Security Designs for the Cloud, IoT, and Social Networking
by Dac-Nhuong Le, Chintan Bhatt, Mani Madhukar
List of Figures
1.1 Layers of cloud computing.
1.3 Outline of 3-key Triple DES algorithm.
2.3 Cloud computing security issues.
2.5 Proposed EGA-CS algorithm.
2.6 Comparison between LineSwitch, SecSDN-cloud and AvantGuard.
2.7 Comparison between BFT and SecSDN-cloud in response to a Byzantine attack.
2.8 Flow table overloading attacks against robustness.
2.9 Comparison of bandwidth consumption of different frameworks with respect to simulation time.
2.10 Comparison of throughput of different frameworks with respect to switches count.
2.11 Comparison of end-to-end delay of different frameworks with respect to simulation time.
2.12 Comparison of packet loss of different frameworks with respect to simulation time.
3.1 Mobile as a service consumer model.
3.2 Mobile as a service provider service model.
3.3 Mobile as a service broker service model.
3.4 Architecture of integration of mobile cloud computing with IoT.
3.5 Cloud computing architecture.
3.6 Classification of security issues in mobile cloud computing.
4.1 Fog computing architecture by Cisco.
4.2 Cisco IOx enables fog computing.
4.3 Fog computing in smart grid.
4.4 Fog computing in smart traffic lights and connected vehicles.
4.5 Fog computing in SDN in vehicular networks.
4.6 Scenario for a man-in-the-middle attack against Fog.