{"title":"基于云的安全物联网应用报告系统综述","authors":"O. BabalolaG., Oguntimilehin","doi":"10.30534/ijccn/2021/011042021","DOIUrl":null,"url":null,"abstract":"Cloud-based Internet of Things environments exhibit different architectures based on the services they provide, thus making it even harder to find ‘global’ security measures. Many of the security issues in relations to Cloud Computing architecture, governance, portability and interoperability, have been addressed in other systems. The specific characteristics of Internet of Things application in Cloud environments result into new security concerns. Various security models have been proposed to deal with security threats ranging from authentication, access control, lightweight security, data privacy and so on. However, users are not aware of the degree of security integrated with the CloudInternet of Things application system thereby limiting the perceived trustworthiness of such systems. Therefore, the need to provide aCloud-based Internet of Things application reporting system that can predict and monitor the effectiveness of such applications cannot be overemphasized. In this paper, reviews of existing Cloud-based Internet of Things security approaches are presented. This paper is concluded by highlighting the future research direction with respect to improving the acceptability of secured Cloud-based Internet of Things deployment","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"120 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secured Cloud-Based Internet Of Things Application Reporting System: A Review\",\"authors\":\"O. BabalolaG., Oguntimilehin\",\"doi\":\"10.30534/ijccn/2021/011042021\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud-based Internet of Things environments exhibit different architectures based on the services they provide, thus making it even harder to find ‘global’ security measures. Many of the security issues in relations to Cloud Computing architecture, governance, portability and interoperability, have been addressed in other systems. The specific characteristics of Internet of Things application in Cloud environments result into new security concerns. Various security models have been proposed to deal with security threats ranging from authentication, access control, lightweight security, data privacy and so on. However, users are not aware of the degree of security integrated with the CloudInternet of Things application system thereby limiting the perceived trustworthiness of such systems. Therefore, the need to provide aCloud-based Internet of Things application reporting system that can predict and monitor the effectiveness of such applications cannot be overemphasized. In this paper, reviews of existing Cloud-based Internet of Things security approaches are presented. This paper is concluded by highlighting the future research direction with respect to improving the acceptability of secured Cloud-based Internet of Things deployment\",\"PeriodicalId\":313852,\"journal\":{\"name\":\"International Journal of Computing, Communications and Networking\",\"volume\":\"120 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computing, Communications and Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30534/ijccn/2021/011042021\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computing, Communications and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30534/ijccn/2021/011042021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secured Cloud-Based Internet Of Things Application Reporting System: A Review
Cloud-based Internet of Things environments exhibit different architectures based on the services they provide, thus making it even harder to find ‘global’ security measures. Many of the security issues in relations to Cloud Computing architecture, governance, portability and interoperability, have been addressed in other systems. The specific characteristics of Internet of Things application in Cloud environments result into new security concerns. Various security models have been proposed to deal with security threats ranging from authentication, access control, lightweight security, data privacy and so on. However, users are not aware of the degree of security integrated with the CloudInternet of Things application system thereby limiting the perceived trustworthiness of such systems. Therefore, the need to provide aCloud-based Internet of Things application reporting system that can predict and monitor the effectiveness of such applications cannot be overemphasized. In this paper, reviews of existing Cloud-based Internet of Things security approaches are presented. This paper is concluded by highlighting the future research direction with respect to improving the acceptability of secured Cloud-based Internet of Things deployment