Preface
Due to the rapid growth of all kinds of devices currently being controlled over the Internet, the various products come with security issues. This book examines the issues and vulnerabilities inherent in these products and what can be done to solve them by investigating their roots. Programming and attention to good security practices can combat these problems, which are a result of the lax security processes of the internet of things, cloud computing and social media. This book is for those interested in understanding the vulnerabilities of the internet of things and cloud computing such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and creators. This book assumes the reader has little experience or knowledge of the internet of things, cloud computing and social media.
Included in the 16 chapters of this book are the following studies. In Chapter 1, Anindita Desarkar and Ajanta Das present a few well-known encryption-decryption-based algorithms which are aimed at protecting cloud stored data from unauthorized access. Chapter 2 provides a detailed understanding of security issues in cloud computing. This study helps in determining and categorizing its prime security-related issues and concerns, thereby presenting an overview of the present scenario of security in the cloud computing environment. In Chapter 3, Dumka et al. discuss different types of security and challenges in mobile cloud computing ...
Get Security Designs for the Cloud, IoT, and Social Networking now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.