𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Green Computing in Network Security: Energy Efficient Solutions for Business and Home (Green Engineering and Technology)

✍ Scribed by Deepak Kumar Sharma (editor), Koyel Datta Gupta (editor), Rinky Dwivedi (editor)


Publisher
CRC Press
Year
2021
Tongue
English
Leaves
187
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications.


Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices.

Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.

✦ Table of Contents


Cover
Half Title
Series Information
Title Page
Copyright Page
Table of Contents
Preface
Acknowledgments
Editor Biographies
List of Contributors
1 Green Computing at a Glance: A Solution for the Next Generation
1.1 What Is Green Computing? Why Green Computing? How to Implement Green?
1.1.1 Why Do Green?
1.1.2 How to Implement Green?
1.2 Downsides of Digitalization and Its Impact
1.3 Nanotechnology as a Green Solution for Integrated Circuits
1.4 Energy and Climate Impact of Digital Technology
1.4.1 Direct and Indirect Impact of Digital Technologies
1.4.1.1 Carbon Emission at Data Centers
1.4.1.2 Green Computing in Cloud Environment: Serverless Computers
1.5 Energy Efficiency at Homes
1.6 Malicious Use of Machine Learning in Green ICT
1.7 Conclusion
References
2 Empirical Study of Green Cloud Environment, Edge/Fog Computing
2.1 Introduction
2.1.1 Introduction to Cloud, Fog and Edge Computing
2.1.1.1 Infrastructure as a Service (IaaS)
2.1.1.2 Software as a Service (SaaS)
2.1.1.3 Platform as a Service (PaaS)
2.1.2 Fog Computing
2.1.3 Edge Computing
2.1.4 Relation Between Different Types of Computing
2.1.5 Comparison
2.2 Principal Disciplines of Green Computing
2.2.1 Introduction to Green Computing
2.2.2 Necessity of Green Computing?
2.2.3 Approaches to Implement Green Computing
2.2.3.1 Improvements in Microprocessor
2.2.3.2 Modifications in Cooling Systems
2.2.3.3 Improvements in Network
2.2.3.4 Improvements in Disk Storage
2.3 Attacks/Threats in Green Computing
2.3.1 Types of Attacks On Cloud Computing
2.3.1.1 Malware Injection Attacks On Cloud
2.3.1.2 Denial of Service Attacks
2.3.1.3 Abuse of Cloud Services
2.3.1.4 Side-Channel Attacks
2.3.1.5 Man-In-The-Middle Cloud Attack
2.3.1.6 Wrapping Attacks
2.3.1.7 Insider Attacks
2.3.1.8 Service Or Account Hijacking
2.3.1.9 Advanced Persistent Threats (APTs)
2.3.1.10 Specter Attack and Meltdown Attack
2.3.2 Problems of Privacy and Security in Fog Computing
2.3.2.1 Authentication/Verification
2.3.2.2 Network Fortification
2.3.2.3 Confidentiality Or Privacy
2.3.2.4 Access Control/Protected Data Storage
2.3.3 Privacy and Attack Sensitivity of Edge Computing
2.4 Ensuring Security of Cloud/Fog-Based Solutions
2.4.1 Security Measures
2.4.1.1 Detect Intrusions
2.4.1.2 Safe APIs and Access
2.4.1.3 Implement Access Management
2.4.1.4 Enhanced Security Frameworks
2.4.1.5 Stronger Authentication
2.4.1.6 Limiting Access to Cloud Services
2.5 Research Challenges in Green Computing
2.5.1 Description of Challenges
2.5.1.1 New Optimization Techniques
2.5.1.2 New Efficiency Data Center
2.5.1.3 Developing Green Maturity Model
2.5.1.4 Information Resource Usage Optimization
2.5.1.5 Network for Data Center Cooling
2.5.1.6 Monitoring
2.5.2 Green Computing Practices and Issues
2.6 Further Advancements
2.6.1 Multi-Cloud Security Is Being Provided By Using Centralized Platforms By Organizations
2.6.2 Precautionary Steps Are Being Taken By Organizations to Protect Data Before It Arrives in the Cloud
2.6.3 Organizations Have Increased Their Priority for Control Identity and Access Control in the Cloud
2.6.4 SASE Is Gaining Popularity
2.6.5 Combating Struggles of Cloud-Based Solutions
2.6.6 Avoiding SaaS
2.6.7 Optimization of Internet
2.6.8 Edge Is the New Cloud
2.7 Conclusion
References
3 Systematic Study of VANET: Applications, Challenges, Threats, Attacks, Schemes and Issues in Research
3.1 Introduction
3.2 Application Areas
3.3 Layered Architecture of VANETs
3.3.1 Components of VANETs
3.3.1.1 Stationary Road Side Unit (RSU)
3.3.1.2 On Board Unit (OBU)
3.3.1.3 Application Unit (AU)
3.3.1.4 Trusted Authority (TA)
3.3.2 Transmission Methods
3.4 Challenges in VANETs
3.5 Issues in Security Requirements
3.6 Threats and Attacks
3.7 Emerging and Research Issues in VANETs
3.8 Research Work Based On Authentication in VANETs
3.9 Conclusion
References
4 Data Center Security
4.1 A Brief About Data Center
4.1.1 Modern-Day Data Centers
4.1.2 Significance of Data Centers in Businesses
4.2 Data Center Design
4.2.1 Objectives of Data Center Design
4.2.2 Data Center Design Standards
4.2.2.1 Power Needs of the Data Center
4.2.2.2 Rack Volume
4.2.2.3 Cooling
4.2.2.4 Defects
4.2.2.5 Integrated Data Center Protection and Maintenance
4.2.2.6 Connection
4.2.3 Design and Architecture of a Modern Data Center
4.3 Categorization of Data Centers
4.4 Data Center Structure
4.4.1 Components of the Data Center
4.5 Data Center Management
4.5.1 Data Center Management Problems
4.5.2 Selecting the Best Data Center Infrastructure Management Solution
4.5.3 Analyzing Data Center Infrastructure Management Software
4.5.4 Uses of Data Center Infrastructure Organization Software
4.6 Data Center Standards
4.6.1 Stand Tier of Uptime Institute
4.6.2 ANSI/BICSI 002-2014
4.6.3 ANSI/TIA 942-A 2014
4.6.4 An International Standard: EN 50600
4.6.5 Governing Standards
4.6.6 Operating Standards
4.7 Green Data Center
4.7.1 Significance of Green Data Centers
4.7.2 Grading Environmental Sustainability
4.7.2.1 Rapid Data Growth Thriving Power Demand
4.7.2.2 Economic Scalability
4.7.2.3 Guidelines for Selecting a Green Data Center
4.7.3 Green Data Center Benefits
4.7.3.1 Further Testing of Biological Diversity
4.7.3.2 Minimal Impact On the Environment
4.7.3.3 Consumes Less Power
4.7.3.4 Closing the Unused Servers
4.7.3.5 Lower Financial Costs
4.8 Data Center Security
4.8.1 Physical Protection
4.8.2 Securing the Software
4.9 Critical Aspects for Securing Data Center
4.9.1 Safety Information
4.9.2 Monitoring and Authorization Access
4.9.3 Improving Network Security
4.9.4 Data Protection
4.9.5 Infrastructure Redundancy
4.10 Data Center Security Standards
4.10.1 Safety Level
4.10.2 Logging in Access
4.10.3 Video Surveillance
4.10.4 Security Access Protocol
4.10.5 Security Round the Day/Year
4.10.6 RFID Asset Management
4.10.7 Employee Verification
4.10.8 Relieving Plans
4.10.9 Multi-Factor Authentication
4.10.10 Biometrics
4.11 Case Studies
4.11.1 Microsoft Green Under Water Data Centers
4.11.1.1 Proof of Concept
4.11.1.2 Power Wash and Data Collection
4.11.1.3 Energy, Waste and Water
References
5 Energy-Efficient Network Intrusion Detection Systems in the IOT Networks
5.1 Introduction
5.2 IOT Architectures
5.2.1 Three-Layer IOT Architecture
5.2.2 Five-Layer Architecture
5.2.3 Six-Layer Architecture
5.2.4 Fog-Based Architecture Layers
5.3 IOT Applications
5.3.1 Wearable Healthcare
5.3.2 Smart Home Applications
5.3.3 Smart Cities
5.3.4 IOT-Based Agriculture
5.3.5 IOT-Based Industrialization
5.4 Security Threats in IOT Applications
5.4.1 Literature Survey
5.4.2 Security Issues in IOT
5.4.2.1 Security Challenges for IOT Devices
5.4.2.2 Security Threats in IOT
5.4.3 Existing Security Mechanisms in IOT
5.4.3.1 Intrusion Detection Systems
5.4.3.2 Methods of Intrusion Detection
5.4.3.3 Security in Internet of Things Using Intrusion Detection Systemsβ€”Proposed System
5.4.3.4 Energy-Efficient Security
5.4.4 Conclusion
References
6 HomeTec: Energy Efficiency in Smart Home
6.1 Introduction
6.1.1 Smart LEDs
6.1.2 Smart Shower
6.1.3 Thermal Cooler
6.1.4 Auto Power Cut
6.1.5 Smart Solar Panels
6.2 Smart LED
6.3 Smart Shower
6.4 Thermal Cooler
6.5 Auto Power Cut
6.6 Smart Solar Panels
6.7 Conclusion
References
7 Impact and Suitability of Reactive Routing Protocols, Energy-Efficient and AI Techniques On QoS Parameters of WANETs
7.1 Wireless Ad Hoc Networks
7.2 Types of Routing Protocols
7.2.1 Classification of Routing Protocols
7.2.1.1 Proactive Or Table-Driven Routing Protocols
7.2.1.2 Reactive Or On-Demand Routing Protocols
7.3 Summary
References
8 Malicious Use of Machine Learning in Green ICT
8.1 Introduction to Machine Learning
8.2 Current Trends in Machine Learning
8.3 Motivation for the Application of Machine Learning in Green ICT
8.4 Prominent Machine Learning Algorithms
8.4.1 Supervised Learning
8.4.1.1 Decision Tree
8.4.1.2 NaΓ―ve Bayes
8.4.1.3 Support Vector Machine
8.4.2 Unsupervised Learning
8.4.3 Reinforcement Learning
8.4.4 Neural Network Learning
8.4.5 Instance-Based Learning
8.5 Introduction to Green ICT
8.6 Approaches to Green ICT: Green Internet Technologies
8.7 Green Data Center Technologies
8.8 Green Communication and Networking
8.9 Green Machine to Machine Technology
8.10 Green Cloud Computing
8.11 Green Wireless Sensor Network
8.12 Green RFID Technology
8.13 Machine Learning-Based Green ICT
8.14 Challenges in Machine Learning-Based Green ICT
8.15 Malicious Use of Machine Learning in Green ICT
8.16 Solution for Malicious Use of Machine Learning in Green ICT
8.17 Applications of Green ICT
8.18 Conclusion
References
9 Enhanced Framework for Energy Conservation and Overcoming Security Threats for Software-Defined Networks
9.1 Network Security and Security Framework
9.1.1 SDN Support for Security
9.2 Possible Threats and Vulnerabilities
9.2.1 Security Issues in SDN Architecture
9.3 Reasons of Security Attacks to SDN Architecture
9.3.1 Application Layer Issues
9.3.2 Control Layer Issues
9.3.3 Control Channel
9.3.4 Infrastructure Layer Issues
9.3.5 Faulty System Integration and System Complexity
9.3.6 Security Design and Implementation Inconsistencies
9.4 SDN Risk Assessment in Security Framework
9.4.1 Needs of Risk Assessment
9.4.2 Security Assessment
9.4.3 Overall Risk Assessment
9.5 Security Enforcement in SDN
9.5.1 Improving SDN Security
9.5.2 Significant Security Research Efforts
9.6 SDN Security Solutions
9.6.1 Self-Learning Threat Detection Module
9.6.2 NFV/Cloud-Based Security
9.6.3 Network State Monitoring and Analysis
9.6.4 Integrated SDN Security Framework
9.7 Conclusion
References
10 Smart Shopping Trolleys for Secure and Decentralized Services
10.1 Introduction
10.1.1 Background
10.1.1.1 IoT
10.1.1.2 YOLO
10.1.1.3 Blockchain Technology
10.2 Proposed Architecture
10.2.1 Overview
10.2.2 Implementation
10.2.3 Rationale
10.2.4 Data Sharing
10.2.5 Use Cases
10.3 Scenarios Study
10.3.1 Current Scenario
10.3.2 Solution By EasyBills
10.3.3 Results
10.4 Conclusion
References
Index


πŸ“œ SIMILAR VOLUMES


Energy Generation and Efficiency Technol
✍ David S-K. Ting, Rupp Carriveau πŸ“‚ Library πŸ“… 2019 πŸ› The Institution of Engineering and Technology 🌐 English

<p><span>Residential buildings consume about a quarter of all energy (including electrical and thermal) in industrialized countries and emit around 20% of the carbon emissions there. Older and outdated heating and cooling technology causes high energy demand and, depending on building type, secondar

Green Communication Technologies for Fut
✍ Gurjit Kaur, Akanksha Srivastava πŸ“‚ Library πŸ“… 2022 πŸ› CRC Press 🌐 English

This book explores all the energy-efficient communication technologies used for various communication systems and every aspect of these systems, such as green electronics, network protocols, handover, codes, antenna, and the role of artificial intelligence and IoT, including the energy management st

Green Communications for Energy-Efficien
✍ Himal A Suraweera, Jing Yang, Alessio Zappone, John S Thompson πŸ“‚ Library πŸ“… 2021 πŸ› Institution of Engineering & Technology 🌐 English

<p>The ICT industry is a major consumer of global energy. The energy crisis, global warming problems, dramatic growth in data traffic and the increased complexity of emerging networks are pushing academic and industry research towards the development of energy-saving and energy-efficient architectur

Green, Energy-Efficient and Sustainable
✍ Josip Lorincz (editor), Antonio Capone (editor), Luca Chiaraviglio (editor) πŸ“‚ Library πŸ“… 2020 πŸ› Mdpi AG 🌐 English

<p>The book <em>Green, Energy-Efficient and Sustainable Networks </em>provides insights and solutions for a range of problems in the field of obtaining greener, energy-efficient, and sustainable networks. The book contains the outcomes of the Special Issue on "Green, Energy-Efficient and Sustainable

Nanotechnology for Energy and Environmen
✍ Lalita Ledwani (editor), Jitendra S. Sangwai (editor) πŸ“‚ Library πŸ“… 2020 πŸ› Springer 🌐 English

<p><span>This book examines the potential applications of nanoscience and nanotechnology to promote eco-friendly processes and techniques for energy and environment sustainability. Covering various aspects of both the synthesis and applications of nanoparticles and nanofluids for energy and environm