Securecsocial: Secure Cloud-based Social Network

Securecsocial: Secure Cloud-based Social Network

Author: Pradeep Atrey

Publisher: World Scientific

Published: 2019-08-19

Total Pages: 159

ISBN-13: 9811205930

DOWNLOAD EBOOK

The use of online social networks (OSNs) has grown exponentially in recent years, and these OSNs continue to have an ever-increasing impact on human lives. There are many concerns regarding the privacy of users in these environments, such as how trustworthy the social network operators (SNOs) are.This book presents a way to tackle the security and privacy issues in current OSNs through a new framework for online social networking, based on distributed cloud-based datacenters (CDCs) and using Shamir's secret sharing (SSS) as the method of encrypting user profile data. The framework aims to fulfill two contradictory goals: maintaining the utility of an OSN and preserving privacy of its users. The key feature of the framework lies in relinquishing control of a central authority over user's data (which is what usually happens in the current OSNs, e.g. Facebook keeps all our data) and distributing it to multiple CDCs in encrypted form. The use of SSS ensures perfect security, which means that the security of data does not rely on any unproven computational assumptions.In this unique book, SNOs are considered as an adversary instead of external adversary. This paves the way for researchers to think beyond the privacy setting mechanism within an OSN to protect users' data.


Security in IoT Social Networks

Security in IoT Social Networks

Author: Fadi Al-Turjman

Publisher: Academic Press

Published: 2020-11-03

Total Pages: 268

ISBN-13: 0128216034

DOWNLOAD EBOOK

Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks. - Provides several characteristics of social, network, and physical security associated with social information networks - Presents the security mechanisms and events related to social information networks - Covers emerging topics, such as network information structures like on-line social networks, heterogeneous and homogeneous information networks, and modern information networks - Includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models


Practical Guide On Security And Privacy In Cyber-physical Systems, A: Foundations, Applications And Limitations

Practical Guide On Security And Privacy In Cyber-physical Systems, A: Foundations, Applications And Limitations

Author: Prinkle Sharma

Publisher: World Scientific

Published: 2023-09-21

Total Pages: 264

ISBN-13: 9811273561

DOWNLOAD EBOOK

A Practical Guide on Security and Privacy in Cyber-Physical Systems offers an in-depth look at the recent security and privacy challenges of Cyber-Physical Systems (CPS) in multiple application domains. It provides readers with a comprehensive view of system architecture for cybersecurity systems before actual implementation.The book first presents a systematic overview on several CPS applications covering standard architectures before zooming into each of the layers of the architectureal design to describe the underpinning technological, security, and privacy issues currently facing some CPS research groups. The guiding principles that should be followed while planning future innovations for such mission-critical systems are also covered.This book captures the latest advancements from many different fields and is a well-balanced combination of academic contributions and industrial applications in CPS. Written for students and professionals at all levels, this book presents the best practices for individuals who want to advance their research and development in this exciting area.


Using Science In Cybersecurity

Using Science In Cybersecurity

Author: Leigh Barnes Metcalf

Publisher: World Scientific

Published: 2021-04-16

Total Pages: 302

ISBN-13: 9811235872

DOWNLOAD EBOOK

Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles.This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity.


Innovations In Digital Forensics

Innovations In Digital Forensics

Author: Suryadipta Majumdar

Publisher: World Scientific

Published: 2023-06-21

Total Pages: 343

ISBN-13: 9811273219

DOWNLOAD EBOOK

Digital forensics deals with the investigation of cybercrimes. With the growing deployment of cloud computing, mobile computing, and digital banking on the internet, the nature of digital forensics has evolved in recent years, and will continue to do so in the near future.This book presents state-of-the-art techniques to address imminent challenges in digital forensics. In particular, it focuses on cloud forensics, Internet-of-Things (IoT) forensics, and network forensics, elaborating on innovative techniques, including algorithms, implementation details and performance analysis, to demonstrate their practicality and efficacy. The innovations presented in this volume are designed to help various stakeholders with the state-of-the-art digital forensics techniques to understand the real world problems. Lastly, the book will answer the following questions: How do the innovations in digital forensics evolve with the emerging technologies? What are the newest challenges in the field of digital forensics?


Handbook Of Security And Networks

Handbook Of Security And Networks

Author: Yang Xiao

Publisher: World Scientific

Published: 2011-04-14

Total Pages: 574

ISBN-13: 9814468037

DOWNLOAD EBOOK

This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing a comprehensive overview, the latest pioneering work and future research direction of a research topic.


Handbook of Electronic Security and Digital Forensics

Handbook of Electronic Security and Digital Forensics

Author: Hamid Jahankhani

Publisher: World Scientific

Published: 2010

Total Pages: 708

ISBN-13: 9812837043

DOWNLOAD EBOOK

The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, as our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals. This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, the public and private sectors, students and those who are interested in and will benefit from this handbook.


Cloud Native Security Cookbook

Cloud Native Security Cookbook

Author: Josh Armitage

Publisher: "O'Reilly Media, Inc."

Published: 2022-04-21

Total Pages: 516

ISBN-13: 109810627X

DOWNLOAD EBOOK

With the rise of the cloud, every aspect of IT has been shaken to its core. The fundamentals for building systems are changing, and although many of the principles that underpin security still ring true, their implementation has become unrecognizable. This practical book provides recipes for AWS, Azure, and GCP to help you enhance the security of your own cloud native systems. Based on his hard-earned experience working with some of the world's biggest enterprises and rapidly iterating startups, consultant Josh Armitage covers the trade-offs that security professionals, developers, and infrastructure gurus need to make when working with different cloud providers. Each recipe discusses these inherent compromises, as well as where clouds have similarities and where they're fundamentally different. Learn how the cloud provides security superior to what was achievable in an on-premises world Understand the principles and mental models that enable you to make optimal trade-offs as part of your solution Learn how to implement existing solutions that are robust and secure, and devise design solutions to new and interesting problems Deal with security challenges and solutions both horizontally and vertically within your business


Dynamic Networks And Cyber-security

Dynamic Networks And Cyber-security

Author: Niall M Adams

Publisher: World Scientific

Published: 2016-03-22

Total Pages: 222

ISBN-13: 1786340763

DOWNLOAD EBOOK

As an under-studied area of academic research, the analysis of computer network traffic data is still in its infancy. However, the challenge of detecting and mitigating malicious or unauthorised behaviour through the lens of such data is becoming an increasingly prominent issue.This collection of papers by leading researchers and practitioners synthesises cutting-edge work in the analysis of dynamic networks and statistical aspects of cyber security. The book is structured in such a way as to keep security application at the forefront of discussions. It offers readers easy access into the area of data analysis for complex cyber-security applications, with a particular focus on temporal and network aspects.Chapters can be read as standalone sections and provide rich reviews of the latest research within the field of cyber-security. Academic readers will benefit from state-of-the-art descriptions of new methodologies and their extension to real practical problems while industry professionals will appreciate access to more advanced methodology than ever before.


Data Science For Cyber-security

Data Science For Cyber-security

Author: Nicholas A Heard

Publisher: World Scientific

Published: 2018-09-26

Total Pages: 305

ISBN-13: 178634565X

DOWNLOAD EBOOK

Cyber-security is a matter of rapidly growing importance in industry and government. This book provides insight into a range of data science techniques for addressing these pressing concerns.The application of statistical and broader data science techniques provides an exciting growth area in the design of cyber defences. Networks of connected devices, such as enterprise computer networks or the wider so-called Internet of Things, are all vulnerable to misuse and attack, and data science methods offer the promise to detect such behaviours from the vast collections of cyber traffic data sources that can be obtained. In many cases, this is achieved through anomaly detection of unusual behaviour against understood statistical models of normality.This volume presents contributed papers from an international conference of the same name held at Imperial College. Experts from the field have provided their latest discoveries and review state of the art technologies.