A Comprehensive Survey on Privacy and Security Issues in Cloud Computing, Internet of Things and Cloud of Things (original) (raw)
Related papers
Procedia Computer Science, 2017
This paper gives insights into the most important existing problems of security and privacy of the Cloud Computing (CC), Internet of Things (IoT) and Cloud of Things (CoT) concepts especially confidentiality issue. With the evolution of ubiquitous computing, everything is connected everywhere, therefore these concepts have been widely studied in the literature. However, intrusions and vulnerabilities will be more recurrent due to the systems complexity and the difficulty to control each access attempt. To tackle this issue, researchers have been focused on various approaches enforcing security and privacy. In the present paper, risk factors and solutions regarding these technologies are reviewed then current and future trends are discussed.
IoT security and privacy concerns in cloud ecosystem
INDUSTRIAL, MECHANICAL AND ELECTRICAL ENGINEERING
In current times, devices are connected over the internet to make our life simpler without our actual involvement. This connectivity's backbone is an advanced technology that plays a protagonist in this networking world through material objects embedded in RFID form. Technology that we will deep dive into is IoT, and the other one to enhance this is cloud computing. The cloud of things has completely driven our lives in this ubiquitous computing world, whether it is computing, networking and, storage. This purpose can be achieved easily by pay as per usage and that too on-demand basis. Unfortunately, when the users and IoT devices continuously share networking resources and computing remotely, it projects security issues. Therefore, preserving data policies is highly important in this environment. In this research paper, the prime focus is on critical risk, i.e., security and privacy issues, by analyzing potential challenges and security issues that are yet to be resolved. This technology is our future and therefore getting more attention on the security part. Thus, it requires the deployment of high-end security and policies which can ensure confidentiality of the data, authentication of devices, managing and monitoring the access point, and integrity of the network.
Internet of Cloud: Security and Privacy Issues
Studies in Big Data, 2018
The synergy between the cloud and the IoT has emerged largely due to the cloud having attributes which directly benefit the IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that these systems face. We thoroughly investigate current security and privacy preservation solutions that exist in this area, with an eye on the Industrial Internet of Things, discuss open issues and propose future directions.
Twenty security considerations for cloud-supported Internet of Things
To realise the broad vision of pervasive computing, underpinned by the “Internet of Things” (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends towards the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy and personal safety risks that arise beyond these subsystems; that is, from the wide-scale, cross-platform openness that cloud services bring to IoT. In this paper we focus on security considerations for IoT from the perspectives of cloud tenants, end-users and cloud providers, in the context of wide-scale IoT proliferation, working across the range of IoT technologies (be they things or entire IoT subsystems). Our contribution is to analyse the current state of cloud-supported IoT to make explicit the security considerations that require further work.
Security Implications with IoT in Cloud Computing
2024
In light of the rapid expansion of IoT deployments and the increasing reliance on cloud services, understanding and addressing the security implications of IoT cloud integration have become paramount. The shift towards centralized storage and processing of IoT data in cloud environments offers scalability and flexibility but also exposes sensitive information to potential threats. Thus, it becomes imperative to analyze the security posture of IoT cloud architectures comprehensively. This paper explores how IoT devices and cloud systems work together, showing the weaknesses and ways attackers could target them. Through a detailed examination of security challenges such as data breaches, unauthorized access, and inadequate encryption, the paper provides insights into the multifaceted nature of IoT cloud security. Moreover, it underscores the importance of proactive measures such as robust encryption protocols, access controls, and continuous monitoring to safeguard IoT deployments against evolving cyber threats. This paper aims to help stakeholders and practitioners make better decisions and take effective security measures to protect IoT ecosystems by enhancing their understanding of IoT cloud security dynamics.
Cloud Computing and Security in the IoT Era
HELIX, 2020
Advancements in information technology, and transfer of data online leading to the vulnerabilities and giving an invitation to cyber threats. Security and privacy are important issues in cloud storage and networking fields. Cloud computing created an environment that facilitates the internet of things. The cloud computing technology consisted of servers, applications, and other storage devices, relying on the virtual connection. The stored information in clouds can be manipulated without the need for extensive physical activities. The internet of things devices provide information and services through information and communication technology, these end-node IoT devices are not very intelligent and resource-constrained thus they are vulnerable to cyber threats. It posed an issue of insecurity as malicious individuals learned ways of intruding these systems and causing intellectual and physical losses. The study proposes numerous solutions for the challenges of privacy and security in the cloud and IoT. The paper provides an in-depth examination of security challenges in cloud computing and IoT. The methodology uses the interpretive technique. The results depict the importance of the machine and deep learning in cyber-attack and mitigation. Analysis of variance (ANOVA) test statistics is used to test the reliability of the study.
20 Cloud Security Considerations for Supporting the Internet of Things
IEEE Internet of Things Journal, 2015
To realise the broad vision of pervasive computing, underpinned by the "Internet of Things" (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends towards the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy and personal safety risks that arise beyond these subsystems; that is, from the wide-scale, crossplatform openness that cloud services bring to IoT. In this paper we focus on security considerations for IoT from the perspectives of cloud tenants, end-users and cloud providers, in the context of wide-scale IoT proliferation, working across the range of IoT technologies (be they things or entire IoT subsystems). Our contribution is to analyse the current state of cloud-supported IoT to make explicit the security considerations that require further work.
CLOUD OF THINGS: SECURITY CONCERNS FOR THE USER AND MINIMIZING THE PROBLEMS BY THE SERVICE PROVIDER
The internet has become the centre of development in the 21 st century. In some nations it is even a basic human right and ways are always being made to make it easily accessible. Some large corporations have even made initiatives to make internet freely accessible to people. For example, Facebook partnered some other global players to introduce internet.org a project which is providing free internet access to third world countries. With internet expanding, more work has been done to connect devices. This has been necessitated by ubiquitous computing.
International Journal of Computer Trends and Technology (IJCTT), 2020
The so called internet of things (IoT) is a form of technology advancement that has a capacity for driving change in our daily lives in a variety of sectors. The fantastic opportunity will help in the collection of data that is relatively exponential and in a manner that is continuous to present changes that are significant on the lives. Devices growth and the speed in which they are developed to attain the IoT era of technology offers the challenges of security and the battling of freedom as people establish policies and governance that rebuilds the developments without interfering with the innovations. Among the issues, includes the concerns on the security and privacy brought by the technology. The vulnerabilities of security that are experienced by the IoT devices are as a result of the contributing factors like the low capabilities of the devices in terms of energy and the capabilities of computing, the wireless channels are seemingly unreliable, and the vulnerabilities on the physical nature of the devices. This paper will focus on the IoT evolution, the definitions attached to IoT, and some of the many applications of IoT. It will create an emphasis on the considerations of security and privacy, including the challenges that are tied to the general IoT and the IoT application context. A critical assessment of the works done for IoT is presented by the literature review on the perspective of the developmental era and the evaluation of the trend. The paper will also give the IoT security risks taxonomy, mechanisms, and attacks related to the technology.
In this chapter, the authors collected data from issues related to threats in the applications of IoT-based technologies that describe the security and privacy issues from 30 peer reviewed publications from 2014 to 2017. Further, they analyzed each threat type and its percentages in each application of the internet of things. The results indicated that the applications of smart transportation (20%) face the highest amount of security and privacy issues followed by smart home (19%) and smart cities (18%) compared to the rest of the applications. Further, they determined that the biggest threats were denial of service attack (9%) followed by eavesdropping (5%), man in the middle (4%), and replay (4%). Denial of service attacks and man in the middle attack are active attacks that can severely damage human life whereas eavesdropping is a passive attack that steals information. This study has found that privacy issues have the biggest impacts on people. Therefore, researchers need to find possible solutions to these threats to improve the quality of IoT applications.