Жанры
Авторы
Контакты
О сайте
Книжные новинки
Популярные книги
Найти
Главная
Авторы
Группа авторов
Integration of Cloud Computing with Internet of Things
Читать книгу Integration of Cloud Computing with Internet of Things - Группа авторов - Страница 1
Оглавление
Предыдущая
Следующая
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
...
76
Оглавление
Купить и скачать книгу
Вернуться на страницу книги Integration of Cloud Computing with Internet of Things
Оглавление
Страница 1
Table of Contents
List of Figures
List of Tables
Guide
Pages
Страница 7
Страница 8
Страница 9
Страница 10
Страница 11
Страница 12
1
Internet of Things: A Key to Unfasten Mundane Repetitive Tasks
1.1 Introduction
1.2 The IoT Scenario
1.3 The IoT Domains 1.3.1 The IoT Policy Domain
1.3.2 The IoT Software Domain
1.3.2.1 IoT in Cloud Computing (CC)
1.3.2.2 IoT in Edge Computing (EC)
1.3.2.3 IoT in Fog Computing (FC)
1.3.2.4 IoT in Telecommuting
1.3.2.5 IoT in Data-Center
1.3.2.6 Virtualization-Based IoT (VBIoT)
1.4 Green Computing (GC) in IoT Framework
1.5 Semantic IoT (SIoT)
1.5.1 Standardization Using oneM2M
1.5.2 Semantic Interoperability (SI)
1.5.3 Semantic Interoperability (SI) Security
1.5.4 Semantic IoT vs Machine Learning
1.6 Conclusions
References
Страница 32
2
Measures for Improving IoT Security
2.1 Introduction
2.2 Perceiving IoT Security
2.3 The IoT Safety Term
2.4 Objectives 2.4.1 Enhancing Personal Data Access in Public Repositories
2.4.2 Develop and Sustain Ethicality
2.4.3 Maximize the Power of IoT Access
2.4.4 Understanding Importance of Firewalls
2.5 Research Methodology
2.6 Security Challenges
2.6.1 Challenge of Data Management
2.7 Securing IoT 2.7.1 Ensure User Authentication
2.7.2 Increase User Autonomy
2.7.3 Use of Firewalls
2.7.4 Firewall Features
2.7.5 Mode of Camouflage
2.7.6 Protection of Data
2.7.7 Integrity in Service
2.7.8 Sensing of Infringement
2.8 Monitoring of Firewalls and Good Management 2.8.1 Surveillance
2.8.2 Forensics
2.8.3 Secure Firewalls for Private
2.8.4 Business Firewalls for Personal
2.8.5 IoT Security Weaknesses
2.9 Conclusion
References
Страница 59
3
An Efficient Fog-Based Model for Secured Data Communication
3.1 Introduction
3.1.1 Fog Computing Model
3.1.2 Correspondence in IoT Devices
3.2 Attacks in IoT
3.2.1 Botnets
3.2.2 Man-In-The-Middle Concept
3.2.3 Data and Misrepresentation
3.2.4 Social Engineering
3.2.5 Denial of Service
3.2.6 Concerns
3.3 Literature Survey
3.4 Proposed Model for Attack Identification Using Fog Computing
3.5 Performance Analysis
3.6 Conclusion
References
{buyButton}
Подняться наверх