICE/ITMC), 2018, pp. 1-6, doi: 10.1109/ICE.2018.8436332
[18] Zhi L, Vatankhah B, George Q, Toward a blockchain cloud manufacturing system as a peer to
peer distributed network platform, Robotics and Computer-Integrated Manufacturing,2018,
Volume 54, Pages 133-144, ISSN 0736-5845, https://doi.org/10.1016/j.rcim.2018.05.011
[19] Esposito C, Castiglione A, Martini B, Choo K, Cloud manufacturing: security, privacy, and fo-
rensic concerns, IEEE Cloud Computing, 2016, vol. 3, no. 4, pp. 16-22, doi:
10.1109/MCC.2016.79
[20] Yi H, A post-quantum secure communication system for cloud manufacturing safety, J Intell
Manuf , 2021, 32, 679–688, https://doi.org/10.1007/s10845-020-01682-y
[21] Anton F, Borangiu T, Răileanu S, Anton S, Ivănescu N, Iacob I, Secure sharing of robot and
manufacturing resources in the cloud for research and development, Berns K, Görges D, Ad-
vances in Service and Industrial Robotics, RAAD 2019, Advances in Intelligent Systems and
Computing, 2019, vol 980, Springer, Cham. https://doi.org/10.1007/978-3-030-19648-6_61
Index
amazon web service 85 hybrid cloud 53
artificial intelligence 4 hypervisor 54
asymmetric key encryption scheme 187
autonomous or self governing vehicle 152 information security 44
availability 68 infrastructure as a service 67
integrity 67, 180
basic safety message 147 intelligent transportation systems 162
blockchain as a service 31 internet enabled sensors 92
blockchain structure 29 internet of things 84
blockchain technology 23 interoperability 129
IoT based testing and information processing
caesar cipher 17 102
capital expense 105 IoT compressed IoT devices 103
ciphertext 11 IoT cyber security framework 86
client server computing 22 IoT gadget connectivity 88
cloud based computing 24
cloud based management 93 landing page optimization 112
cloud centred software 175 laser illuminated detection and ranging 153
cloud computing 2
cloud governance 108 machine learning 126
cloud manufacturing 174 manufacturing cloud provision and organization
cloud protection 33 173
cloud service providers 179 marketing strategy 107
cloud shell 137 mobile and instant communication 189
cloud system security 68
community cloud 53 173 network security and privacy 87
computational techniques 132
confidentiality 67 on premise data storage 128
consensus mechanism 28 operating expenditure 105
conversion rate optimization 112
cryptography 89 P2P cloud computing 73
customer relationship management 113 pay-per-click strategy 113
cyber attacks 15 platform as a service 67
private cloud 53
data integrity 3 proof of burn 29
data loss 178 proof of stake 29
data privacy 75 proof of work 28
data security 77 pseudonyms coupled with public key
data usage 3 infrastructure 161
dedicated short range communication 146 public cloud 53
denial of service 42
denoising autoencoder 14 quality of service 147
distributed denial of service 42
RACE Framework 109
google cloud machine learning engine 132 radio frequency identification 84
group signatures 161 reliability 129
https://doi.org/10.1515/9783110732573-010
192 | Index