Privacy and Security of Cloud-Based Internet of Things (IoT)

T. Choudhury, Ayushi Gupta, Saurabh Pradhan, Praveen Kumar, Y. Rathore
{"title":"Privacy and Security of Cloud-Based Internet of Things (IoT)","authors":"T. Choudhury, Ayushi Gupta, Saurabh Pradhan, Praveen Kumar, Y. Rathore","doi":"10.1109/CINE.2017.28","DOIUrl":null,"url":null,"abstract":"The IoT is in need of an advanced prototype for security, which considers the security issues from a holistic perspective comprising the advanced users and their intercommunication with this technology. In this paper, it has been analyzed and compared how current approaches are ensuring fundamental and basic secu-rity requisites and securing intercommunication of IoT, along with the rolling challenges and scope for research work in this field in the coming future. Cloud Computing is today's generation advanced technology services are made available for customers per utilization basis. Servers are being utilized on cloud to out-source their highly valuable data. Though there are many benefits of cloud computing. However, it has security threads of pivotal confidential data. Users of cloud technology can't count on the cloud service sup-pliers for the safety of the pivotal confidential data. Therefore, a Third-Party Authenticator is required which authenticates the cloud data from the side of users or holders of the data. Security of sensitive data is of questionable nature due to the presence of various entities. Cloud Service Providers along with Data Users are equally in charge for putting the security of the pivotal confidential data at risk. Surveys have sug-gested that huge storage systems cannot be trusted completely; and all of them can be hacked.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"36","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINE.2017.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 36

Abstract

The IoT is in need of an advanced prototype for security, which considers the security issues from a holistic perspective comprising the advanced users and their intercommunication with this technology. In this paper, it has been analyzed and compared how current approaches are ensuring fundamental and basic secu-rity requisites and securing intercommunication of IoT, along with the rolling challenges and scope for research work in this field in the coming future. Cloud Computing is today's generation advanced technology services are made available for customers per utilization basis. Servers are being utilized on cloud to out-source their highly valuable data. Though there are many benefits of cloud computing. However, it has security threads of pivotal confidential data. Users of cloud technology can't count on the cloud service sup-pliers for the safety of the pivotal confidential data. Therefore, a Third-Party Authenticator is required which authenticates the cloud data from the side of users or holders of the data. Security of sensitive data is of questionable nature due to the presence of various entities. Cloud Service Providers along with Data Users are equally in charge for putting the security of the pivotal confidential data at risk. Surveys have sug-gested that huge storage systems cannot be trusted completely; and all of them can be hacked.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于云的物联网(IoT)的隐私和安全
物联网需要一个先进的安全原型,从整体的角度考虑安全问题,包括高级用户及其与该技术的交互。在本文中,分析和比较了目前的方法如何确保物联网的基本和基本安全要求和确保互联互通,以及未来该领域研究工作的滚动挑战和范围。云计算是当今一代先进的技术,服务是按利用率为基础提供给客户的。服务器在云上被用来外包其非常有价值的数据。尽管云计算有很多好处。然而,它有关键机密数据的安全线程。云技术的用户不能指望云服务供应商保证关键机密数据的安全。因此,需要一个第三方认证器,从用户或数据持有者的角度对云数据进行认证。由于存在各种实体,敏感数据的安全性存在问题。云服务提供商和数据用户同样有责任将关键机密数据的安全性置于风险之中。调查表明,庞大的存储系统不能完全信任;所有这些都可以被黑掉。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Building Occupancy Detection Using Feed Forward Back-Propagation Neural Networks Stock Prediction Using Functional Link Artificial Neural Network (FLANN) Symmetric Axis Based Off-Line Odia Handwritten Character and Numeral Recognition Artificial Intelligence Techniques Used to Detect Object and Face in an Image: A Review Application of JAYA Algorithm to Tune Fuzzy-PIDF Controller for Automatic Generation Control
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1