{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T09:45:37Z","timestamp":1775209537829,"version":"3.50.1"},"publisher-location":"Cham","reference-count":90,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030222765","type":"print"},{"value":"9783030222772","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_21","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"525-554","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":67,"title":["Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network"],"prefix":"10.1007","author":[{"given":"C. L.","family":"Stergiou","sequence":"first","affiliation":[]},{"given":"A. P.","family":"Plageras","sequence":"additional","affiliation":[]},{"given":"K. E.","family":"Psannis","sequence":"additional","affiliation":[]},{"given":"B. B.","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"issue":"15","key":"21_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787\u20132805. https:\/\/doi.org\/10.1016\/j.comnet.2010.05.010 .","journal-title":"Computer Networks"},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2016","unstructured":"Stergiou, C., Psannis, K. E., Kim, B.-G., & Gupta, B. (2016). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964\u2013975.","journal-title":"Future Generation Computer Systems"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2017.09.082","volume":"82","author":"AP Plageras","year":"2018","unstructured":"Plageras, A. P., Psannis, K. E., Stergiou, C., Wang, H., & Gupta, B. B. (2018). Efficient IoT-based sensor big data collection-processing and analysis in smart buildings. Future Generation Computer Systems, 82, 349\u2013357.","journal-title":"Future Generation Computer Systems"},{"issue":"6025","key":"21_CR4","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1126\/science.1200970","volume":"332","author":"M Hilbert","year":"2011","unstructured":"Hilbert, M., & L\u00f3pez, P. (2011). The world\u2019s technological capacity to store, communicate, and compute information. Science, 332(6025), 60\u201365.","journal-title":"Science"},{"issue":"9","key":"21_CR5","doi-asserted-by":"publisher","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2015","unstructured":"Fu, Z., Ren, K., Shu, J., Sun, X., & Huang, F. (2015). Enabling personalized search over encrypted out-sourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems, 27(9), 2546\u20132559.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"2","key":"21_CR6","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s00779-013-0664-0","volume":"18","author":"J Mongay Batalla","year":"2014","unstructured":"Mongay Batalla, J., & Krawiec, P. (2014). Conception of ID layer performance at the network level for internet of things. Personal and Ubiquitous Computing, 18(2), 465\u2013480.","journal-title":"Personal and Ubiquitous Computing"},{"issue":"21","key":"21_CR7","doi-asserted-by":"publisher","first-page":"22803","DOI":"10.1007\/s11042-017-4590-4","volume":"76","author":"C Stergiou","year":"2017","unstructured":"Stergiou, C., & Psannis, K. E. (2017). Efficient and secure big data delivery in cloud computing. Multimedia Tools and Applications, 76(21), 22803\u201322822.","journal-title":"Multimedia Tools and Applications"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Stergiou, C., Psannis, K. E., Plageras, A. P., Kokkonis, G., & Ishibashi, Y. (2017, June 19\u201321). Architecture for security in IoT environments. In Proceedings of 26th IEEE International Symposium on Industrial Electronics, Edinburgh, Scotland.","DOI":"10.1109\/ISIE.2017.8001447"},{"issue":"2","key":"21_CR9","first-page":"18","volume":"4","author":"AR Sfar","year":"2018","unstructured":"Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in internet of things. Digital Communications and Networks (DCN), 4(2), 18\u2013137.","journal-title":"Digital Communications and Networks (DCN)"},{"key":"21_CR10","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MWC.2016.7422401","volume":"23","author":"Y Kryftis","year":"2016","unstructured":"Kryftis, Y., Mastorakis, G., Mavromoustakis, C., Mongay Batalla, J., Pallis, E., & Kormentzas, G. (2016). Efficient entertainment services provision over a novel network architecture. IEEE Wireless Communications Magazine, 23, 14.","journal-title":"IEEE Wireless Communications Magazine"},{"key":"21_CR11","first-page":"1","volume":"27","author":"C Stergiou","year":"2016","unstructured":"Stergiou, C., & Psannis, K. E. (2016). Recent advances delivered by mobile cloud computing and internet of things for big data applications: A survey. International Journal of Network Management, 27, 1\u201312.","journal-title":"International Journal of Network Management"},{"issue":"1","key":"21_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.24167\/sisforma.v5i1.1526","volume":"5","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K. E., Plageras, A. P., Ishibashi, Y., & Kim, B.-G. (2018). Algorithms for efficient digital media transmission over IoT and cloud networking. Journal of Multimedia Information System, 5(1), 1\u201310.","journal-title":"Journal of Multimedia Information System"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Stergiou, C., Psannis, K. E., Plageras, A. P., Kokkonis, G., & Ishibashi, Y. (2017, June). Architecture for security monitoring in IoT environments. In Proceedings of IEEE 26th international symposium on industrial electronics, Edinburgh, Scotland.","DOI":"10.1109\/ISIE.2017.8001447"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Plageras, A. P., Psannis, K. E., Ishibashi, Y., & Kim, B.-G. (2016, October). IoT-based surveillance system for ubiquitous healthcare. In Proceedings of IEEE\/IECON 2016 - 42nd Annual Conference of the IEEE, Industrial Electronics Society.","DOI":"10.1109\/IECON.2016.7793281"},{"key":"21_CR15","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.1109\/TII.2017.2651880","volume":"13","author":"J Li","year":"2017","unstructured":"Li, J., Huang, L., Zhou, Y., He, S., & Ming, Z. (2017). Computation partitioning for mobile cloud computing in a big data environment. IEEE Transactions on Industrial Informatics, 13, 2009\u20132018.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"12","key":"21_CR16","doi-asserted-by":"publisher","first-page":"7938","DOI":"10.1109\/TIE.2015.2481792","volume":"62","author":"R Yu","year":"2015","unstructured":"Yu, R., Huang, X., Kang, J., Ding, J., Maharjan, S., Gjessing, S., & Zhang, Y. (2015). Cooperative resource management in cloud-enabled vehicular networks. IEEE Transactions on Industrial Informatics, 62(12), 7938\u20137951.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"21_CR17","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5895817","volume":"2018","author":"D Agrawal","year":"2018","unstructured":"Agrawal, D., Gupta, B. B., Yamaguchi, S., & Psannis, K. E. (2018). Recent advances in mobile cloud computing. Wireless Communications and Mobile Computing, 2018, 5895817.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Ali, A. M. M., Ahmad, N. M., & Amin, A. H. M. (2014, December). Cloudlet-based cyber foraging framework for distributed video surveillance provisioning. In 2014 Fourth World Congress on Information and Communication Technologies (WICT), Bandar Hilir, Malaysia.","DOI":"10.1109\/WICT.2014.7076905"},{"issue":"2","key":"21_CR19","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11036-013-0477-4","volume":"19","author":"MR Rahimi","year":"2014","unstructured":"Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A., & Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2), 133\u2013143.","journal-title":"Mobile Networks and Applications"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Fremdt, S., Beck, R., & Weber, S. (2013, October) Does cloud computing matter? An analysis of the cloud model software-as-a-service and its impact on operational agility. In 46th Hawaii International Conference on System Sciences (pp. 1025\u20131034).","DOI":"10.1109\/HICSS.2013.182"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Stergiou, C., & Psannis, K. E. (2017, July 24\u201326). Algorithms for big data in advanced communication systems and cloud computing. In Proceedings of 19th IEEE Conference on Business Informatics 2017 (CBI2017), Doctoral Consortium, Thessaloniki, Greece.","DOI":"10.1109\/CBI.2017.28"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Plageras, A. P., Stergiou, C., Psannis, K. E., Kim, B.-G., Gupta, B., & Ishibashi, Y. (2017, July 24\u201326). Solutions for inter-connectivity and security in a smart hospital building. In Proceedings of 15th IEEE International Conference on Industrial Informatics (INDIN 2017), Emden, Germany.","DOI":"10.1109\/INDIN.2017.8104766"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Thirumalai, C., & Kar, H. (2018, April 21\u201322). Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices. In IEEE, Proceedings of 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), Vellore, India.","DOI":"10.1109\/IPACT.2017.8244948"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Plageras, A. P., Stergiou, C., Psannis, K. E., Kokkonis, G., Ishibashi, Y., Kim, B.-G., et al. (2017, July 24\u201326). Efficient large-scale medical data (eHealth big data) analytics in internet of things. In Proceedings of 19th IEEE International Conference on Business Informatics (CBI\u201917), International Workshop on the Internet of Things and Smart Services (ITSS2017), Thessaloniki, Greece.","DOI":"10.1109\/CBI.2017.3"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Stergiou, C., Psannis, K. E., Plageras, A. P., Xifilidis, T., & Gupta, B. B. (2018, April 15\u201320). Security and privacy of big data for social networking services in cloud. In Proceedings of IEEE conference on Computer Communications (IEEE INFOCOM 2018), Honolulu, HI.","DOI":"10.1109\/INFCOMW.2018.8406831"},{"key":"21_CR26","doi-asserted-by":"publisher","unstructured":"Angin, P., Bhargava, B., Ranchal, R., Singh, N., & Linderman, M. (2010, October 31\u2013November 3). An entity-centric approach for privacy and identity management in cloud computing. In Proceedings of 29th IEEE International Symposium on Reliable Distributed Systems, New Delhi, India. https:\/\/doi.org\/10.1109\/SRDS.2010.28 .","DOI":"10.1109\/SRDS.2010.28"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Doukas, C, Pliakas, T., & Maglogiannis, I. (2010, August 31\u2013September 4). Mobile healthcare information management utilizing cloud computing and android OS. In Proceedings of 32nd Annual International Conference of the IEEE EMBS 2010, Buenos Aires, Argentina.","DOI":"10.1109\/IEMBS.2010.5628061"},{"key":"21_CR28","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1002\/wcm.1203","volume":"13","author":"HT Dinh","year":"2011","unstructured":"Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2011). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13, 1587\u20131611. https:\/\/doi.org\/10.1002\/wcm.1203 .","journal-title":"Wireless Communications and Mobile Computing"},{"key":"21_CR29","unstructured":"Habib, S. M., Ries, S., & Muhlhauser, M. (2011, November 16\u201318). Towards a trust management system for cloud computing. In Proceedings of IEEE International Joint Conference TrustCom-11\/IEEE ICESS-11\/FCST-11, Changsha, China."},{"issue":"7","key":"21_CR30","first-page":"7","volume":"2","author":"MR Prasad","year":"2012","unstructured":"Prasad, M. R., Gyani, J., & Murti, P. R. K. (2012). Mobile cloud computing: Implications and challenges. Journal of Information Engineering and Applications, 2(7), 7\u201315.","journal-title":"Journal of Information Engineering and Applications"},{"issue":"3","key":"21_CR31","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/SURV.2012.111412.00045","volume":"15","author":"M Shiraz","year":"2012","unstructured":"Shiraz, M., Gani, A., Khokhar, R. H., & Buyya, R. (2012). A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. IEEE Communications Surveys & Tutorials, 15(3), 1294\u20131313.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"4","key":"21_CR32","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1007\/s10586-013-0248-9","volume":"16","author":"M Kim","year":"2013","unstructured":"Kim, M., & Park, S. O. (2013). Trust management on user behavioral patterns for a mobile cloud computing. Cluster Computing, 16(4), 725\u2013731. https:\/\/doi.org\/10.1007\/s10586-013-0248-9 .","journal-title":"Cluster Computing"},{"key":"21_CR33","unstructured":"Stergiou, C., Psannis, K. E., & Gupta, B. B. (2019) Advanced media-based smart big data on intelligent cloud systems. IEEE Transactions on Sustainable Computing, 4(1), 77\u201387."},{"issue":"4","key":"21_CR34","first-page":"273","volume":"7","author":"AA Gnana Singh","year":"2016","unstructured":"Gnana Singh, A. A., Tamizhpoonguil, B., & Jebamalar Leavline, E. (2016). A survey on big data and cloud computing. International Journal on Recent and Innovation Trends in Computing and Communication, 7(4), 273\u2013277.","journal-title":"International Journal on Recent and Innovation Trends in Computing and Communication"},{"issue":"133","key":"21_CR35","first-page":"14","volume":"12","author":"O Awodele","year":"2016","unstructured":"Awodele, O., Izang, A. A., Kuyoro, S. O., & Osisanwo, F. Y. (2016). Big data and cloud computing issues. International Journal of Computer Applications, 12(133), 14\u201319.","journal-title":"International Journal of Computer Applications"},{"key":"21_CR36","doi-asserted-by":"crossref","unstructured":"Rallapallia, S., Gondkar, R. R., & Ketavarapu, U. P. K. (2015, December). Impact of processing and analyzing healthcare big data on cloud computing environment by implementing Hadoop cluster. In International Conference on Computational Modeling and Security (CMS2016) (pp. 16\u201322).","DOI":"10.1016\/j.procs.2016.05.171"},{"issue":"8","key":"21_CR37","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.1016\/j.jcss.2014.12.021","volume":"81","author":"JL Hernandez-Ramos","year":"2015","unstructured":"Hernandez-Ramos, J. L., Moreno, M. V., Bernabe, J. B., Carrillo, D. G., & Skarmeta, A. F. (2015). SAFIR: Secure access framework for IoT-enabled services on smart buildings. Journal of Computer and System Sciences, 81(8), 1452\u20131463.","journal-title":"Journal of Computer and System Sciences"},{"issue":"5","key":"21_CR38","doi-asserted-by":"publisher","first-page":"1749","DOI":"10.1007\/s00500-015-1679-4","volume":"20","author":"MV Moreno","year":"2016","unstructured":"Moreno, M. V., Dufour, L., Skarmeta, A. F., Jara, A. J., Genoud, D., Ladevie, B., & Bezian, J.-J. (2016). Big data: The key to energy efficiency in smart buildings. Soft Computing, 20(5), 1749\u20131762.","journal-title":"Soft Computing"},{"key":"21_CR39","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.protcy.2016.03.025","volume":"23","author":"J Shah","year":"2016","unstructured":"Shah, J., & Mishra, B. (2016). Customized IoT enabled wireless sensing and monitoring platform for smart buildings. Procedia Technology, 23, 256\u2013263.","journal-title":"Procedia Technology"},{"key":"21_CR40","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.future.2016.12.021","volume":"74","author":"H Ben Sta","year":"2017","unstructured":"Ben Sta, H. (2017). Quality and the efficiency of data in \u201csmart-cities\u201d. Future Generation Computer Systems, 74, 409\u2013416.","journal-title":"Future Generation Computer Systems"},{"key":"21_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2018","unstructured":"Li, J., Zhang, Y., Chen, X., & Xiang, Y. (2018). Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security, 72, 1\u201312.","journal-title":"Computers & Security"},{"key":"21_CR42","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1016\/j.future.2016.01.006","volume":"80","author":"M Qiu","year":"2018","unstructured":"Qiu, M., Gai, K., Thuraisingham, B., Tao, L., & Zhao, H. (2018). Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Generation Computer Systems, 80, 421\u2013429.","journal-title":"Future Generation Computer Systems"},{"key":"21_CR43","doi-asserted-by":"publisher","first-page":"20596","DOI":"10.1109\/ACCESS.2018.2817615","volume":"6","author":"M Elhoseny","year":"2018","unstructured":"Elhoseny, M., Ramirez-Gonzalez, G., Abu-Elnasr, O. M., Shawkat, S. A., Arunkumar, N., & Farouk, A. (2018). Secure medical data transmission model for IoT-based healthcare systems. IEEE Access, 6, 20596\u201320608.","journal-title":"IEEE Access"},{"issue":"3","key":"21_CR44","doi-asserted-by":"publisher","first-page":"380","DOI":"10.3390\/electronics4030380","volume":"4","author":"EB Hamida","year":"2015","unstructured":"Hamida, E. B., Noura, H., & Znaidi, W. (2015). Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures. Electronics, 4(3), 380\u2013423.","journal-title":"Electronics"},{"issue":"8","key":"21_CR45","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MC.2016.245","volume":"49","author":"AV Dastjerdi","year":"2016","unstructured":"Dastjerdi, A. V., & Buyya, R. (2016). Fog computing: Helping the internet of things realize its potential. IEEE Computer, 49(8), 112\u2013116.","journal-title":"IEEE Computer"},{"key":"21_CR46","doi-asserted-by":"crossref","unstructured":"Barreno, M., Nelson, B., Sears, R., Joseph, A. D., & Tygar, J. D. (2006, March 21\u201324). Can machine learning be secure? In ACM, in Proceedings of the 2006 ACM Symposium on Information, Computer And Communications Security, ASIACCS \u201906, Taipei, Taiwan (pp. 16\u201325).","DOI":"10.1145\/1128817.1128824"},{"key":"21_CR47","doi-asserted-by":"crossref","unstructured":"Liao, X., Ding, L., & Wang, Y. (2011, June 27\u201329). Secure machine learning, a brief overview. In IEEE, Proceedings of 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement \u2013 Companion, Jeju Island, South Korea.","DOI":"10.1109\/SSIRI-C.2011.15"},{"issue":"2","key":"21_CR48","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10994-010-5188-5","volume":"81","author":"M Barreno","year":"2010","unstructured":"Barreno, M., Nelson, B., Joseph, A. D., & Tygar, J. D. (2010). The security of machine learning. Machine Learning, 81(2), 121\u2013148.","journal-title":"Machine Learning"},{"key":"21_CR49","doi-asserted-by":"crossref","unstructured":"Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., et al. (2017, October 30\u2013November 3). Practical secure aggregation for privacy-preserving machine learning. In ACM, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201917, Dallas, TX (pp. 1175\u20131191).","DOI":"10.1145\/3133956.3133982"},{"issue":"4","key":"21_CR50","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/TDSC.2017.2700270","volume":"16","author":"Ambra Demontis","year":"2019","unstructured":"Demontis, A., Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., et al. (2017). Yes, machine learning can be more secure! A case study on android malware detection. IEEE Transactions on Dependable and Secure Computing (Early Access), 16(4), 711\u2013724.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"14","key":"21_CR51","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1016\/j.scib.2017.06.007","volume":"64","author":"Y-B Sheng","year":"2017","unstructured":"Sheng, Y.-B., & Zhou, L. (2017). Distributed secure quantum machine learning. Science Bulletin, 64(14), 1025\u20131029.","journal-title":"Science Bulletin"},{"key":"21_CR52","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.inffus.2015.08.005","volume":"28","author":"G Bello-Orgaz","year":"2016","unstructured":"Bello-Orgaz, G., Jung, J. J., & Camacho, D. (2016). Social big data: Recent achievements and new challenges. Information Fusion, 28, 45\u201359.","journal-title":"Information Fusion"},{"issue":"2","key":"21_CR53","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ijinfomgt.2014.10.007","volume":"35","author":"A Gandomi","year":"2015","unstructured":"Gandomi, A., & Haider, M. (2015). Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 35(2), 137\u2013144.","journal-title":"International Journal of Information Management"},{"issue":"4","key":"21_CR54","doi-asserted-by":"publisher","first-page":"e1978","DOI":"10.1002\/nem.1978","volume":"27","author":"N Kaur","year":"2017","unstructured":"Kaur, N., & Sood, S. K. (2017). Dynamic resource allocation for big data streams based on data characteristics (5Vs). International Journal of Network Management, 27(4), e1978.","journal-title":"International Journal of Network Management"},{"key":"21_CR55","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1109\/ACCESS.2014.2332453","volume":"2","author":"H Hu","year":"2014","unstructured":"Hu, H., Wen, Y., Chua, T. S., & Li, X. (2014). Toward scalable systems for big data analytics: A technology tutorial. IEEE Access, 2, 652\u2013687.","journal-title":"IEEE Access"},{"issue":"8","key":"21_CR56","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1007\/s12045-016-0376-7","volume":"21","author":"V Rajaraman","year":"2016","unstructured":"Rajaraman, V. (2016). Big data analytics. Resonance, 21(8), 695\u2013716.","journal-title":"Resonance"},{"issue":"6","key":"21_CR57","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1007\/s00778-014-0357-y","volume":"23","author":"A Alexandrov","year":"2014","unstructured":"Alexandrov, A., Bergmann, R., Ewen, S., Freytag, J. C., Hueske, F., Heise, A., et al. (2014). The stratosphere platform for big data analytics. The VLDB Journal, 23(6), 939\u2013964.","journal-title":"The VLDB Journal"},{"issue":"3","key":"21_CR58","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.ijinfomgt.2014.02.002","volume":"34","author":"O Kwon","year":"2014","unstructured":"Kwon, O., Lee, N., & Shin, B. (2014). Data quality management, data usage experience and acquisition intention of big data analytics. International Journal of Information Management, 34(3), 387\u2013394.","journal-title":"International Journal of Information Management"},{"issue":"22","key":"21_CR59","doi-asserted-by":"publisher","first-page":"3366","DOI":"10.1109\/TIP.2013.2264820","volume":"9","author":"K M\u00fcller","year":"2013","unstructured":"M\u00fcller, K., Schwarz, H., Marpe, D., Bartnik, C., Bosse, S., & Brust, H. (2013). 3D high-efficiency video coding for multi-view video and depth data. IEEE Transactions on Image Processing, 9(22), 3366\u20133378.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"15","key":"21_CR60","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/TMM.2012.2231060","volume":"2","author":"L Shen","year":"2013","unstructured":"Shen, L., Liu, Z., Zhang, X., Zhao, W., & Zhang, Z. (2013). An effective CU size decision method for HEVC encoders. IEEE Transactions on Multimedia, 2(15), 465\u2013470.","journal-title":"IEEE Transactions on Multimedia"},{"issue":"22","key":"21_CR61","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1109\/TCSVT.2012.2221192","volume":"12","author":"J-R Ohm","year":"2012","unstructured":"Ohm, J.-R., Sullivan, G. J., Schwarz, H., Tan, T. K., & Wiegand, T. (2012). Comparison of the coding efficiency of video coding standards \u2013 including high efficiency video coding (HEVC). IEEE Transactions on Circuits and Systems for Video Technology, 12(22), 1669\u20131684.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"2","key":"21_CR62","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s11554-015-0496-4","volume":"12","author":"JM Batalla","year":"2015","unstructured":"Batalla, J. M. (2015). Advanced multimedia service provisioning based on efficient interoperability of adaptive streaming protocol and high efficient video coding. Journal of Real-Time Image Processing, 12(2), 443\u2013454.","journal-title":"Journal of Real-Time Image Processing"},{"key":"21_CR63","unstructured":"Rouse, M. (2015, November 1). IoT security (internet of things security). IoT Agenda [Online]. Retrieved July 27, 2016, from http:\/\/internetofthingsagenda.techtarget.com\/definition\/IoT-security-Internet-of-Things-security"},{"key":"21_CR64","doi-asserted-by":"crossref","unstructured":"Plageras, A. P., & Psannis, K. E. (2017, July 24\u201326). Algorithms for big data delivery over the internet of things. In Proceedings of 19th IEEE Conference on Business Informatics 2017 (CBI2017), Doctoral Consortium, Thessaloniki, Greece.","DOI":"10.1109\/CBI.2017.27"},{"issue":"3","key":"21_CR65","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L Dong","year":"2010","unstructured":"Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875\u20131888.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"21_CR66","first-page":"896","volume":"24","author":"A Nair","year":"2016","unstructured":"Nair, A., Shaniba Asmi, P., & Aloor, G. (2016). Analysis of physical layer security via co-operative communication in internet of things. International Conference on Emerging Trends in Engineering, Science and Technology (ICETEST - 2015), 24, 896\u2013903.","journal-title":"International Conference on Emerging Trends in Engineering, Science and Technology (ICETEST - 2015)"},{"issue":"5","key":"21_CR67","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1806895.1806900","volume":"7","author":"W Hu","year":"2010","unstructured":"Hu, W., Tan, H., Corke, P., Shih, W. C., & Jha, S. (2010). Toward trusted wireless sensor networks. ACM Transactions on Sensor Networks, 7(5), 1\u201325.","journal-title":"ACM Transactions on Sensor Networks"},{"issue":"10","key":"21_CR68","first-page":"27","volume":"6","author":"D Huang","year":"2011","unstructured":"Huang, D. (2011). Mobile cloud computing. IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter, 6(10), 27\u201331.","journal-title":"IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter"},{"key":"21_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/480435","volume":"2014","author":"MN Haque","year":"2014","unstructured":"Haque, M. N., Chowdhury, M. R. K., Gani, A., & Whaiduzzaman, M. (2014). A study on strategic provision of cloud computing services. The Scientific World Journal, 2014, 1\u20138.","journal-title":"The Scientific World Journal"},{"issue":"4","key":"21_CR70","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1016\/j.future.2012.06.006","volume":"29","author":"SK Garg","year":"2013","unstructured":"Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012\u20131023.","journal-title":"Future Generation Computer Systems"},{"issue":"42","key":"21_CR71","doi-asserted-by":"publisher","first-page":"7905","DOI":"10.1016\/j.eswa.2015.06.025","volume":"11","author":"M Haghighat","year":"2015","unstructured":"Haghighat, M., Zonouz, S., & Abdel-Mottaleb, M. (2015). CloudID: Trustworthy cloud-based and cross-enterprise biometric identification. Expert Systems with Applications, 11(42), 7905\u20137916.","journal-title":"Expert Systems with Applications"},{"key":"21_CR72","unstructured":"Kumar, Y., Munjal, R., & Sharma, H. (2011). Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. IJCSMS International Journal of Computer Science and Management Studies, 11(3), 68\u201376."},{"issue":"3","key":"21_CR73","first-page":"171","volume":"3","author":"R Kaur","year":"2014","unstructured":"Kaur, R., & Kinger, S. (2014). Analysis of security algorithms in cloud computing. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 3(3), 171\u2013176.","journal-title":"International Journal of Application or Innovation in Engineering & Management (IJAIEM)"},{"issue":"7","key":"21_CR74","first-page":"2058","volume":"4","author":"G Singh","year":"2013","unstructured":"Singh, G., & Kinger, S. (2013). Integrating AES, DES, and 3-DES encryption algorithms for enhanced data security. International Journal of Scientific & Engineering Research, 4(7), 2058.","journal-title":"International Journal of Scientific & Engineering Research"},{"issue":"67","key":"21_CR75","doi-asserted-by":"publisher","first-page":"19","DOI":"10.5120\/11422-6766","volume":"9","author":"A Sachdev","year":"2013","unstructured":"Sachdev, A., & Bhansali, M. (2013). Enhancing cloud computing security using AES algorithm. International Journal of Computer Applications, 9(67), 19\u201323.","journal-title":"International Journal of Computer Applications"},{"key":"21_CR76","unstructured":"Viswanathan, P. (2012, July 7). Cloud computing \u2013 is it really all that beneficial? abouttech [Online]. Retrieved May 24, 2017, from http:\/\/mobiledevices.about.com\/od\/additionalresources\/a\/Cloud-Computing-Is-It-Really-All-That-Beneficial.htm"},{"key":"21_CR77","doi-asserted-by":"crossref","unstructured":"Pfarr, F., Buckel, T., & Winkelmann, A. (2014, January 6\u20139). Cloud computing data protection \u2013 a literature review and analysis. In Proceedings of 47th Hawaii International Conference on System Sciences, Waikoloa, HI (pp. 5018\u20135027).","DOI":"10.1109\/HICSS.2014.616"},{"key":"21_CR78","unstructured":"Almrot, E., & Andersson, S. (2013, May). A study of the advantages and disadvantages of mobile cloud computing versus native environment. Digitala Vetenskapliga Arkivet, Bachelor Thesis in Software Engineering, Blekinge Institute of Technology, Karlskrona."},{"key":"21_CR79","doi-asserted-by":"crossref","unstructured":"Fremdt, S., Beck, R., & Weber, S. (2013, January 7\u201310). Does cloud computing matter? An analysis of the cloud model software-as-a-service and its impact on operational agility. In Proceedings of 46th Hawaii International Conference on System Sciences 2013, Wailea, Maui, HI (pp. 1025\u20131034).","DOI":"10.1109\/HICSS.2013.182"},{"key":"21_CR80","unstructured":"Blog: Follow what\u2019s happening at Get Cloud Services. (2014, December 23). Mobile cloud computing \u2013 pros and cons. GetCloud Services [Online]. Retrieved December 24, 2017, from https:\/\/www.getcloudservices.com\/blog\/mobile-cloud-computing-pros-and-cons\/"},{"key":"21_CR81","doi-asserted-by":"crossref","unstructured":"Shi, E., Niu, Y., Jakobsoon, M., & Chow, R. (2010, October 25\u201328). Implicit authentication through learning user behavior. In ACM, Proceedings of ISC\u201910 13th International Conference on Information Security, Boca Raton, FL (pp. 99\u2013113).","DOI":"10.1007\/978-3-642-18178-8_9"},{"key":"21_CR82","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T. (2011) The NIST definition of cloud computing. Recommendations of the National Institute of Standards and Technology, Special Publication 800\u2013145. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg. MD 20899\u20138930.","DOI":"10.6028\/NIST.SP.800-145"},{"key":"21_CR83","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., de Donato, W., Persico, V., & Pescap\u00e8, A. (2016). Integration of cloud computing and internet of things: A survey. Journal of Future Generation Computer Systems, 56, 684\u2013700.","journal-title":"Journal of Future Generation Computer Systems"},{"key":"21_CR84","unstructured":"Bhattasali, T., Chaki, R., & Chaki, N. (2013). Secure and trusted cloud of things. In: India Conference (INDICON), 2013 Annual IEEE (pp. 1\u20136)."},{"key":"21_CR85","unstructured":"Simmhan, Y., Kumbhare, A. G., Cao, B., & Prasanna, V. (2011). An analysis of security and privacy issues in smart grid software architectures on clouds. In: Cloud Computing (CLOUD), IEEE International Conference on IEEE (pp. 582\u2013589)."},{"issue":"3","key":"21_CR86","first-page":"369","volume":"44","author":"N Grozev","year":"2014","unstructured":"Grozev, N., & Buyya, R. (2014). Inter-cloud architectures and application brokering: Taxonomy and survey. Software: Practice and Experience, 44(3), 369\u2013390.","journal-title":"Software: Practice and Experience"},{"key":"21_CR87","unstructured":"Rao, B. P., Saluia, P., Sharma, N., Mittal, A., & Sharma, S. V. (2012). Cloud computing for internet of things and sensing based applications. In: Sensing Technology (ICST), 2012 Sixth International Conference on IEEE (pp. 374\u2013380)."},{"issue":"2","key":"21_CR88","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1109\/TII.2014.2299233","volume":"10","author":"W He","year":"2014","unstructured":"He, W., Yan, G., & Xu, L. D. (2014). Developing vehicular data cloud services in the IoT environment. IEEE Transactions on Industrial Informatics, 10(2), 1587\u20131595.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"21_CR89","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.future.2013.07.014","volume":"37","author":"C Dobre","year":"2014","unstructured":"Dobre, C., & Xhafa, F. (2014). Intelligent services for big data science. Future Generation Computer Systems, 37, 267\u2013281.","journal-title":"Future Generation Computer Systems"},{"issue":"9","key":"21_CR90","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1016\/j.comnet.2013.04.001","volume":"57","author":"G Aceto","year":"2013","unstructured":"Aceto, G., Botta, A., de Donato, W., & Pescap\u00e8, A. (2013). Cloud monitoring: A survey. Computer Networks, 57(9), 2093\u20132115.","journal-title":"Computer Networks"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,14]],"date-time":"2021-02-14T15:39:55Z","timestamp":1613317195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":90,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_21","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}