Catalogue

Record Details

Catalogue Search



Automated secure computing for next-generation systems  Cover Image E-book E-book

Automated secure computing for next-generation systems / edited by Amit Kumar Tyagi.

Tyagi, Amit Kumar, (editor.).

Summary:

AUTOMATED SECURE COMPUTING FOR NEXT-GENERATION SYSTEMS This book provides cutting-edge chapters on machine-empowered solutions for next-generation systems for today's society. Security is always a primary concern for each application and sector. In the last decade, many techniques and frameworks have been suggested to improve security (data, information, and network). Due to rapid improvements in industry automation, however, systems need to be secured more quickly and efficiently. It is important to explore the best ways to incorporate the suggested solutions to improve their accuracy while reducing their learning cost. During implementation, the most difficult challenge is determining how to exploit AI and ML algorithms for improved safe service computation while maintaining the user's privacy. The robustness of AI and deep learning, as well as the reliability and privacy of data, is an important part of modern computing. It is essential to determine the security issues of using AI to protect systems or ML-based automated intelligent systems. To enforce them in reality, privacy would have to be maintained throughout the implementation process. This book presents groundbreaking applications related to artificial intelligence and machine learning for more stable and privacy-focused computing. By reflecting on the role of machine learning in information, cyber, and data security, Automated Secure Computing for Next-Generation Systems outlines recent developments in the security domain with artificial intelligence, machine learning, and privacy-preserving methods and strategies. To make computation more secure and confidential, the book provides ways to experiment, conceptualize, and theorize about issues that include AI and machine learning for improved security and preserve privacy in next-generation-based automated and intelligent systems. Hence, this book provides a detailed description of the role of AI, ML, etc., in automated and intelligent systems used for solving critical issues in various sectors of modern society. Audience Researchers in information technology, robotics, security, privacy preservation, and data mining. The book is also suitable for postgraduate and upper-level undergraduate students.

Record details

  • ISBN: 9781394213924
  • ISBN: 1394213921
  • ISBN: 9781394213948
  • ISBN: 1394213948
  • Physical Description: 1 online resource (468 p.)
  • Publisher: Hoboken, NJ : John Wiley & Sons, Inc. ; 2024.

Content descriptions

General Note:
Description based upon print version of record.
Chapter 4 Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications for Next-Generation Society
Formatted Contents Note:
Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgements -- Part 1: Fundamentals -- Chapter 1 Digital Twin Technology: Necessity of the Future in Education and Beyond -- 1.1 Introduction -- 1.2 Digital Twins in Education -- 1.2.1 Virtual Reality for Immersive Learning -- 1.2.2 Delivery of Remote Education -- 1.2.3 Replication of Real-World Scenarios -- 1.2.4 Promote Intelligences and Personalization -- 1.3 Examples and Case Studies -- 1.3.1 Examples of DTT in Education -- 1.3.2 Digital Twin-Based Educational Systems -- 1.4 Discussion -- 1.5 Challenges and Limitations
1.5.1 Technical Challenges -- 1.5.2 Pedagogical Challenges -- 1.5.3 Ethical and Privacy Concerns -- 1.5.4 Future Research Directions -- 1.6 Conclusion -- References -- Chapter 2 An Intersection Between Machine Learning, Security, and Privacy -- 2.1 Introduction -- 2.2 Machine Learning -- 2.2.1 Overview of Machine Learning -- 2.2.2 Machine Learning Stages: Training and Inference -- 2.3 Threat Model -- 2.3.1 Attack Model of Machine Learning -- 2.3.2 Trust Model -- 2.3.3 Machine Learning Capabilities in a Differential Environment -- 2.3.4 Opposite Views of Machine Learning in Security
2.4 Training in a Differential Environment -- 2.4.1 Achieving Integrity -- 2.5 Inferring in Adversarial Attack -- 2.5.1 Combatants in the White Box Model -- 2.5.2 Insurgencies in the Black Box Model -- 2.6 Machine Learning Methods That Are Sustainable, Private, and Accountable -- 2.6.1 Robustness of Models to Distribution Drifts -- 2.6.2 Learning and Inferring With Privacy -- 2.6.3 Fairness and Accountability in Machine Learning -- 2.7 Conclusion -- References -- Chapter 3 Decentralized, Distributed Computing for Internet of Things-Based Cloud Applications
3.1 Introduction to Volunteer Edge Cloud for Internet of Things Utilising Blockchain -- 3.2 Significance of Volunteer Edge Cloud Concept -- 3.3 Proposed System -- 3.3.1 Smart Contract -- 3.3.2 Order Task Method -- 3.3.3 KubeEdge -- 3.4 Implementation of Volunteer Edge Control -- 3.4.1 Formation of a Cloud Environment -- 3.5 Result Analysis of Volunteer Edge Cloud -- 3.6 Introducing Blockchain-Enabled Internet of Things Systems Using the Serverless Cloud Platform -- 3.7 Introducing Serverless Cloud Platforms -- 3.7.1 IoT Systems -- 3.7.2 JointCloud -- 3.7.3 Computing Without Servers
3.7.4 Oracle and Blockchain Technology -- 3.8 Serverless Cloud Platform System Design -- 3.8.1 Aim and Constraints -- 3.8.2 Goals and Challenges -- 3.8.3 HCloud Connections -- 3.8.4 Data Sharing Platform -- 3.8.5 Cloud Manager -- 3.8.6 The Agent -- 3.8.7 Client Library -- 3.8.8 Witness Blockchain -- 3.9 Evaluation of HCloud -- 3.9.1 CPU Utilization -- 3.9.2 Cost Analysis -- 3.10 HCloud-Related Works -- 3.10.1 Serverless -- 3.10.2 Efficiency -- 3.11 Conclusion -- References
Source of Description Note:
Description based on online resource; title from digital title page (viewed on April 10, 2024).
Subject: Computer security.
Sécurité informatique.


Additional Resources