ebook img

Predictive Data Security using AI: Insights and Issues of Blockchain, IoT, and DevOps PDF

222 Pages·2022·4.471 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Predictive Data Security using AI: Insights and Issues of Blockchain, IoT, and DevOps

Studies in Computational Intelligence 1065 Hiren Kumar Thakkar Mayank Swarnkar Robin Singh Bhadoria   Editors Predictive Data Security using AI Insights and Issues of Blockchain, IoT, and DevOps Studies in Computational Intelligence Volume 1065 SeriesEditor JanuszKacprzyk,PolishAcademyofSciences,Warsaw,Poland The series “Studies in Computational Intelligence” (SCI) publishes new developments and advances in the various areas of computational intelligence—quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life sciences, as well as themethodologiesbehindthem.Theseriescontainsmonographs,lecturenotesand editedvolumesincomputationalintelligencespanningtheareasofneuralnetworks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems,andhybridintelligentsystems.Ofparticularvaluetoboththecontributors and the readership are the short publication timeframe and the world-wide distribution,whichenablebothwideandrapiddisseminationofresearchoutput. IndexedbySCOPUS,DBLP,WTIFrankfurteG,zbMATH,SCImago. AllbookspublishedintheseriesaresubmittedforconsiderationinWebofScience. · · Hiren Kumar Thakkar Mayank Swarnkar Robin Singh Bhadoria Editors Predictive Data Security using AI Insights and Issues of Blockchain, IoT, and DevOps Editors HirenKumarThakkar MayankSwarnkar DepartmentofComputerScience DepartmentofComputerScience andEngineering andEngineering PanditDeendayalEnergyUniversity IndianInstituteofTechnologyBHU Gandhinagar,Gujarat,India Varanasi,UttarPradesh,India RobinSinghBhadoria DepartmentofComputerEngineering andApplications GLAUniversity Mathura,UttarPradesh,India ISSN 1860-949X ISSN 1860-9503 (electronic) StudiesinComputationalIntelligence ISBN 978-981-19-6289-9 ISBN 978-981-19-6290-5 (eBook) https://doi.org/10.1007/978-981-19-6290-5 ©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicensetoSpringerNature SingaporePteLtd.2023 Thisworkissubjecttocopyright.AllrightsaresolelyandexclusivelylicensedbythePublisher,whether thewholeorpartofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuse ofillustrations,recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,and transmissionorinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilar ordissimilarmethodologynowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbook arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSingaporePteLtd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore Preface Intherecentpast,duetotheaffordableandeasyaccesstotheInternet,thenumber ofconnecteddeviceshasgrownexponentially.Contrarytoadecadeback,millions of new devices are connecting each day forming a giant network of Internet of Things(IoT)leadingtoenormousamountsofdatacommunicationacrossthedevices. However, with the convenience of IoT enabled communications, substantial chal- lengesarealsoemergingintheformofdatasnooping,datahacking,dataphishing, man-in-the-middleattack,denial-of-serviceattack,etc.Moreover,fewdataattacks greatly affect the stability of applications by attacking the underlying Machine Learning (ML) and Deep Learning (DL) codes. The rate of the novel data attacks designedtocompromisethesecuritiesismuchfasterthantherateofprovidingthe remedial security solutions. Therefore, there is an increasing demand to refer to theexistingsecuritysolutionsandstateoftheartsinthedatasecuritydomain.This bookattemptstoprovideacomprehensivereviewoftheexistingtypesofdatasecurity attacksandcorrespondingsolutionswithdiscussiononthetrends,technology.More- over,thebookfocusesonArtificialIntelligence(AI)enableddatasecuritysolutions overandabovetheover-the-shelfconventionaldatasecuritymechanismtoprovide thefuturisticviews.ThebookcoversthedomainssuchasImageforgerydetection, securityissuesinMLandDL,reversibledatahidinginhealthcare,Blockchain-based authentication,securityconcernsincloud,fog,andedgecomputing,andsocialmedia securityanalysis. Gandhinagar,India HirenKumarThakkar Varanasi,India MayankSwarnkar Mathura,India RobinSinghBhadoria v Acknowledgements Wewouldliketofirstthankthealmightyforprovidingusthestrengthtopursuethe idea and carry it forward to make a complete book. Our sincere thanks to all the contributorswhohaveprovidedtheirvaluabletime,support,andtimelycontributions tomakeacomprehensivebookondatasecurity.Wewouldalsoliketothankallthe reviewers for their informative and constructive suggestions to the contributors to improvizethechapters.Finally,wewouldliketothankourInstitutionsPanditDeen- dayalEnergeyUniversity(PDEU),India,IndianInstituteofTechnology—Banaras HinduUniversity(IIT-BHU),India,andGLAUniversity,Indiaforprovidingallthe requiredresourcesfordrafting,proofreading,andeditingthebook. vii Contents AComprehensiveStudyofSecurityAspectsinBlockchain ............ 1 PranavSinghandSushrutaMishra AnExplorationAnalysisofSocialMediaSecurity .................... 25 ShreejaVermaandSushrutaMishra A Pragmatic Analysis of Security Concerns in Cloud, Fog, andEdgeEnvironment ............................................. 45 ManishJena,UdayanDas,andMadhabanandaDas SecureInformationandDataCentres:AnExploratoryStudy ......... 61 PranavPant,KunalAnand,andDjeaneDeboraOnthoni Blockchain-Based Secure E-voting System Using Aadhaar Authentication .................................................... 89 AnkitKumarJain,SahilKalra,KaranKapoor,andVishalJangra DevOpsTools:SilverBulletforSoftwareIndustry .................... 105 DivyaSrivastava, MadhushiVerma, ShashankSheshar, andMadhuriGupta RobustandSecuredReversibleDataHidingApproachforMedical ImageTransmissionoverSmartHealthcareEnvironment ............. 119 K.JyothsnaDevi,PriyankaSingh,JoséSantamaría,andShrinaPatel Advancements in Reversible Data Hiding Techniques and Its ApplicationsinHealthcareSector ................................... 133 BuggaveetiPadmaja,MaharanaSuraj,andV.M.Manikandan SecurityIssuesinDeepLearning .................................... 151 ShrinaPatel,ParulV.Bakaraniya,SushrutaMishra,andPriyankaSingh CNN-BasedModelsforImageForgeryDetection ..................... 185 ShyamSinghRajput,DeepakRai,DeetiHothrik,SudhanshuKumar, andShubhangiSingh ix x Contents MaliciousURLDetectionUsingMachineLearning ................... 199 MayankSwarnkar,NehaSharma,andHirenKumarThakkar About the Editors Dr. Hiren Kumar Thakkar received his M.Tech in Computer Science and Engi- neering from IIIT Bhubaneswar, India, in 2012 and a Ph.D. degree from Chang GungUniversity,Taiwan,in2018.Later,heworkedasapostdoctoralresearcherin theDepartmentofOccupationTherapy,MotorBehavioralResearchLab(MBRL), Chang Gung University, Taiwan. Currently, he is an Assistant Professor in the Department of Computer Science and Engineering, Pandit Deendayal Energy University,Gujarat,India.Dr.Thakkarhaspublishedseveraljournalresearchpapers intheareassuchasoptimization,machinelearning,andreinforcementlearning.He isamemberofIEEE. Dr. Mayank Swarnkar is currently an Assistant Professor in the Department of Computer Science and Engineering at the Indian Institute of Technology (BHU) Varanasi.HecompletedhisPh.D.fromtheIndianInstituteofTechnologyIndorein 2019.HecompletedhisM.TechinWirelessCommunicationandComputingfrom theIndianInstituteofInformationTechnologyAllahabadPrayagrajin2013andB.E. in Information Technology from Jabalpur Engineering College in 2011. He joined IIT(BHU)in2020.HealsoworkedasSoftwareEngineerinNECTechnologiesIndia during2013–2014.Hisprimaryareasofinterestarenetworkandsystemsecurity.He worksmainlyinnetworktrafficclassification,zero-dayattacks,intrusiondetection systems, IoT security analysis, network protocol vulnerability analysis, and VoIP spamdetection.Hehasseveralpublicationsininternationaljournalsandconferences. HeisamemberofIEEEandACM. Robin Singh Bhadoria completed his Ph.D. degree from the Indian Institute of TechnologyIndoreinJanuary2018.HealsofinishedhisM.Tech.andB.E.inCSE fromdifferentinstitutionsaffiliatedwithRGPVBhopalin2011and2008,respec- tively. He has been awarded the University Gold Medal for his M.Tech. Degree at xi

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.