Front cover image for Handbook of computer networks and cyber security : principles and paradigms

Handbook of computer networks and cyber security : principles and paradigms

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference
eBook, English, 2020
Springer, Cham, 2020
Electronic books
1 online resource (957 pages)
9783030222772, 3030222772
1134853898
Intro
Preface
Acknowledgment
Contents
About the Editors
1 Security Frameworks in Mobile Cloud Computing
1 Introduction
2 Architecture of Mobile Cloud Computing
3 Security Aspects of Mobile Cloud Computing
4 Security Frameworks for Mobile Cloud Computing
4.1 Authentication Frameworks for Mobile Cloud Computing
4.2 Privacy Preserving Security Frameworks for MCC
4.3 Secure Data Storage Frameworks for MCC
4.4 Security Frameworks for Computation Using MCC
5 Attack, Risk Assessment, and Verifiability in Mobile Clouds
6 Summary and Discussion 7 Conclusion
References
2 An Investigation Study of Privacy Preserving in Cloud Computing Environment
1 Introduction
2 Privacy-Preserving Methods
3 Searchable Encryption-Based Techniques
3.1 Symmetric-Key Based Techniques
3.2 Fuzzy-Searchable Encryption
3.3 Public-Key Encryption
4 Conclusion and Future Work
References
3 Towards New Quantitative Cybersecurity Risk Analysis Models for Information Systems: A Cloud ComputingCase Study
1 Introduction
2 Motivation: Quantitative Cybersecurity Risk Assessment Models
2.1 Related Work 2.2 Mean Failure Cost Model (MFC): A Quantitative Cybersecurity Risk Assessment Model
2.3 Mean Failure Cost (MFC) Limits
3 Cloud Computing Environments
3.1 Cloud Computing Architecture
3.2 Cloud Computing Security Issues
4 MFCext and MFCint: New Quantitative Security Risk Assessment Models
4.1 Security Threat Space Intrusion
4.1.1 Internal Threats
4.1.2 External Threats
4.1.3 Internal/External Threats
4.2 MFCext and MFCint: The Proposed Model
4.3 Illustration of the Cybersecurity Model: A Cloud Computing System
4.4 Validation of the MFCint and the MFCext 4.5 MFCext and MFCint Limits and Advantages
5 The MFC Extension Model (MFCE)
5.1 The MFCE Model
5.2 Illustration of the MFC Extension Model: Cloud Computing System
5.2.1 The Impact Threats Classes Matrix
5.2.2 The Threat Classes Matrix
5.3 Validation of the MFCE Model
6 Conclusion
References
4 A Novel AckIBE-Based Secure Cloud Data Management Framework
1 Introduction
1.1 Support of Cloud Computing
2 Related Literature
2.1 Security Approaches of Smart Model
3 Basic IB Schemes
3.1 Other IB Schemes
4 Secure Smart Model 4.1 Smart-Model: System Architecture
4.2 Component Views
4.3 Flow of Information Management
5 Security Solutions for Smart Model
5.1 Model Description
5.2 Key Generation
5.2.1 Encryption to Top Cloud
5.2.2 Encryption to IS
5.2.3 Proxy Re-encryption
5.2.4 Signature Generation by Top Cloud
5.2.5 Signature Generation in Regional Cloud
5.2.6 Signature Generation by End-Users
6 Schemes for Secure Framework
6.1 Confidentiality
6.1.1 Encryption to Top Cloud
6.1.2 Encryption to Information Storage
6.1.3 Proxy Re-encryption to Information Storage
6.2 Authentication Service