Cloud-Enabled Security Adversarial Network Strategies for Public Area Protection

Cloud-Enabled Security Adversarial Network Strategies for Public Area Protection

DOI: 10.4018/979-8-3693-3597-0.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In cloud computing, the consideration of the future of IT enterprise involves the centralized application software and database in large data centers. However, this shift raised security challenges that are not well understood. This study focused on ensuring the integrity of data storage in cloud services. Specifically, it examined a third-party auditor acting on behalf of the cloud client can verify the integrity of dynamics data stored in the cloud. This approach allows a third party to check the client's data without the client's direct involvement, which is crucial for achieving economics of scale in cloud computing methodology. Efficient network data dynamically are achieved by enhanced existing proofs of storage models through manipulation of the Merkle Hash based tree construction for block tag authentication. Additionally, to handle multiple audition of tasks efficiently, the chapter explores the use of bilinear aggregate signatures. This extension allows the TPA to perform multiple auditing tasks simultaneously manner in a multi-user setting.
Chapter Preview
Top

Introduction

Wireless Sensory Networks (WSNs) will be a pivotal across numerous domains such as environmental monitoring, healthcare system, industrial automation process, and smart infrastructure Han et.al(2021). The networks will composed of group of sensor nodal points strategically will deployed for gathering and broadcasting of data-packets about their surrounding environment. The raw data will invaluable for informs decision-making and will facilitates real-time monitoring of physical phenomena. However, the volume and intricacy of data generated by WSNs will present formidable challenges, particularly in detection of anomalies or deviations in the data stream Kim et.(2020). Anomalies will be signify critical occurrence like environmental threats, equipment with malfunctions, or security breaches, underscores the urgency of timely detection to uphold the reliability, safety, and security of WSN-driven systems. In Conventional anomaly detection methodology often in handling the dynamic and diverse nature of WSN data, especially in settings with limited computational resources availability swaminathan et.al(2021). Hence, there will arises a pressing demand for sophisticated anomaly detection techniques with capable of analyzing WSN data in real-time, by facilitating swift identification and resolution of anomalies Lee et.al(2021) . By tackling the obstacles, WSN-based anomaly detection systems will plays a pivotal roles in fortifying the resilience and efficacy of various applications Sangeetha et.al(2023) thereby augmented for the overall performance and dependability of WSN deployments.

Complete Chapter List

Search this Book:
Reset