{"title":"物联网和云环境中各种攻击和漏洞的若干调查","authors":"K. Sarmila, S. Manisekaran","doi":"10.1109/I-SMAC55078.2022.9986503","DOIUrl":null,"url":null,"abstract":"Extensive development in networking and data communication among IoT devices has involved cloud computing in IoT environments to handle the ongoing data processing demands. The accelerated growth and integration of IoT and Cloud computing led to parallel expansion in the requirement of security and privacy of data at various levels of communication. Through communication with each other, these technologies aim at simplifying human life but are more vulnerable to different types of attacks. This paper focuses on building a knowledge base on various attacks on the IoT environment and highlights the importance of implementing data protection methodologies. Awareness of various threats is the initial step in providing sufficient protection to data. This paper recognizes research directions and challenges to integrate possible techniques and protective solutions to overcome malicious attacks in IoT and Cloud.","PeriodicalId":306129,"journal":{"name":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Certain Investigation of Various Attacks and Vulnerabilites in IoT and Cloud Environment\",\"authors\":\"K. Sarmila, S. Manisekaran\",\"doi\":\"10.1109/I-SMAC55078.2022.9986503\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Extensive development in networking and data communication among IoT devices has involved cloud computing in IoT environments to handle the ongoing data processing demands. The accelerated growth and integration of IoT and Cloud computing led to parallel expansion in the requirement of security and privacy of data at various levels of communication. Through communication with each other, these technologies aim at simplifying human life but are more vulnerable to different types of attacks. This paper focuses on building a knowledge base on various attacks on the IoT environment and highlights the importance of implementing data protection methodologies. Awareness of various threats is the initial step in providing sufficient protection to data. This paper recognizes research directions and challenges to integrate possible techniques and protective solutions to overcome malicious attacks in IoT and Cloud.\",\"PeriodicalId\":306129,\"journal\":{\"name\":\"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I-SMAC55078.2022.9986503\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SMAC55078.2022.9986503","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Certain Investigation of Various Attacks and Vulnerabilites in IoT and Cloud Environment
Extensive development in networking and data communication among IoT devices has involved cloud computing in IoT environments to handle the ongoing data processing demands. The accelerated growth and integration of IoT and Cloud computing led to parallel expansion in the requirement of security and privacy of data at various levels of communication. Through communication with each other, these technologies aim at simplifying human life but are more vulnerable to different types of attacks. This paper focuses on building a knowledge base on various attacks on the IoT environment and highlights the importance of implementing data protection methodologies. Awareness of various threats is the initial step in providing sufficient protection to data. This paper recognizes research directions and challenges to integrate possible techniques and protective solutions to overcome malicious attacks in IoT and Cloud.