XV
CONTENTS
10.4.3.2 Virtual Worlds and Interactive
Surfaces 396
10.4.3.3 Interactive Surfaces 397
10.4.4 Processes for Increased Leisure Experience 399
10.4.4.1 Finnish Sauna at Helsinki Airport 399
10.4.4.2 Free Sightseeing Tour at Changi
Airport, Singapore 399
10.4.4.3 Free Cooking Classes at Paris
Orly Airport 400
10.4.4.4 Traditional Culture Workshops at
Incheon Airport, South Korea 400
10.4.5 IT for the Benefits of Passengers 401
10.4.5.1 Cloud Computing 402
10.4.5.2 Telepresence 402
10.4.5.3 Wireless Broadband 403
10.5 Envisioning Airports of the Future (Airport 3.0) 403
10.5.1 Conceptual Models 404
10.5.1.1 Independent City Model 404
10.5.1.2 Extended City Model 404
10.5.1.3 Transit Point Model 404
10.5.2 Infrastructure Models 404
10.5.2.1 Rented Assets Model 405
10.5.2.2 Modular Model 405
10.5.3 Revenue-Generating Models 405
10.5.3.1 Generation of New Income Avenues 405
10.5.3.2 Profit Redistribution 405
10.5.3.3 Ecosystem Funding 406
10.5.4 Public–Private Partnerships 406
10.5.5 Technological Models 406
10.5.5.1 Big Data and Predictive Analytics 407
10.5.5.2 Internet of ings 407
10.5.5.3 Genetic Proling 408
10.5.5.4 Biomimicry 408
10.6 Conclusion 409
References 410
cha P t er 11 ne x t-ge n erat ion he althc are sys tems 411
11.1 Introduction 412
11.2 Cloud Services in the Healthcare Sector 413
11.2.1 Electronic Storage of Medical Records 414
11.2.2 Office Productivity Solutions 414
11.2.3 Health Information Exchange 415
11.2.4 Collaboration Solution for Physicians 415
11.2.5 Clinical Information System 415
11.3 Big Data Analytics in Healthcare Sector 416
11.3.1 Support Research in Genomics and Other
Healthcare Projects 418
XVI
CONTENTS
11.3.2 Transform Data from Information 419
11.3.2.1 Use of Explanatory Analytics by
Predixion Software 420
11.3.2.2 Use of Big Data by Health Fidelity 420
11.3.3 Supporting Self-Care 421
11.3.4 Support for Providers 421
11.3.5 Increase Awareness 422
11.3.5.1 Sproxil Uses Big Data to Identify
Counterfeit Drugs 423
11.3.5.2 Sickweather LLC Uses Social
Media to Track Disease Outbreaks 423
11.3.6 Pool Data to Build a Better Ecosystem 423
11.4 Conclusion 424
Reference 425
cha P t er 12 sec uri t y manag emen t o F inte lli g e nt ci tie s 427
12.1 Introduction 428
12.2 Security Requirements of an Intelligent City 428
12.2.1 Confidentiality, Integrity, and Availability Triad 429
12.2.2 Authentication, Authorization, and Audit
Trial Framework 430
12.2.3 Defense-in-Depth 432
12.2.4 Trusted Computing Base 432
12.2.5 Encryption 433
12.3 Security Concerns of Cloud Platforms 433
12.3.1 Virtual Machine Segmentation 434
12.3.2 Database Segmentation 435
12.3.3 VM Introspection 435
12.3.4 Distributed Denial of Service 436
12.3.4.1 Real-Life Example of DDoS Attack 436
12.3.4.2 Imperva SecureSphere Web
Application Firewall to Prevent
DDoS Attacks 436
12.3.5 VM/Hypervisor-Based Security reats 437
12.3.6 Unauthorized Alteration of VM Image Files 438
12.3.7 VM eft 439
12.3.8 Inter-VM Attacks 439
12.3.9 Instant-On Gaps 440
12.3.10 Hyperjacking 441
12.4 Security reats to Big Data 442
12.4.1 Distributed Programming Frameworks 443
12.4.2 Use of NoSQL Databases 443
12.4.3 Storage Tiering 443
12.4.4 Data Source Validation 444
12.4.5 Privacy Concerns 444
12.4.5.1 Privacy Concern of Big Data
Analysis 444
XVII
CONTENTS
12.5 Requirements of the Security Management
Framework for Big Data 445
12.5.1 Agile Scale-Out Infrastructure 445
12.5.2 Security Analytics 446
12.5.2.1 IBM Accelerator for Machine
Data Analytics 446
12.6 reat Monitoring and Intelligence 447
12.7 Security reats in Smart Phones 447
12.8 Security Solutions for Mobile Devices 449
12.9 Security Concerns in the Internet of ings Platform 450
12.10 Security Measures for IoT Platforms/Devices 451
12.10.1 Secure Booting 451
12.10.2 Mandatory Access Control Mechanisms 451
12.10.3 Device Authentication for Networks 452
12.10.4 Device-Specific Firewalls 452
12.10.5 Controlled Mechanism to Ensure
Application of Security Patches and Upgrades 452
12.11 Security reats to Different IT-Based Infrastructure
Components of an Intelligent City 453
12.11.1 Security reats in Intelligent
Transportation Systems 453
12.11.1.1 Attack of a Public Transport
System in Europe 454
12.11.2 Security reats in Intelligent/Smart Grids
and Other Infrastructure Components of an
Intelligent City 454
12.12 Best Practices to Be Adopted for a Secure Intelligent
City 455
12.13 Conclusion 456
References 456
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.139.233.43