A Secure IoT Service Architecture With an Efficient Balance Dynamics Based on Cloud and Edge Computing (original) (raw)

A novel trust management model for edge computing

Complex & Intelligent Systems

Edge computing is a distributed architecture that features decentralized processing of data near the source/devices, where data are being generated. These devices are known as Internet of Things (IoT) devices or edge devices. As we continue to rely on IoT devices, the amount of data generated by the IoT devices have increased significantly due to which it has become infeasible to transfer all the data over to the Cloud for processing. Since these devices contain insufficient storage and processing power, it gives rise to the edge computing paradigm. In edge computing data are processed by edge devices and only the required data are sent to the Cloud to increase robustness and decrease overall network overhead. IoT edge devices are inherently suffering from various security risks and attacks causing a lack of trust between devices. To reduce this malicious behavior, a lightweight trust management model is proposed that maintains the trust of a device and manages the service level tru...

Trust in Edge-based Internet of Things Architectures: State of the Art and Research Challenges

ACM Computing Surveys

The Internet of Things (IoT) aims to enable a scenario where smart objects, inserted into information networks, supply smart services for human beings. The introduction of edge computing in IoT can reduce the decision-making latency, save bandwidth resources, and expand the cloud services to be allocated at the network’s edge. However, edge-based IoT systems currently face challenges in their decentralized trust management. Trust management is essential to obtain reliable mining and data fusion, improved user privacy and data security, and provisioning of services with context-awareness. In this survey, we first examine the edge-based IoT architectures currently reported in the literature. Then a complete review of trust requirements in edge-based IoT systems is produced. Also, we discuss about blockchain as a solution to solve several trust problems in IoT and analyze in detail the correlation between blockchain and edge computing. Finally, we provide a detailed analysis of perform...

An Edge Driven Security Framework For Intelligent Internet Of Things

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2021

The use of IoT technologies has increased from 13 percent in 2014 to about 25 percent today. And around the world number of IoT-connected devices is expected to increase to 43 billion by 2023, a threefold increase from 2018. IoT will continue to grow in device numbers and use cases, but organizations must reckon with the security and interoperability challenges that have plagued the market since the beginning. Building robust IOT applications by incorporating security features has become a necessity. Thus, in this article, an edge-driven security framework architecture is described for intelligent IoT systems. A security framework contains all standard security features required by an application such as authentication, authorization, secure connection etc. We introduce the architecture of edge-driven intelligent IoT, and present typical edge-driven intelligent IoT applications. Second, we point out the security threats in edge-driven intelligent IoT in terms of attack behaviour of adversaries. Third, we develop a case study of edge-driven intelligent IoT from the security perspective. Our focus is to develop a middleware or framework between the Users and IoT Environment to ensure users are connected to IoT environment upon authentication for a contract session and create secure communication via cloud between the users and IoT environment

Proposing a Novel IoT Framework by Identifying Security and Privacy Issues in Fog Cloud Services Network

International Journal of Emerging Trends in Engineering Research (IJETER), 2021

These days, the Internet of Things applications are growing progressively. However, the existing frameworks for IoT applications are notsatisfied the security, allocation, and provisioning requirements.We propose a novel secure IoT application framework. Fog cloud execution model is serverless computing which is run by the server in cloud provider and the allocation of machine resources is dynamically managed. The application which consumes the actual amount of resources, the pricing is based upon that rather on pre-purchase units of capacity. The proposed framework consists of different methods, such as secure mobility, resource allocation, provisioning, and prediction under blockchain technologies

ENHANCED SECURITY FRAMEWORK FOR CLOUD- LINKED IoT

Internet of Things (IoT) is evaluated there are over a billion web clients and quickly expanding. In any case, there are a larger number of things on the web than there are individuals on the web. This is the thing that it has been for the most part mean, when it has been say internet of things. There are a great many gadgets with sensors that are connected up together utilizing networks that create an ocean of information. The issue is all information needs to remain secured, unaltered, and held on at each phase of an IoT solution. This incorporates database servers, distributed components, back-end analytics and communication infrastructure, crosswise over conceivably adverse environments and remote locations. Regardless, it is defenseless against eavesdropping which speaks to a hazard to protection and security of the customer. The security of information movement winds up evidently imperative since the interchanges over open network happen habitually. It is thusly fundamental that the information movement over the framework is scrambled. To give the QoS, the Cloud-connected IoT security is the basic piece of the specialist organizations. This paper is focusing on issue relating to the Cloud-connected IoT security in virtual condition.. It has been propose a method COOPERATION KEY PROCESSING for giving information process and security in Cloud-connected IoT utilizing Elliptical Curve Cryptography ECC and Hash Map. Support, delineates the security services consolidates era of key, encryption and decryption in virtual condition.

Trust management and evaluation for edge intelligence in the Internet of Things

Engineering Applications of Artificial Intelligence, 2020

Information and Communication Technologies (ICTs) have revolutionised the traditional communication processes, converting the cities into Smart Cities. Internet of Things (IoT) is one of the leading frameworks in Smart Cities realm; it is based on heterogeneous infrastructure, digital systems, smart technologies, and intelligent services. Due to the complex networks supporting the IoT world, smart devices and services are quickly degrading due to various factors. Security is one of the considered factors, and it also represents a difficult challenge. Malicious nodes disrupt the data traffic and integrity of IoT-based networks. This paper presents a novel Cumulative Trust Evaluation based Efficient Technique (CTBET) by singling out numerous viewpoints on governing and implementing the security in edge-based IoT networks. The proposed CTBET is based on the cumulative trust concept, which calculates the direct and indirect trust among nodes considering the packet drop rate and the packet data rate among different transmission nodes. Furthermore, it enforces suitable approaches to implement the trust mechanism based technique to enhance security and privacy. The proposed scheme handles the On-Off, Denial of Service (DoS) and Bad-Mouth attacks and is also able to isolate the malicious nodes in edge-based IoT networks. The provided simulation results show encouraging performance in terms of network life span, level of trustworthiness of nodes, lesser end-toend delay and high data delivery ratio, during data transmission in the presence of the malicious and selfish nodes in the network.

AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things

Neural Computing and Applications, 2020

With the increasing use of the Internet of things (IoT) in diverse domains, security concerns and IoT threats are constantly rising. The computational and memory limitations of IoT devices have resulted in emerging vulnerabilities in most IoT-run environments. Due to the low processing ability, IoT devices are often not capable of running complex defensive mechanisms. Lack of an architecture for a safer IoT environment is referred to as the most important barrier in developing a secure IoT system. In this paper, we propose a secure architecture for IoT edge layer infrastructure, called AI4SAFE-IoT. This architecture is built upon AI-powered security modules at the edge layer for protecting IoT infrastructure. Cyber threat attribution, intelligent web application firewall, cyber threat hunting, and cyber threat intelligence are the main modules proposed in our architecture. The proposed modules detect, attribute, and further identify the stage of an attack life cycle based on the Cyber Kill Chain model. In the proposed architecture, we define each security module and show its functionality against different threats in real-world applications. Moreover, due to the integration of AI security modules in a different layer of AI4SAFE-IoT, each threat in the edge layer will be handled by its corresponding security module delivered by a service. We compared the proposed architecture with the existing models and discussed our architecture independence of the underlying IoT layer and its comparatively low overhead according to delivering security as service for the edge layer of IoT architecture instead of embed implementation. Overall, we evaluated our proposed architecture based on the IoT service management score. The proposed architecture obtained 84.7 out of 100 which is the highest score among peer IoT edge layer security architectures.

An analysis of security challenges and their perspective solutions for cloud computing and IoT

ICST Transactions on Scalable Information Systems, 2018

INTRODUCTION: With the ongoing revolution in the Internet of Things and Cloud Computing has made the potential of every object that is connected through the Internet, to exchange and transfer data. Various users perceive this connection and interaction very helpful and serviceable in their daily routines. OBJECTIVES: The objective of this research to identify the complex configured network system is a soft target to security threats, therefore we need a security embedded framework for IoT and cloud communication models. Another objective is to provide protection of information from unauthorized access controls in IoT-cloud integrated framework and secure data from spying. METHODS: This paper has applied an integrated IoT-cloud theoretical solution, whose activities are mainly decided by a centralized controller to provide safeguard against data attacks. Our theoretical integrated IoT-cloud theoretical solution is able to achieve unauthorized access control and data breach. RESULTS: Internet of things and cloud computing has intensively used by several real-time applications. After the thercical analysis, the different vulnerabilities explained after detail literature review to prevent unauthorized access and unauthorized data breach. CONCLUSION: Internet of things have changed the shape of communication and centralized data controller is the main entity that is robust against eavesdroppers. In case, any eavesdropper tries to be a normal user and attempts to access a personal file then he has been entertained with a misleading file that he considers as an authentic file but in actual it is not. Desirable IoT proposed solutions need to be design and deploy, which can guarantee: anonymity, confidentiality, and integrity in heterogeneous environments.

Security Ecosystem in IoT & Cloud

— The cloud computing and the Internet of things are tightly coupled with each other. The rapid growth of the Internet of Things (IoT) and the development of technologies created a widespread connection of " things ". This results in the production of large amounts of data which needs to be stored, processed and accessed. Cloud computing is a paradigm for big data storage and analytics while the Internet of Things is exciting on its own that the real innovation will come from combining it with cloud computing. This can enable sensing services and powerful processing of sensing data stream. More things are being connected to address a growing range of business needs. In fact, by the year 2020, more than 50 billion things will connect to the Internet—seven times our human population. Insufficient security will be a critical barrier to large-scale deployment of IoT systems and broad customer adoption of IoT applications using cloud. Simply extending the existing IT security architectures to the IoT and cloud will not be sufficient. The IoT world requires new security approaches, creating fertile ground for innovative thinking and solutions. This paper discusses key issues that are believed to have long-term significance in IoT and cloud computing security and privacy, based on documented problems and exhibited weaknesses.

IoT security and privacy concerns in cloud ecosystem

INDUSTRIAL, MECHANICAL AND ELECTRICAL ENGINEERING

In current times, devices are connected over the internet to make our life simpler without our actual involvement. This connectivity's backbone is an advanced technology that plays a protagonist in this networking world through material objects embedded in RFID form. Technology that we will deep dive into is IoT, and the other one to enhance this is cloud computing. The cloud of things has completely driven our lives in this ubiquitous computing world, whether it is computing, networking and, storage. This purpose can be achieved easily by pay as per usage and that too on-demand basis. Unfortunately, when the users and IoT devices continuously share networking resources and computing remotely, it projects security issues. Therefore, preserving data policies is highly important in this environment. In this research paper, the prime focus is on critical risk, i.e., security and privacy issues, by analyzing potential challenges and security issues that are yet to be resolved. This technology is our future and therefore getting more attention on the security part. Thus, it requires the deployment of high-end security and policies which can ensure confidentiality of the data, authentication of devices, managing and monitoring the access point, and integrity of the network.