𝔖 Scriptorium
✦   LIBER   ✦

📁

Big Data Privacy and Security in Smart Cities

✍ Scribed by Richard Jiang, Ahmed Bouridane, Chang-Tsun Li, Danny Crookes, Said Boussakta, Feng Hao, Eran A. Edirisinghe


Publisher
Springer
Year
2022
Tongue
English
Leaves
248
Series
Advanced Sciences and Technologies for Security Applications
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Contents
Smart Cities: A Survey of Tech-Induced Privacy Concerns
1 Introduction
2 Related Work
2.1 Internet of Things (IoT)
2.2 Big Data
2.3 Information and Communication Technology (ICT)
3 Smart Cities Technologies
3.1 Smart Mobility and Transportation Technology
3.2 Smart Energy Technology
3.3 Smart Health Technology
3.4 Smart Governance Technology
4 Conclusion
References
Ethics of Face Recognition in Smart Cities Toward Trustworthy AI
1 Introduction
2 Representative Scene
2.1 Demographic Aspect
2.2 Smart-City Surveillance
2.3 Facepay
2.4 Face to DNA
3 Relevant Laws or Regulations
3.1 Related U.S. Laws and Regulations
3.2 European Private Privacy Laws
4 Proposal to Trustworthy
4.1 Explainability
4.2 Privacy
4.3 Nondiscrimination & Fairness
4.4 Integrity
4.5 Environmental Friendliness
5 Conclusion
References
A Technical Review on Driverless Vehicle Technologies in Smart Cities
1 Introduction
2 Prospects and Challenges
3 Architecture of Automated Driving Systems
4 Sensors and Hardware
5 Localization and Mapping
6 Perception
7 Planning and Decision Making
8 Datasets
9 Transportation in Smart City
10 Deep Learning in Driverless Vehicles
11 Driverless Vehicle Cases
12 Conclusion
References
A Mechanism to Maintain Node Integrity in Decentralised Systems
1 Introduction
2 Related Study
3 Proposed Mechanism
4 Discussions and Future Development
5 Conclusions
References
Incident Detection System for Industrial Networks
1 Introduction
2 Related Works
3 Industrial Protocol Modbus/TCP
4 Modbus/TCP Security Module
4.1 Phase 1—Databases Approach
4.2 Phase 2
5 Graphical Visualization
6 Conclusion
References
Predictive Maintenance of Vehicle Fleets Using LSTM Autoencoders for Industrial IoT Datasets
1 Introduction
2 Related Work
3 Computational Method
3.1 Datasets
3.2 LSTM Autoencoder for Predictive Maintenance
4 Experiments and Results
5 Conclusion
References
A Comparative Study on the User Experience on Using Secure Messaging Tools
1 Introduction
2 Literature Review
2.1 User Experience Research
2.2 Obstacles to the Adoption of Secure Communication Tools
2.3 Previous Email Encryption Studies
3 Problem Statement
4 Research Methodology
4.1 Heuristic Review for Thunderbird Email Client
4.2 System Settings Versus App Settings
5 Recommendations and Future Directions
6 Conclusions
References
A Survey on AI-Enabled Pandemic Prediction and Prevention: What We Can Learn from COVID
1 Introduction
2 Prediction and Forecasting
3 Screening and Treatment
4 Contact Tracing
5 Drugs and Vaccination
6 Other AI Application of COVID-19
7 Pandemic Prevention in Smart City
8 Conclusion and Discussion
References
Blockchain Based Health Information Exchange Ecosystem: Usecase on Travellers
1 Introduction
2 Related Work
3 Proposed Transformation Centered Around Smart Contract
4 Discussion
5 Conclusion
References
Video-Based Heart Rate Detection: A Remote Healthcare Surveillance Tool for Smart Homecare
1 Introduction
2 Literature Review
2.1 Previous Research Which Use PPG/RIPPG
2.2 Previous Research Which Use BCG
2.3 Results from Previous Work
3 Methodology
3.1 Data Collection
3.2 ROI Selection and Tracking
3.3 Implementation of Tracking Algorithm
3.4 Validity of Obtained Frequencies
3.5 Noise Filtration
3.6 Synchronising the Waveforms
3.7 Estimating the Beats per Minute Using Peak FFT Analysis
3.8 Estimating Beats per Minute from the Number of Prominent Peaks in the Signal
3.9 Detecting BPM Through Short-time Fourier Transform
3.10 Generating ECG Like Signal
4 Results
4.1 From FFT Signal Analysis
4.2 Short Time Fourier Analysis
4.3 Generating ECG Like Signal
5 Conclusion
5.1 Key Findings
5.2 Limitations
5.3 Future Research
References
A Survey on the Integration of Blockchain and IoT: Challenges and Opportunities
1 Introduction
2 Literature Review
3 An Overview of IoT and Blockchain
3.1 Internet of Things (IoT)
3.2 IoT Framework
3.3 IoT Security Challenges
3.4 IoT on Blockchain
4 Blockchain Implementation in Different IoT Domain
4.1 Internet of Energy (IoE)
4.2 Internet of Vehicles
4.3 Internet of Healthcare Things
4.4 Access Management in IoT
4.5 Authentication and Identity Management
4.6 Fog Computing
4.7 Internet of Agriculture
4.8 Software-Defined Networking
4.9 Internet of Smart Cities
4.10 Intrusion Detection
4.11 Internet of Cloud
4.12 Blockchain for 5G
5 Blockchain Limitations
5.1 Scalability
5.2 Throughput
5.3 Energy Consumption
5.4 Latency
5.5 Block Size and Bandwidth Related Issues
5.6 The Smart Contract Deployment Cost
5.7 Usability
5.8 Currently Introduced Solutions
6 The Future Research Directions
7 Conclusion
References
Quantum Bitcoin: The Intersection of Bitcoin, Quantum Computing and Blockchain
1 Introduction: Background on Quantum Computing Meets Bitcoin
2 What’s Blockchain and Cryptocurrency
3 A Brief Introduction to Quantum Computing
4 Grover’s Algorithm, Shor's Algorithm and Impact on Bitcoin
5 Possible: Quantum Bitcoin
6 Discussion
7 Conclusion
References
Biometric Blockchain (BBC) Based e-Passports for Smart Border Control
1 Introduction
2 Literature Review
3 Preliminaries
3.1 Blockchain
3.2 Verifiable Credential and Decentralized Identifier
4 The Proposed e-password System
4.1 Main Entities
4.2 Biometric Authentication
4.3 System Modelling
5 Implementations and Performance
6 Conclusion
References


📜 SIMILAR VOLUMES


Big Data Privacy and Security in Smart C
✍ Richard Jiang, Ahmed Bouridane, Chang-Tsun Li, Danny Crookes, Said Boussakta, Fe 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book highlights recent advances in smart cities technologies, with a focus on new technologies such as biometrics, blockchains, data encryption, data mining, machine learning, deep learning, cloud security, and mobile security. </span></p><p><span> </span></p><p><span>During the past f

Future Data and Security Engineering. Bi
✍ Tran Khanh Dang (editor), Josef Küng (editor), Tai M. Chung (editor), Makoto Tak 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book constitutes the proceedings of the 8th International Conference on Future Data and Security Engineering, FDSE 2021, held in Ho Chi Minh City, Vietnam, in November 2021.*</span><p><span>The 28 full papers and 8 short were carefully reviewed and selected from 168 submissions. The selec

Privacy and Security Policies in Big Dat
✍ Sharvari Tamane, Vijender Kumar Solanki 📂 Library 📅 2017 🏛 IGI Global 🌐 English

In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference sour

Security, Privacy, and Forensics Issues
✍ Brij B. Gupta, Ramesh C. Joshi 📂 Library 📅 2019 🏛 IGI Global 🌐 English

With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day, which brings new challenges in terms of information security. As big data expands with the help of public clouds, traditional security

Future Data and Security Engineering. Bi
✍ Tran Khanh Dang (editor), Josef Küng (editor), Tai M. Chung (editor) 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>This book constitutes the proceedings of the 10th International Conference on Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, FDSE 2023, held in Da Nang, Vietnam, during November 22–24, 2023.</span><p><span>The 38 full papers and

HCI Challenges and Privacy Preservation
✍ Daphne Lopez, M.A. Saleem Durai 📂 Library 📅 2018 🏛 IGI Global 🌐 English

Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Secu