Emerging Computing Paradigms -  - E-Book

Emerging Computing Paradigms E-Book

0,0
103,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

EMERGING COMPUTING PARADIGMS A holistic overview of major new computing paradigms of the 21st Century In Emerging Computing Paradigms: Principles, Advances and Applications, international scholars offer a compendium of essential knowledge on new promising computing paradigms. The book examines the characteristics and features of emerging computing technologies and provides insight into recent technological developments and their potential real-world applications that promise to shape the future. This book is a useful resource for all those who wish to quickly grasp new concepts of, and insights on, emerging computer paradigms and pursue further research or innovate new novel applications harnessing these concepts. Key Features * Presents a comprehensive coverage of new technologies that have the potential to shape the future of our world--quantum computing, computational intelligence, advanced wireless networks and blockchain technology * Revisits mainstream ideas now being widely adopted, such as cloud computing, the Internet of Things (IoT) and cybersecurity * Offers recommendations and practical insights to assist the readers in the application of these technologies Aimed at IT professionals, educators, researchers, and students, Emerging Computing Paradigms: Principles, Advances and Applications is a comprehensive resource to get ahead of the curve in examining and exploiting emerging new concepts and technologies. Business executives will also find the book valuable and gain an advantage over competitors in harnessing the concepts examined therein.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 568

Veröffentlichungsjahr: 2022

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Emerging Computing Paradigms

Principles, Advances and Applications

Edited by

Umang Singh

ITS, Ghaziabad (U.P.), India (deceased)

San Murugesan

BRITE Professional Services, Sydney, Australia

Ashish Seth

Inha University, Incheon, South Korea

 

 

 

This edition first published 2022

© 2022 John Wiley & Sons, Ltd

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.

The right of Umang Singh, San Murugesan, and Ashish Seth to be identified as the authors of this has been asserted in accordance with law.

Registered Offices

John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA

John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK

Editorial Office

The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK

For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.

Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that appears in standard print versions of this book may not be available in other formats.

Limit of Liability/Disclaimer of Warranty

While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

Library of Congress Cataloging-in-Publication Data

Names: Singh, Umang, 1982-2021, editor. | Murugesan, San, 1978- editor. | Seth, Ashish, editor. Title: Emerging computing paradigms : principles, advances and applications / edited by Umang Singh, ITS, Ghaziabad (U.P.), India (deceased), San Murugesan, BRITE Professional Services, Ashish Seth, Inha University, Incheon, South Korea. Description: First edition. | Hoboken : John Wiley & Sons, 2022. | Includes bibliographical references and index. Identifiers: LCCN 2021060411 (print) | LCCN 2021060412 (ebook) | ISBN 9781119813408 (hardback) | ISBN 9781119813415 (pdf) | ISBN 9781119813422 (epub) | ISBN 9781119813439 (ebook) Subjects: LCSH: Computer science--Technological innovations. | Computer networks--Technological innovations. Classification: LCC QA76.24 .E43 2022 (print) | LCC QA76.24 (ebook) | DDC 004--dc23/eng/20220201 LC record available at https://lccn.loc.gov/2021060411LC ebook record available at https://lccn.loc.gov/2021060412

Cover image: © Rachael Arnott/Shutterstock

Cover design by Wiley

Set in 9.5/12.5pt STIXTwoText by Integra Software Services, Pondicherry, India.

Dedication

We dedicate this book to all thecomputing pioneers, past and present, who laid foundation for modern computing and contributed to advances in all aspects of computing over the past 75 years—the immense benefits of which not only humans but also “things” around us enjoy today and will continue to relish in the future.

Next, we dedicate this volume toUmang Singh, our beloved friend and co-editor of this book, who was a key player in bringing out this book but is no longer with us to see it in print. She couldn’t win the battle against COVID-19 and succumbed to it following an apparent victory that sadly didn’t last long. Her memories and contributions to computing as an academic, as a researcher, and as an excellent human being, will live with us—readers of this book and the community at large.

Contents

Cover

Title page

Copyright

Dedication

Preface

Acknowledgements

About the Editors

About the Contributors

Part 1 Cloud Computing

1 Cloud Computing: Evolution, Research Issues, and Challenges

2 Cloud IoT: An Emerging Computing Paradigm for Smart World

Part 2 Quantum Computing and Its Applications

3 Quantum Computing: Principles and Mathematical Models

4 Quantum Cryptography and Security

5 Quantum Machine Learning Algorithms

Part 3 Computational Intelligence and Its Applications

6 Computational Intelligence Paradigms in Radiological Image Processing — Recent Trends and Challenges

7 Computational Intelligence in Agriculture

8 Long-and-Short-Term Memory (LSTM) Networks: Architectures and Applications in Stock Price Prediction

Part 4 Advances in Wireless Networks

9 Mobile Networks: 5G and Beyond

10 Advanced Wireless Sensor Networks: Research Directions

11 Synergizing Blockchain, IoT, and AI with VANET for Intelligent Transport Solutions

Part 5 Blockchain Technology and Cyber Security

12 Enterprise Blockchain: ICO Perspectives and Industry Use Cases

13 Blockchain and Cryptocurrencies: Techniques, Applications and Challenges

14 Importance of Cybersecurity and Its Subdomains

Index

End User License Agreement

List of Figures

Chapter 1

Figure 1.1 Evolution of Cloud...

Figure 1.2 SOA’s find...

Figure 1.3 Cloud computing...

Chapter 2

Figure 2.1 Cloud hosting...

Figure 2.2 Cloud IoT integrated...

Figure 2.3 Emerging cloud-IoT...

Figure 2.4 Monolithic cloud...

Figure 2.5 Micro service...

Figure 2.6 Server less cloud...

Chapter 3

Figure 3.1 Bloch sphere46

Figure 3.2 Circuit diagram...

Figure 3.3 Circuit diagram...

Figure 3.4 Circuit diagram...

Figure 3.5 Circuit diagram...

Figure 3.6 Circuit diagram...

Figure 3.7 Circuit diagram...

Chapter 4

Figure 4.1 Substitution...

Figure 4.2 Asymmetric ciphering...

Figure 4.3 RSA communication...

Figure 4.4 Graph indicating the...

Figure 4.5 Difference between...

Figure 4.6 BB84 Protocol...

Chapter 5

Figure 5.1 The four methods...

Figure 5.2 The operation...

Figure 5.3 The quantum circuit...

Figure 5.4 The schematic...

Figure 5.5 The representation...

Figure 5.6 An example...

Figure 5.7 An example...

Figure 5.8 Schema for network...

Figure 5.9 Architecture of Quantum...

Figure 5.10 The schematic representation...

Figure 5.11 The schematic representation...

Figure 5.12 The working of bottleneck...

Chapter 6

Fiogue 6.1 Computation intelligence...

Fiogue 6.2 Digital radiological...

Fiogue 6.3 Machine learning...

Fiogue 6.4 Image fusion techniques.

Fiogue 6.5 Degradation model...

Fiogue 6.6 Restoration model.

Fiogue 6.7 Different image...

Fiogue 6.8 Fuzzy logic block...

Fiogue 6.9 Biological and...

Fiogue 6.10 Framework for...

Fiogue 6.11 Evolutionary...

Chapter 7

Figure 7.1 Agricultural sensors for...

Figure 7.2 Agricultural prediction...

Figure 7.3 Agricultural prediction...

Figure 7.4 Modern agriculture with...

Figure 7.5 Various uses of technology...

Figure 7.6 Water conservation...

Figure 7.7 Environmental change...

Figure 7.8 Soil and plant health...

Figure 7.9 Different techniques...

Figure 7.10 An example scenarion...

Figure 7.11 Various diseases in...

Chapter 8

Figure 8.1 Schematic representation...

Figure 8.2 The structure...

Figure 8.3 The design of...

Figure 8.4 The design of...

Figure 8.5 The design of...

Figure 8.6 The design of...

Figure 8.7 The design of...

Figure 8.8 The design of...

Chapter 9

Figure 9.1 Coordinated transmissions...

Figure 9.2 Mobility management...

Figure 9.3 A MANET topology...

Figure 9.4 The distributed architecture...

Figure 9.5 The 5G extended support...

Chapter 10

Figure 10.1 Use case diagram...

Chapter 11

Figure 11.1 Types of blockchain.

Figure 11.2 Basic structure...

Figure 11.3 Architecture of...

Figure 11.4 Security requirement...

Chapter 12

Figure 12.1 Distributed...

Figure 12.2 Initial coin...

Figure 12.3 Token economics.

Figure 12.4 ICO funding 2017.

Figure 12.5 ICO funding 2018.

Figure 12.6 Blockchain...

Chapter 13

Figure 13.1 Secure transmission...

Figure 13.2 Blockchain.

Figure 13.3 Blockchain structure.

Figure 13.4 Private blockchain network.

Figure 13.5 Public blockchain network.

Figure 13.6 Centralized, decentralized...

Figure 13.7 Working diagram...

Figure 13.8 Contract between...

Chapter 14

Figure 14.1 Cybersecurity...

Figure 14.2 CIA triad.

Figure 14.3 Crime, investigation...

Figure 14.4 Stages of incident...

List of Tables

Chapter 2

Table 2.1 Comparative statistics...

Table 2.2 Summarization details...

Table 2.3 Key service areas...

Chapter 3

Table 3.1 Truth table of...

Table 3.2 Truth table of...

Table 3.3 Truth table of...

Table 3.4 Truth table of...

Table 3.5 Action of CNOT...

Chapter 4

Table 4.1 Transmission of...

Table 4.2 Quantum error...

Chapter 5

Table 5.1 The outline of...

Chapter 7

Table 7.1 Different wireless...

Chapter 8

Table 8.1 Accuracies of...

Table 8.2 Execution speeds...

Chapter 13

Table 13.1 Block identifiers.

Guide

Cover

Title page

Copyright

Dedication

Table of Contents

Preface

Acknowledgements

About the Editors

About the Contributors

Begin Reading

Index

End User License Agreement

Pages

i

ii

iii

iv

v

vi

vii

viii

ix

x

xi

xii

xiii

xiv

xv

xvi

xvii

xviii

xix

xx

xxi

xxii

xxiii

xxiv

xxv

xxvi

xxvii

xxviii

xxix

xxx

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

Preface

2021 marks the 75th anniversary of the first general purpose electronic digital computer, the 50th anniversary of the microprocessor, and the 40th anniversary of the IBM Personal Computer. These historic developments formed the foundation for amazing continuing advances in computing and IT. In a span of 75 years, from an unproven technology to one that is embedded deeply into every aspect of our work and our daily lives, computers have advanced significantly.

The history of the modern computer has its origin to ENIAC (Electronic Numerical Integrator and Computer), the first general purpose programmable electronic (vacuum-tube) computer, unveiled to public on February 14, 1946. John Mauchly and J. Presper Eckert at the University of Pennsylvania developed it secretly for the US Army to calculate ballistic trajectory tables more effectively than the mechanical differential analyzers in use at the time. Besides using it for ballistics trajectory research, ENIAC was also used for Monte Carlo simulations, weather predictions, and early hydrogen bomb research. On the eve of unveiling of ENIAC, the US War Department put out a press release hailing it as “a new machine that is expected to revolutionize the mathematics of engineering and change many of our industrial design methods.” Without doubt, electronic digital computers did transform irrevocably engineering and mathematics, and also every other conceivable domain.

In 1958, Jack Kilby of Texas Instruments invented the first integrated circuit (IC). Adopting large-scale-integration, very large-scale-integration, and ultra-large-scale integration, the density of ICs continued to increase, closely following the Moore’s Law—the number of transistors in a chip will approximately double every 24 months. In 1971, Intel Corporation, released the world’s first microprocessor, a complete general-purpose central processor unit of a computer on a single IC. Amazing developments in hardware, software, and networking and communication followed, and changed the world irrevocably.

As computers have evolved to redefine and transform almost every area of our lives in the past 75 years, they still function on the same fundamental computational concepts envisaged at the beginning. As demands on computing, storage, and communication continue to escalate, digital computers based on silicon and conventional architecture approach their limits and face issues related to economics and reliability. Thus, certain kinds of problems in domains such as weather forecasting, bioinformatics, robotics, and autonomous systems are faced with limitations tied to the conventional computing paradigm.

Research and industry are exploring radical new computing paradigms such as quantum computing and exploring new solutions to yet unresolved problems and challenges—all of which have the potential to bring about a variety of promising new applications. Understanding, mastering, and applying them will empower us to chart the future course of computing. This book explores principles of and potential for some of these paradigms and approaches and examines their current status and future prospects.

Book Preview

The book presents 14 chapters in five parts, each focusing on an emerging area: cloud computing; quantum computing and its applications; computational intelligence and its applications; advances in wireless networks; and blockchain technology and cyber security.

Cloud Computing

Cloud computing fundamentally changed the IT industry and the ways applications are built and deployed. This computing paradigm is now being widely used for a variety of applications by individuals, business, and government. The first chapter, “Cloud Computing: Evolution, Research Issues, and Challenges” presents a brief, yet comprehensive, overview of cloud computing and outlines its key technologies and approaches. The chapter also highlights cloud’s challenges and current limitations and discusses several key issues that require further study. Next chapter, “Cloud IoT: An Emerging Computing Paradigm for Smart World,” outlines the role of cloud computing and IoT in the emerging smart world and describes a range of applications. It presents a cloud-IoT architecture and briefly describes supporting infrastructure such as edge computing, fog computing, and mist computing. This chapter also discusses challenges and issues in cloud-IoT integration and adoption.

Quantum Computing and Its Applications

Quantum computing is a new radical computing paradigm. It is fast evolving and attracting growing interest as it has potential to solve computationally intensive problems in a range of areas that are unsolvable even by current supercomputers. The chapter “Quantum Computing: Principles and Mathematical Models” explains the quantum phenomena, superposition and entanglement, and explains introductory mathematics that describe working of a quantum computer, such as mathematical notions of single and composite qubits, quantum measurement, and quantum gates and circuits. It also illustrates, with the help of Deutsch Algorithm, supremacy of quantum algorithms over their classical counterparts.

The next chapter, “Quantum Cryptography and Security,” beginning with a brief introduction to encryption, provides a brief overview on quantum cryptography. It describes relevant protocols and their applications in cryptography and explains the use of quantum distributive encryption and generation and distribution of quantum keys. It also discusses the effect of noise and spy monitoring over the communication network and error correction through which the destination user can recover the original message from the corrupted data.

Adoption of quantum computing in machine learning presents several new opportunities to solve problems in new smart ways. The Chapter “Quantum Machine Learning Algorithms” presents an overview of recent progress in quantum machine learning and outlines and compares different quantum machine learning algorithms.

Computational Intelligence and Its Applications

In this part, we present three chapters which discuss application of computational intelligence (CI) in three domains. First, in “Computational Intelligence Paradigms in Radiological Image Processing—Recent Trends and Challenges,” the authors briefly introduce CI and present an overview on radiological information processing using computational intelligence paradigm and discuss emerging trends. They also describe different stages in radiological image processing and explains the use of CI paradigms based on fuzzy logic, artificial neural networks, and evolutionary computation.

Next, “Computational Intelligence in Agriculture” discusses various uses of CI in agriculture, such estimation and improvement of crop yield, water conservation, soil and plant health monitoring, and plant disease detection. The chapter also describes various remote sensing methods and different wireless communication protocols and machine learning models used in agriculture applications.

Though recurrent neural networks (RNNs) are effective in handling sequential data, they have limitations in capturing the long-term dependencies in the data due to a problem known as vanishing and exploding gradients. Long-and-Short-Term Memory (LSTM), a variant of RNN, overcomes this problem and is very efficient and offers better performance in handling sequential data. The chapter “Long-and-Short-Term Memory (LSTM) Networks: Architectures and Applications in Stock Price Prediction” presents the basic design of LSTM networks and describes their working principles. It discusses and compares six different variants of LSTM models for stock price forecasting. The models were trained and tested on real-world data—the historical NIFTY 50 index of the National Stock Exchange (NSE) of India from December 29, 2014 to July 31, 2020.

Advances in Wireless Networks

Wireless networks are rapidly advancing and finding application in several areas. The 5G revolution aims to merge all communication networks into one ubiquitous global network with a seamless integration of communication services that are transparent to the mobile end users and devices. The chapter “Mobile Networks: 5G and Beyond” reviews main principles of mobile networks and outlines the strategies and challenges in designing 5G mobile networks. In particular, it outlines the concepts, design challenges and key developments in vehicle ad-hoc networks (VANETs) including connected cars, unmanned aerial vehicle (UAV), and low-Earth orbit (LEO) satellites.

Advanced Wireless Sensor Networks (AWSNs) are gaining growing interest among the researchers and practitioners as they have a range of applications like structural health monitoring, precision smart agriculture, smart cities, and smart parking systems. AWSNs, however, present several issues and challenges that need to be addressed. The chapter “Advanced Wireless Sensor Networks: Research Directions” identifies and discusses research areas in AWSNs. It also outlines key principles governing design of mobile networks which are now directly integrated with the 5G cellular networks.

The final chapter in this section, “Synergizing Blockchain, IoT and AI with VANET for Intelligent Transport Solutions,” looks at benefits and challenges of embracing the potential of blockchain, IoT and AI with VANET in the context of facilitating intelligent transport solutions. It also examines security aspects of this synergic combination of technologies, showcases novel applications that address UN Sustainable Development Goals (SDGs) and outlines future trends in this area.

Blockchain Technology and Cyber Security

In this part, we feature three chapters focusing on blockchain, cryptocurrencies, and cybersecurity.

Enterprise blockchains have the ability to scale well, are less decentralized than a public blockchain, which matches their use case, and presents fewer potential security issues as they are permissioned networks. The chapter “Enterprise Blockchain,” introduces enterprise blockchain and examines a few of its use cases.

The chapter “Blockchain and Cryptocurrencies: Techniques, Applications, and Challenges” describes key elements of blockchain and its features, highlights few applications, and identifies the limitations and challenges.

The final chapter, “Importance of Cyber Security and Its Subdomains,” briefly discusses key aspects of cybersecurity and identifies and discusses cybersecurity subdomains. It also identifies emerging threats that need to be addressed further.

The book gives a glimpse of emerging computing technologies and paradigms and identifies some of limitations and challenges that computing presents. It also identifies research issues in the respective areas that require further study. We encourage researchers and developers from multidisciplinary fields to learn from each other and work together to further advance computing and its applications.

Umang SinghAshish SethSan Murugesan

Acknowledgements

Publication of this book wouldn’t have been possible without the contribution, support, and cooperation of several people. We acknowledge and appreciate their contributions and support.

First, we would like to thank each one of the chapter authors for enthusiastically contributing to the book, and thereby sharing their expertise, experiences and insights with the readers. We gratefully acknowledge their support and cooperation. We also extend our gratitude to the reviewers who have provided valuable comments on the chapter manuscripts.

Next, the editorial team at Wiley deserves our high commendation for their key roles in publishing this book and in ensuring its quality. In particular, we would like to thank Sandra Grayson, Commissioning Editor; Juliet Booker, Managing Editor; and Becky Cowan, Editorial Assistant for their excellent enthusiasm, support, and cooperation. We would like to thank the staff at Integra for their excellent work on this book which helped to shape and improve the presentation. We highly commend their professionalism and commitment.

Finally, we would like to thank our respective family members for their encouragement, support, and cooperation which enabled us to make this venture a reality and enjoyable.

About the Editors

Umang Singh was Associate Professor at Institute of Technology & Science, Ghaziabad, UP, India. She has been involved with research and academia for more than 17 years. She was renowned for her keen interest in the areas of Mobile Networks, IoT, Edge Computing and Machine Learning. She has published over 80 research papers in reputed journals and conferences like ACM, Elsevier, Inderscience, IEEE, Springer indexed in SCI, ESCI, SCIE, and Scopus.

She served as Guest Editor for special issues of journals including International Journal of e-Collaborations (IGI Global, USA, 2020), and International Journal of Information Technology (BJIT 2010) and edited six Conference Proceedings, three souvenirs and two books. Dr Umang was on the Editorial Board for several reputed journals including Inderscience IJFSE (Switzerland), on the Board of Referees for the International Journal of Information Technology, BJIT, Springer and the Technical Programme Committee Member of national and international Conferences. She was a senior member of IEEE and life member of Computer Society (CSI).

San Murugesan is Director of BRITE Professional Services and an Adjunct Professor with Western Sydney University, Sydney, NSW, Australia. He has vast experience in both academia and industry. He is former Editor-in-Chief of the IEEE Computer Society’s IT Professional magazine and co-editor of several books, including the Encyclopaedia of Cloud Computing (Wiley and IEEE), Harnessing Green IT: Prin-ciples and Practices and Web Engineering (Springer). He guest edited 40 journal special issues and served on editorial boards of several reputed international journals.

He worked as a Senior Research Fellow at the NASA Ames Research Center in California and served as professor of computer science at Southern Cross University in Australia. Prior to these, he worked at the Indian Space Agency in Bangalore in senior roles and led development of onboard microcomputer systems. He is a Distinguished Speaker of ACM and Distinguished Visitor of IEEE Computer Society. He is a fellow of the Australian Computer Society and the Institution of Electronics and Telecommunication Engineers, a Golden Core member of IEEE Computer Society and a Life Senior Member of IEEE. For further details visit www.tinyurl.com/san1bio.

Ashish Seth is an author, consultant, researcher and teacher. He is a Professor at the School of Global Convergence Studies, Inha University, South Korea. He is also a visiting faculty at TSI, Riga, Latvia. He is PhD (Computer Science) in the area of Information Systems from Punjabi University, Patiala, Punjab, India and holds and MPhil(CS) and MCA degree. He has published more than 40 research papers in indexed journals. He has authored four books and several book chapters. He also edited two books and one indexed journal.

He is senior member IEEE, life member CSI and an active member of International societies like IACSIT, IAENG, etc. He is also ACM-Distinguished speaker. He has been involved with research and academia for more than 17 years. He worked at various universities in India and abroad holding different positions and responsibilities. He has organized and participated actively in various conferences, workshops and seminars. He served as Subject Expert under the European Union in the areas of Strategic Specialization. His research interests include Service Oriented Architecture, Optimal Computing, Cloud Computing and Blockchain Technologies. He finds interest in reading and writing articles on emerging technologies (https://www.linkedin.com/in/dr-ashish-seth-877b1116)

About the Contributors

Chapter 1

Neeraj Gupta received the BTech Degree in Computer Engineering and M.Tech in Computer Science from Kurukshetra University and JRN Rajasthan Vidyapeeth (Deemed University) in 1999 and 2006 respectively, and the PhD degree from University School of Information, Communication & Technology at Guru Gobind Singh Indraprastha University, Delh in 2016. From October 1999 to July 2014 he worked as Assistant Professor in Computer Science Engineering in Hindu College of Engineering, Sonepat, India. He is working as Associate Professor with School of Engineering and Technology at K.R. Mangalam University, Gurugram, India since July 2014. He has successfully guided three PhD scholars. He is Professional Member of ACM and life member of Computer Science of India. His research interests are in area of Cloud Computing, Edge Computing, Software Defined Networks, Blockchains, Sensor Networks and Performance Modeling and Analysis of networks.

Asha Sohal received the BTech Degree in Computer Engineering and MTech in Information Technology from Kurukshetra University and Guru Gobind Singh Indraprastha University, Delhi(GGSIPU) in 2003 and 2011 respectively, and pursuing PhD degree from Department of Computer Science and Applications, Kurukshetra University, Kurukshetra. From August 2003 to July 2007 she worked as senior lecturer in Computer Science Engineering in reputed colleges of engineering, India. From August 2008 to July 2011 and July 2011 to July 2013 she worked as Assistant Professor in Computer Science Engineering in KIIT, Gurgaon and Amity University, Gurgaon respectively. She is working as Assistant Professor with the School of Engineering and Technology at K.R. Mangalam University, Gurugram, India since July 2013. Her research interests are in area of Cloud Computing, Fog Computing, Wireless Sensor Networks and MANETs.

Chapter 2

Ruchi Bhatnagar is a dynamic and prominent research scholar and academic having 15+ years of experience in teaching and study at IIMT University, Meerut. Her primary research fields are Networking and Algorithm, ranging from theory to design to implementation. She has published her research in several international and national journals and organized and served international conferences program committees at IIMT University, Meerut.

Paramjeet Rawat is Professor at the IIMT Engineering College, Meerut. She is a reviewer on several reputed international journals at Elsevier, Inderscience, IJAIS, IJARCSEE, TIJCSA and has published her research in more than 25 reputed and referred journals. She had also presented a curriculum on ethical education in Amherst College, USA; where she represented team India and received a letter of appreciation from MLI, USA for her excellent work. She has good analytical and problem solving skills and guided of many PhD scholars.

Dr. Amit Garg is a dynamic and vibrant academic having 19 years of experience. Currently he is working as HoD, Department of CSE, IIMT Engineering College, Meerut. He is a life-time member of CSI, IANEG and ISRD. He is an eminent scholar with his international publications including SCOPUS and ESCI Journals. Throughout his carrer he has also worked as SPOC for IBM, WIPRO, TCS, and SAP.

Chapter 3

Arish Pitchai is working as Assistant Professor, Department of Computer Science, CHRIST (Deemed to be university), Bengaluru, India. He is also associated as Quantum Scientist, Quantum Machine Learning Lab, BosonQ Psi Pvt. Ltd, Bhilai, India. After completing his PhD in quantum game theory, Arish Pitchai worked for a while as an associate consultant in Atos, Quantum R&D. Then he joined CHRIST (Deemed to be University) as an Assistant Professor.

Thiruselvan Subramanian works as Assistant Professor, Department of Computer Science, Presidency University, Bengaluru, India. He pursued his PhD in cloud computing technology and his research interests include computer vision and quantum computing.

Chapter 4

Vandana Niranjan is working as Professor in the Department of Electronics and Communication Engineering at Indira Gandhi Delhi Technical University Delhi, India. She graduated in the year 2000 and received her BE degree in Electronics and Communication Engineering from Government Engineering College (now University Institute of Technology of Rajiv Gandhi Proudyogiki Vishwavidyalaya) Bhopal. In the year 2002, she received her MTech degree from the Department of Electronics and Communication Engineering at Indian Institute of Technology (I.I.T) Roorkee with VLSI Design as specialization. In the year 2015, she was awarded her PhD degree in the area of Low Voltage VLSI Design from University School of Engineering & Technology, GGSIP University, Delhi. She has 20 years’ teaching and research experience at Indira Gandhi Delhi Technical University, Delhi. Her areas of interest includes MOSFET body bias techniques and low-voltage low-power analog CMOS circuit design. She has several publications to her credit in various international journals and conferences and book chapters.

Anukriti has recently completed her Masters in technology in the area of VLSI and Chip design at Indira Gandhi Delhi Technical University, Delhi, India. She graduated in the year 2017 and received her BTech degree in Electronics and Communication Engineering from Guru Gobind Singh Indraprastha University, Delhi. She is currently working as a Research Intern under the Openlabs Programme at CERN, Geneva where she is pursing her research career in Quantum Machine Learning and Computing. She is an aspiring researcher and scientist and has published in indexed international conferences when her main area of focus was Machine Learning, Deep learning, Dark Matter Physics and Applied Cosmology.

Chapter 5

Renata Wong received her MA degree in Sinology, as well as BSc. and MSc. degrees in Computer Science from Leipzig University, Germany, in 2008, 2011, and 2013, respectively. She holds a PhD in Computer Science (Quantum Computing) from Nanjing University, PRC, and is currently a postdoctoral research fellow at the Physics Division, National Center for Theoretical Sciences in Taipei, Taiwan, R.O.C, working in quantum computation and information. Her main research fields are quantum computation and information (especially quantum algorithms), protein structure prediction, foundations of physics, and linguistics. Up to date, she has published over two dozen journal papers, conference papers and book chapters in English, Chinese and German. Within the field of quantum computing, she has, among others, developed and successfully simulated two quantum algorithms for protein structure prediction. In the area of physics, her contributions are in the research on the logical consistency of physics theories, with focus on the special and the general theory of relativity and quantum mechanics. In addition to English and her native Polish, she is fluent in Mandarin Chinese, German, and Russian. The current affiliation is: Physics Division, National Center for Theoretical Sciences, Taipei, Taiwan.

Tanya Garg is a student at the Indian Institute of Technology, Roorkee, India, pursuing a bachelor’s degree in Engineering Physics with a minor in Computer Science and Engineering. Interested in the fundamental of physics and computer science, she intends to pursue the field of quantum computing and the related areas of quantum communication and quantum algorithms due to their interdisciplinary nature and the technological potential they propose. She has conducted undergraduate research at renowned laboratories and is the recipient of some prestigious scholarships, namely the DAAD WISE scholarship and the Charpak Lab Scholarship.

Ritu Thombre completed her BTech from Visvesvaraya National Institute of Technology in Computer Science and Engineering. She recently joined CITI India as Technology Analyst. Her primary interests are Cryptography, Machine Learning, Quantum Mechanics and Astrophysics. She likes to design new machine learning algorithms to solve various problems that have real world applications. She is deeply fascinated by applications of Quantum Computing in Cryptography and Deep Learning. Currently we live in a “vacuum-tube” era of Quantum Computers and hopes to contribute to the advancement of Quantum Computing to achieve “quantum-supercomputer” era someday.

Alberto Maldonado Romo is a PhD student in Computer Science at the Center for Computing Research, Instituto Politecnico Nacional, Mexico, where he has collaborated with the Fermilab and CERN research centres on the GeantV project, and did his Master’s thesis on quantum image processing. He a technical reviewer of the book Quantum Computing with Silq Programming. Alberto is an administrator for the non-for-profit company Quantum Universal Education, he has conducted workshops and webinars on introduction to quantum computing, designed comics introducing beginning quantum computing concepts, and created tutorials in five different quantum programming languages.

Niranjan PN, a current Master’s student of Physics at the University of Cologne, is also a quantum developer in a promising startup - BosonQ Psi Pvt.Ltd in India. He has more than two years of experience in the field of quantum computing. His area of interest lies in fault-tolerant quantum hardware and variational quantum algorithms. He is currently working on different projects one of which is covid detection using quantum machine learning. He has presented two lectures; one in Kongunadu Arts and Science College, Coimbatore, India on quantum computing as a beginner and one at the Government College of Engineering, Thanjavur under the Faculty Development Program on Quantum Computing organized by AICTE Training and Learning (ATAL) Academy. He is also a freelance consultant on how to start one’s career in quantum computing.

Pinaki Sen is a final year Electrical Engineering undergrad at National Institute of Technology, Agartala, India. His interest lies primarily in the domain of Quantum Computing and Machine Learning. He has research experience in Quantum Machine Learning, Quantum Error Correction, Quantum-dot Cellular Automata and related fields. He has previously worked as a research intern at the Indian Statistical Institute, Kolkata, India.

Mandeep Kaur Saggi is presently pursuing a PhD in Computer Science Engineering at Thapar Institute of Engineering & Technology, Patiala. She is working on multilevel ensemble modelling for predicting the Reference Evapotranspiration (ETo) and Crop Evapotranspiration for Crop Water Requirement, Irrigation Water Requirement, and Irrigation Scheduling using Artificial Intelligence, Deep Learning, and Machine Learning techniques. She completed her MTech in Computer Science Engineering at D.A.V University, Jalandhar. She completed her BTech in Computer Science & Engineering from Punjab Technical University. Her area of interest lies in Deep Learning, Machine Learning, Big Data Analytics, Quantum Computing, & Cloud Computing.

Amandeep Singh Bhatia is working as a Postdoc in Institute of Theoretical Physics at University of Tubingen, Germany. He is developing quantum computational models and quantum algorithms with new artificial intelligence methods for physics, and novel quantum machine learning techniques. He completed his PhD degree in the realm of Quantum Computation and Information at the Computer Science & Engineering Department at Thapar University in July 2020. He has more than six years of work experience in quantum computing and technologies. He contributed to the progress of quantum automata theory and developed quantum computational models for Biology, Chemistry and Tensor network theory. Presently, he is contributing to the progress of quantum machine learning. He received his BTech and MTech degrees in Computer Science & Engineering in 2010 and 2013, respectively. Up to date, he has published over two dozen journal papers, conference papers and book chapters on several aspects of quantum computation and information.

Chapter 6

Anil B. Gavade is a Associate Professor at the KLS Gogte Institute of Technology, Belagavi, Karnataka, India, in the Department of Electronics and Communication Engineering. He received a BE degree in Instrumentation Engineering from Karnataka University, Dharwad, an MTech in Digital Electronics and PhD in Electri-cal and Electronics Engineering from Visvesvaraya Technological University, Belagavi. His main research interests include Computer Vision and Machine Learning Applications to Biomedical Imagery and Satellite Imagery.

Rajendra B. Nerli is a Professor and Head, Department of Urology, JN Medical College, KLE Academy of Higher Education and Research (Deemed-to-be-University), Belagavi. Dr Nerli has published over 300 research articles in peer-reviewed indexed journals. He has carried out clinical experimental and field research in the areas of urology, artificial intelligence and medical sciences. As a research mentor, he has guided a number of students leading to MCh and PhD Degrees. He is the Director of Clinical service at KLES Dr Prabhakar Kore Hospital & MRC, Belagavi.

Dr Ashwin S. Patil is presently Professor and Head, Department of Radio-diagnosis, JNMC Belagavi. He completed his Medical School (MBBS) in 1994 and MD-Radiology in 1997 from Jawaharlal Nehru Medical College, Belagavi and Karnataka University, Dharwad. He has over 27 years of teaching experience and has mentored and guided over 50 postgraduates. He has authored over 17 publications, four of which are published in leading international journals and has presented over 66 presentations (paper, e-poster). He also holds and has held several posts, prominent among them being Board of Studies Member for KAHER since 2014 and BLDE University (2016–2019), Affiliation Inquiry Committee member for Goa University (2016–2017) and Life members of IRIA (Indian Radiology and Imaging Association) and IMA (Indian Medical Association). His subspecialty interests include CT and MRI reporting. He is currently involved in research activities on Artficial Intelligence and tuberculosis in collaboration with Thomas Jefferson University, USA.

Shridhar Ghagane is currently working as Research Scientist (R&D) at Urinary Biomarkers Research Centre, KLES Dr. Prabhakar Kore Hospital & Medical Research Centre, Belagavi, India. His area of expertise is in Medical Biotechnology, Urologic-oncology, Cancer Biomarkers and Artificial Intelligence. He has published over 150 research articles in national and international peer-reviewed journals. Currently, he is supervising two PhD candidates at the KLE Academy of Higher Education and Research, Belagavi.

Venkata Siva Prasad Bhagavatula is working as Principal Systems Engineer with Medtronic Innovation and Engineering center, Hyderabad, India. He completed his BE degree in Instrumentation Engineering from Karnataka University, Dharwad and completed his Master of Science (Online) in Data science from Liverpool John Moores University, UK. He holds a patent, launched three new products in various roles in Research and Development in the Healthcare industry. He has 18 years of experience in the areas of hardware and systems engineering. His main area of work is in systems engineering. His main interests include medical devices, data science and machine learning applications to medical imaging.

Chapter 7

Hari Prabhat Gupta is an Assistant Professor in the Department of Computer Science and Engineering, Indian Institute of Technology (BHU) Varanasi, India. Previously, he was a Technical Lead at Samsung R&D Bangalore, India. He received his PhD and MTech degrees in Computer Science and Engineering from the Indian Institute of Technology Guwahati in 2014 and 2010 respectively; and his BE degree in Computer Science and Engineering from Govt. Engineering College Ajmer, India. His research interests include the Internet of Things (IoT), Wireless Sensor Networks (WSN), and Human-Computer Interaction (HCI). Dr. Gupta has received various awards such as Samsung Spot Award for outstanding contribution in research, IBM GMC project competition, and TCS Research Fellowship. He has guided three PhD thesis and five MTech dissertations. He has completed two sponsored projects and has published three patients and more than 100 IEEE journal and conference papers.

Swati Chopade received her MTech Degree in Computer Science and Engineering from VJTI, Mumbai, India. Presently, she is pursuing a PhD at the Department of Computer Science and Engineering, IIT (BHU) Varanasi. Her research interests include machine learning, sensor networks, and cloud computing.

Tanima Dutta is an Assistant Professor in the Department of Computer Science and Engineering, Indian Institute of Technology (Banaras Hindu University), Varanasi, India. Previously, she was a researcher in TCS Research & Innovation, Bangalore, India. She received a PhD from the Dept. of Computer Science and Engineering, Indian Institute of Technology (IIT) Guwahati in 2014. Her PhD was supported by TCS (Tata Consultancy Services) Research Fellowship and she received SAIL (Steel Authority of India Limited) Undergraduate Scholarship for perusing her BTech degree. Her research interests include (major) Deep Neural Networks, Machine Learning, Computer Vision, and Image Forensics and (minor) Human-Computer Interaction (HCI) and Intelligent Internet of Things (IIoT).

Chapter 8

Jaydip Sen has around 28 years of experience in the field of networking, communication and security and machine learning, and artificial intelligence. Currently, he is associated with Praxis Business School as Professor and the Head of the School of Computing and Analytics. He is also a visiting Professor to XLRI Jamshedpur and also an IBM ICE (Innovation Center for Education) Subject Matter Expert (SME). His research areas include security in wired and wireless networks, intrusion detection systems, secure routing protocols in wireless ad hoc and sensor networks, privacy issues in ubiquitous and pervasive communication, machine learning, deep learning and artificial intelligence. He has more than 200 publications in reputed international journals and refereed conference proceedings, and 22 book chapters in books published by internationally renowned publishing houses, like Springer, CRC press, IGI-Global, etc., and four books published by reputed internal publishing house. He is a member of ACM and IEEE. He has been listed among the top 2% most cited scientists in the world as per a study conducted by Stanford University which has been published in a paper in PLOS ONE journal in September 2020.

Sidra Mehtab has completed her BS with honors in Physics from Calcutta University, India in 2018. She has an MS in Data Science and Analytics from Maulana Abul Kalam Azad University of Technology (MAKAUT), Kolkata, India in 2020. Her research areas include Econometrics, Time Series Analysis, Machine Learning, Deep Learning, and Artificial Intelligence. Ms. Mehtab has published ten papers in reputed international conferences and two papers in prestigious international journal. She has won the best paper awards in two international conferences – BAICONF 2019, and ICADCML 2021, organized at the Indian Institute of Management, Bangalore, India in December 2019, and SOA University, Bhubaneswar, India in January 2021. Besides, Ms. Mehtab has also published two book chapters in two books published by IntechOpen, London, UK. Seven of her book chapters have been published in the December 2021 volume by Cambridge Scholars’ Press, UK. Currently, she is working as a Data Scientist with an MNC in Bangalore, India.

Chapter 9

Pavel Loskot joined the ZJU-UIUC Institute in Haining, China, in January 2021 as the Associate Professor after spending 14 years at Swansea University in the UK. He received his PhD degree in Wireless Communications from the University of Alberta in Canada, and the MSc and BSc degrees in Radioelectronics and Biomedical Electronics, respectively, from the Czech Technical University of Prague in the Czech Republic. He is the Senior Member of the IEEE, Fellow of the Higher Education Academy in the UK, and the Recognized Research Supervisor of the UK Council for Graduate Education. He has been involved in numerous telecommunication engineering projects since 1996. His current research interests focus on the problems involving statistical signal processing and importing methods from Telecommunication Engineering and Computer Science to other disciplines in order to improve the efficiency and information power of system modeling and analysis.

Chapter 10

Richa Sharma completed her MTech (Computer Science & Engineering), MS, and BSc from Guru Nanak Dev University (GNDU), Amritsar. Ms. Sharma has 4+ years of teaching experience. She has expertise in CS subjects like Computer Networks, Data Structures and Algorithms and has taught these subjects to engineering students. Currently, she is pursuing her doctoral degree in the area of Wireless Sensor Networks. Also, she is a keen researcher and up to 2020 has published 17 research papers. She has presented her research work at international level in IEEE conferences and has had her work published in SCI, SCIE and Scopus Indexed International Journals. She has also contributed voluntarily as a reviewer for reputed International Journals and IEEE Conferences. Her primary areas of interests include the Wireless Sensor Networks and Evolutionary Techniques.

Chapter 11

Sheetal Zalte is assistant professor in Computer Science Department at Shivaji University, Kolhapur, India. She pursued her a BSc from Pune University, India and MSc from Pune, India. She earned her PhD in Mobile Adhoc Network at Shivaji University. She has 14 years of teaching experience in computer science. She has published 20+ research papers in reputed international journals and conferences including IEEE (also available online). She has also authored book chapters with Springer, CRC. Her research areas are MANET, VANET, Blockchain Security.

Vijay Ram Ghorpade has completed PhD in Computer Science and Engineering from Shri Guru Govindsinghji Institute of Engineering and Technology (An Autonomous Institute of Govt. of Maharashtra), Nanded in 2008. He has more than 30 years of teaching experience at different levels. Presently he is working as the Principal, Bharati Vidyapeeth College of Engineering, Kolhapur. His area of interest is in Internet Security, Mobile Ad hoc Networks, Authentication, Cloud Security, Block Chain, etc. So far he has published more than 76 papers in peer reviewed national and international journals of repute. He has presented more than 69 papers in national and international conferences organized by IEEE, ACM, CSI. He is a member of various professional bodies such as, ACM, IEEE Computer Society, ISTE, CSI, CRSI, ISACA. He received ‘Best Engineering Principal Award’ from ISTE-Maharashtra-Goa Section in 2015. He has filed five patents, and two of which have been published in the public domain.

Rajanish K. Kamat is currently holding the position of Dean, Faculty of Science & Technology in addition to Professor in Electronics and Head of the Department of Computer Science at Shivaji University, Kolhapur a NAAC A++ accredited HEI. He is also Member of Management Council, Academic Council and Senate of the University. Until recently he also served as Director, IQAC (2014–2020) and Director, Innovation, Incubation & Linkages (2018–2020). He has to his credit 200+ publications in journals from reputed publishing houses such as IEEE, Elsevier, Springer in addition to 16 reference books from reputed international publishers such as Springer, UK and River Publishers, Netherlands and exemplary articles on ICT for Encyclopedia published by IGI. He is a Young Scientist awardee of Department of Science and Technology, Government of India under Fast Track Scheme. Dr. Kamat is also currently working as an Adjunct Professor in Computer Science for the reputed Victorian Institute of Technology, Melbourne, Australia.

Chapter 12

Ashish Seth is an author, consultant, researcher and teacher. He is a Professor at School of Global Convergence Studies, Inha University, South Korea and is deputed at Inha University Tashkent, Uzbekistan. He is PhD (Computer Science) in the area of Information Systems from Punjabi University, Patiala, Punjab, India and holds MPhil(CS) and MCA degree. He worked at various universities in India and abroad holding different positions and responsibilities. He is senior member IEEE, life member CSI and an active member of International societies like ACM, IACSIT, IAENG, etc. He has delivered many invited talks and also serving as ACM-Distinguished speaker under ACM-DSP program. He has been a consultant with many projects and associated with project granted by Indian government and European Union. His research interests include Service Oriented Architecture, Cloud Computing and Blockchain Technologies. He finds interest in reading and writing articles on emerging technologies.

Kirti Seth is researcher and academic. She has a PhD (Computer Science and Engineering) in the area of Component Based Systems from Department of Computer Sciences and Engineering, from AKTU, Lucknow, India and an MTech (Computer Science) from Banasthali Vidyapeeth, Banasthali, Rajasthan, india. She also holds an MSc (CS) degree and has been into research and academia for the last 16 years. She is presently working as Associate Professor at Inha University in Tashkent, Tashkent, Uzbekistan. She has published more than 40 research papers in reputed journals like ACM, Springer and Elsevier and authored four books. She has been participating and organizing seminar, conferences, workshops, expert lecturers and technical events to share knowledge among academics, researchers and to promote opportunities for new researchers. She has provided training programs for students and faculties on various areas of computer science including Google’s techmaker event-2018. She has given keynote talks at many international conferences. Her current research interests include Service Oriented Architecture, Bio Inspired Optimizations, Neural Networks and Component Based Systems. She has been awarded “Young Scientist in Software Engineering-2017” in ARM 2017. She also received “Most Promising Women Educationist” of the year award in India Excellence Summit 2017, on 19th August 2017.

Himanshu Gupta is working as an Associate Professor in the reputed international university Amity University Uttar Pradesh, Noida in India. He completed all his academic as well as professional education from the reputed Aligarh Muslim University, Aligarh (Uttar Pradesh), India. He has visited Malaysia, Singapore, Thailand, Cambodia, Vietnam, Indonesia, Hong Kong, Macau, China and United Arab Emirates for his academic and research work. He has delivered many Technical Sessions on “Network Security & Cryptography” in the field of Information Technology in various reputed International Conferences, World Summit and other foreign universities as an Invited Speaker. He has more than 75 research papers and articles in the field of Information Technology, which have been published in various reputed Scopus and other indexed conference proceedings and journals. He has written a number of books in the area of Information Security, Network Security and Cryptography as a main author published by reputed national and international publishers.

He has successfully filed a number of patents in the area of Network Security and Cryptography as an Inventor, which have been published in the “International Journal of Patents” by Patent Department, Govt. of India. He has delivered Online IT Lectures as an Invited Speaker to students of 16 African Countries under the e-Pan African Project sponsored by Govt. of India at Amity University, Noida.

Chapter 13

Snehlata Barde is working as Professor at MAT’S University, Raipur, (C.G.). She received her PhD in Information Technology and Computer Applications in 2015 from Dr. C. V. Raman University Bilaspur, (C.G.). She obtained her MCA from Pt. Ravi Shankar Shukla University, Raipur, (C.G.) and MSc (Mathematics) from Devi Ahilya University Indore, (M.P.). Her research interest includes Digital Image Processing and its Applications in Biometric Security, Forensic Science, Pattern Recognition, Segmentation, Simulation and Modulation, Multimodal Biometric, Soft Computing Techniques, cyber crime, IoT. She has published 61 research papers in various international and national journals and conferences. She has attended 36 seminars, workshop and training programs, she has published six book chapters. She has 22-years’ teaching experience from GEC Raipur, NIT Raipur, SSGI Bhilai. She has reviewed the translated files of the course Cloud Computing offered by IIT Kharagpur in Marathi language.

Chapter 14

Parag H. Rughani obtained his Master’s Degree in Computer Applications and PhD in computer science from Saurashtra University. He is currently working as an Associate Professor in Digital Forensics at the National Forensic Sciences University, India. He has more than 16 years of experience in academia and has published more than 16 research articles in reputed international journals. He has delivered more than 34 Expert Talks at various levels. His research interests are broadly in the area of Cyber Security and Digital Forensics. He is currently working on Machine Learning, Memory Forensics, Malware Analysis and IoT Security and Forensics.

Part 1 Cloud Computing

1 Cloud Computing Evolution, Research Issues, and Challenges

Neeraj Gupta and Asha Sohal

School of Engineering and Technology, K.R. Mangalam University, Gurugram

1.1 Introduction

A computing process requires resources like processors, memory, network, and software. The traditional computing model for IT services requires investing in the computing infrastructure. “On-premise” solution requires that you purchase and deploy required hardware and software at your premise. Such a solution involves a capital expenditure on the equipment and recurring operational spending on the maintenance and technological refreshes required from time-to-time. Another possible solution can be co-location facilities where the facility owner can provide services like power, cooling, and physical security. The customer needs to deploy its server, storage, and other equipment necessary for the operation. This solution reduces the capital expenditure and increases the operational cost as per the service-agreement agreed upon for hiring the services. Cloud computing aggregates various computing resources, both hardware and software, such that they are viewed as one large pool and accessed as utility services. The word utility refers to hire up the resources until the demand exists and service provider charges for resource usage. The term “pay-per-use” or “pay- as-you-go” is used to represent cloud computing’s commercial aspect.

Most users define cloud computing as IT services located somewhere on the cloud, where the cloud presents data centers’ location. It is essential to mention here that co-location data centers are off-premises and private clouds are typically on-premise. The National Institute of Standard and Technology (NIST) [1] define cloud computing as “Cloud Computing is a model for enabling ubiquitious, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models.” The definition essentially means that the cloud computing processes are automated, dynamic, and transparent to ensure minimal human intervention.

This chapter is organized in the following way: Section 1.2 discusses various technologies that contributed to the evolution of cloud computing. Section 1.3 explains the characteristics of the cloud, service models, and cloud deployment models. Section 1.4 illustrates various research issues and challenges that confront cloud computing. Section 1.5 describes emerging trends and research challenges associated with them.

1.2 Evolution of Cloud Computing

Cloud computing involves hardware, software processes, and networking. Figure 1.1 illustrates multiple technologies that contribute to the initiation, development, and management of cloud computing services. This section briefly describes key technologies such as grid computing, utility computing, ubiquitous computing, service-oriented architecture, and virtualization that form the foundation pillars for cloud computing.

Figure 1.1  Evolution of Cloud Computing (Arockiam, Monikandan and Parthasarathy, 2017).

1.2.1 Grid Computing

It is the form of loosely coupled distributed computing. The resources associated with heterogeneous systems are remotely connected. The system can share each other resources transparently. The system users can access and utilize the resources, including processing power, memory, and data storage. The grid is more involved with huge, non-interactive tasks where the computation can occur independently without communicating intermediate results between the processor [2]. Grid computing helps the service providers to create a huge pool of resources without investing in large and expensive mainframes.

1.2.2 Utility Computing

Utility computing is a service provisioning model in which a service provider makes computing resources and infrastructure management available to the customer as needed and charges them based on usage rather than a flat rate. It is a business model where customers pay utility company/service providers to access and utilize the computing as per their requirements. The computing resources can be dynamically acquired and subsequently released by the customer. The pay-as-you-go model helps in better resource management of pooled resources offered by the service provider. The customer can save the capital expenditure and recurring operational expenditure toward infrastructure to run the business [4].

1.2.3 Ubiquitous Computing

Mark Weiser first proposed the idea of ubiquitous computing in 1988 [5]. The authors’ impression was to integrate computing into the everyday life of people transparently and seamlessly. It was envisioned that computing devices would come into various sizes, each developed to perform a particular task. The system will consist of specialized hardware and software that can communicate using wired media, radio waves, and infrared waves. The work laid the foundation of context-aware systems and innovative applications [6]. Pervasive computing is the convergence of mobile computing, ubiquitous computing, consumer electronics, and the Internet.

1.2.4 Service-Oriented Architecture

Service-Oriented Architecture (SOA) is a software design process that enables software components to access other software components’ functionality through a communication protocol over a network. The software components, viewed as services, offer a discrete functionality that can be accessed, updated, and acted upon remotely by other services to fulfill a task. The design promotes the loosely coupled distributed software components that can communicate with each other using a message-passing communication model. The SOA philosophy is independent of vendor, product, and technology [7]. Web services are based on the concept of SOA. W3C defines web services as a “software system designed to support interoperable machine-to-machine interaction over a network. It has an interface described in a machine-processable format specifically web service description language (WSDL). Other systems interact with the web service in a manner prescribed by its description using Simple Object Access Protocol (SOAP) messages, typically conveyed using HTTP with an XML serialization in conjunction with other web-related standards” [8].

Figure 1.2 illustrates the Find-Bind-Execute paradigm that defines the working of the web services. The service provider publishes the software components as service in a common registry. The service consumer can find the particular service using WSDL. Once the service is located service requester can invoke or initiate the web service at runtime.

Figure 1.2  SOA’s find-bind-execute paradigm (Qusay H. Mahmoud, 2005).

1.2.5 Virtualization

Personal computing endorsed the single operating image per machine. The operating system and hardware are tightly coupled with each other. This kind of arrangement does not fully utilize the power of underlying hardware. Whenever multiple applications are initiated, resource conflicts can occur, leading to under performance of the individual applications. Virtualization is a framework that divides physical computing components into numerous virtual resources. It relies on the software to manage various resources virtually and distribute to multiple applications flexibly and adhering to specific requirements. The goals of the virtualization architecture are equivalence, resource control, and efficiency [10]. The large pool of computing resources, including server, memory, network, operating systems, and applications are virtualized in data centers. These virtualized resources are offered to the end-users as metered services.

1.3 Cloud Computing Essentials

The US National Institute of Standard and Technology has defined cloud computing through five essential characteristics, three service models, and four deployment model [1].

1.3.1 Characteristics On-Demand Self-Service