SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 223
An evaluation of selective security issues in Internet of Things
based on Cloud
Karandeep Kaur
(Department of Computer Science, Guru Nanak Dev University, Amritsar)
----------------------------------------************************----------------------------------
Abstract:
The implementation of Internet of Cloud needs a broad vision of technology and computing. It
requires the incorporation of diverse technologies in order to realize its working. Cloud computing is
enabling the use of IoT in wide application areas. Its natural feature of being readily available is showing
tremendous advantages in Internet of Things and smart functionalities. However, there are a few aspects of
using cloud services in the IoT mainly revolving around data security and access policies. This paper
presents a perspective on this side of cloud usage and how it can be handled proficiently. A detailed study
and evaluation of selective security issues has been done to help the reader get acquainted with this side of
cloud in IoT.
Keywords — Internet of Things, Cloud computing, Security in cloud, Cloud based IoT, Security
issues in IoT
----------------------------------------************************----------------------------------
I. OVERVIEW OF INTERNET OF THINGS
AND CLOUD COMPUTING
The Internet of Things is the forthcoming concept
of Information technology. The idea behind it is the
union of web, Information and Communications
(ICT) technology and mobile services. It will
enable different devices in a model system to
interact and coordinate with each other to perform
their job efficiently. According to the definition
given by ITU, “The IoT describes a worldwide
network of billions or trillions of objects that can be
collected from the worldwide physical environment,
propagated via the Internet, and transmitted to end-
users. Services are available for users to interact
with these smart objects over the Internet, query
their states, as well as their associated information,
and even control their actions” [1]. Its main
principle is to create a large network which consists
of different smart devices and networks to facilitate
the information sharing of global things from any
place and at any time [2].
The technologies which are widely used in
Internet of Things are RFID, WSN, 3S, Cloud
computing etc. Radio Frequency Identification
(RFID) assigns identifiable tags to various objects
and devices. These tags transmit information which
is read by a RSID reader and is then used as per the
requirements. These tags turn the normal devices
into smart devices in IoT [3]. Sensors are also used
to collect and interpret the data from various
resources. The 3S technology consists of GPS
(Global Position system), GIS (Geography
Information System) and RS (Remote Sense) which
provides the details about the locations of various
objects using satellites and sensors etc. and
processes that information. Wireless Sensor
Network (WSN) facilitates transmission of the data
in IoT.
Cloud services which are readily available and
location-independent are used to store and compute
data generated in IoT. These services may be
provisioned where required very easily. Cloud
services are best suitable for IoT environment due
to various factors like easy availability, managing
resource restraints, pay-per-use policy etc. Cloud
servers can provide services in the form of software,
storage space, computational power, platforms etc.
The use of cloud services has its own implications
RESEARCH ARTICLE OPEN ACCESS
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 224
and considerations. The concerns relates to the use
of cloud in IoT are covered in this paper. Table 1
discusses the security aspects of cloud in IoT
focusing on data storage, access and management
perspectives.
II. SECURITY CONSIDERATIONS
RELATED TO DATA STORAGE, ACCESS
AND MANAGEMENT
Looking at various factors impacting the security
of cloud in IoT with respect to the data storage,
access and management techniques, the following
facts come up.
A. SECURING COMMUNICATION
The first requirement of any service based on
networks is the security and integrity of data. It has
been a constant effort on the part of cloud service
providers to improve the level of security in the
communication between devices and the cloud.
Transport Layer Security (TLS), commonly used by
providers, uses encryption methods to provide
security. In order to modify the existing TLS for the
smart devices in IoT, works are going on by the
researchers. Various encryption techniques need to
be used by the devices themselves to ensure
security [4].
B. ACCESS CONTROL
The authentication and authorization of the
devices in IoT which connect to the cloud come
under the access control provisions. When a device
connects to the cloud, it should authenticate itself
and after it is established that the device is allowed
to do so, the process of authorization is initiated. It
will provide access to the cloud as per the
authorization rights and privileges of the device.
The access control policies are required to manage
this access control. Trusted Platform Modules
provide services related to management of device
access and rights [5].
C. SENSITIVITY OF DATA
This is an important aspect when it comes to
Internet of Things environment. Sensitive data has
to be dealt with caution and should not be available
for access to unauthorized users. In IoT the devices
that produce data need to be identified and proper
measures should be taken. Also, the same device
may not produce sensitive data all the time so this
also needs to be kept in mind.
D. DATA PROTECTION ON CLOUD
This is related to the security of data when it is
stored on the cloud. Though TLS is offered by most
of the cloud service providers, but that may not be
enough when it comes to sensitive data leaks within
the cloud by the insiders. This needs to be
considered while using cloud in IoT. Also as cloud
providers work on the notion of virtualization,
measures need to be taken to facilitate the isolation
at such levels [6][7]. When the cloud provider
can’t be trusted, encryption may be done by the
smart device itself and it should not rely on cloud
only.
E. DECISION REGARDING CHOICE OF CLOUD
When a particular field like healthcare generates
both sensitive data like patient records as well as
not-so-sensitive data like monitoring heart-rate etc.,
the choice of cloud service is an important concern.
The sensitive data needs to be stored on private
cloud with complete protection and authorization
while the monitoring data may be stored on public
cloud. Also, this kind of environment suggests the
importance of hybrid clouds which however, has its
own security issues when it changes control from
private to public cloud and vice-versa.
F. DATA SHARING WITHIN THE CLOUD
Along with the security of data stored on cloud,
there should be provisions of data sharing within
the cloud. For example, a sensor used to monitor
patient’s heart-beat and another one to monitor its
motion may work separately and store their
respective data on the cloud, however they need to
share the information with each other to ensure
smooth working in IoT healthcare. There is a need
to have policies which enable this data sharing. A
methodology called Information Flow Control (IFC)
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 225
Table 1: Security Considerations in IoT of Cloud
Security considerations in IoT of cloud Solutions and Implications
Securing Communications Use of TLS, encryption
Need for protocols suitable for devices in IoT
Access Control Access control policies
Authentication and authorization
Sensitivity of Data Sensitive data on private cloud
Less sensitive data on public cloud
Data protection on cloud TLS offered by cloud
Encryption by device itself
Choice of cloud Depends on the kind of data
Hybrid cloud a promising solution
Data sharing within cloud Information Flow Control (IFC)
Access policies for sharing
Encryption by IoT devices Encryption by the device to ensure security
Limits the operations of cloud to storage only
has been developed to ensure that such policies are
adopted and also complied with [8][9].
G. ENCRYPTION BY IoT DEVICES
To ensure data security, the IoT smart devices
which generate the data can encrypt it before
sending to the cloud. This can solve many purposes
like secure transit of data, preventing data leakages
on the cloud, preventing access of cloud to sensitive
data, protection from insiders with malicious intent
etc. However, the encryption of data can put extra
burden on the devices so it should be done only
when absolutely necessary. Also, the cloud can’t
perform other operations like analysis and
computations on the encrypted data, so this should
also be considered before implementing this policy
[10].
CONCLUSION
The paper aims to assess the security consideration
of using cloud services in Internet of Things model.
The role of cloud in IoT has been discussed and its
suitability reasoned. The aspects of security related
to data storage, access and management are studied
along with their potential solutions. The cloud
computing model is the most appropriate for IoT
implementation; however some aspects need to be
taken care of in order to reap its potential to the
most.
REFERENCES
[1] Lei CHEN, Mitchell TSENG, Xiang LIAN. Development of
foundation models for Internet of Things. Front. Comput. Sci. China
2010, 4(3): 376–385.
[2] Su-bin SHEN, Qu-li FAN, Ping ZONG. Study on the Architecture and
Associated Technologies for Internet of Things. Journal of Nanjing
University of Posts and Telecommunications (Natural Science).2009,
29(6):1-11.
[3] ITU. ITU Internet Reports 2005: The Internet of Things, ITU (2005).
[4] T. Dierks and C. Allen, “The TLS Protocol Version 1.0,” IETF, Tech.
Rep., 1999.
[5] T. Morris, “Trusted Platform Module,” in Encyclopedia of
Cryptography and Security. Springer, 2011, pp. 1332–1335
[6] S. Soltesz, H. P¨otzl, M. E. Fiuczynski, A. Bavier, and L. Peterson,
“Container-based operating system virtualization: a scalable, high
performance alternative to hypervisors,” in SIGOPS Operating
Systems Review, vol. 41, no. 3. ACM, 2007, pp. 275–287.
[7] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R.
Neugebauer, I. Pratt, and A. Warfield, “Xen and the art of
virtualization,” SIGOPS Operating Systems Review, vol. 37, no. 5, pp.
164–177, 2003.
[8] J. Bacon, D. Eyers, T. Pasquier, J. Singh, I. Papagiannis, and P.
Pietzuch, “Information Flow Control for Secure Cloud Computing,”
IEEE TNSM SI Cloud Service Management, vol. 11, no. 1, pp. 76–89,
2014.
[9] T. F. J.-M. Pasquier, J. Singh, and J. Bacon, “Information Flow Control
for Strong Protection with Flexible Sharing in PaaS,” in IC2E,
International Workshop on Future of PaaS. IEEE, 2015.
[10] R. J. Anderson, Security Engineering: A Guide to Building Dependable
Distributed Systems, 2nd ed. Wiley Publishing, 2008.

More Related Content

What's hot

IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET Journal
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's ApplicationsAakashjit Bhattacharya
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded SystemsIRJET Journal
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsVishwesh Nagamalla
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system IJECEIAES
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspectiveijtsrd
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 

What's hot (20)

IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Lecture 16
Lecture 16Lecture 16
Lecture 16
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's Applications
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systems
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 

Viewers also liked

Viewers also liked (19)

[IJCT-V3I2P27] Authors: Palwinder Singh
[IJCT-V3I2P27] Authors: Palwinder Singh[IJCT-V3I2P27] Authors: Palwinder Singh
[IJCT-V3I2P27] Authors: Palwinder Singh
 
[IJET-V2I3P21] Authors: Amit Kumar Dewangan, Akhilesh Kumar Shrivas, Prem Kumar
[IJET-V2I3P21] Authors: Amit Kumar Dewangan, Akhilesh Kumar Shrivas, Prem Kumar[IJET-V2I3P21] Authors: Amit Kumar Dewangan, Akhilesh Kumar Shrivas, Prem Kumar
[IJET-V2I3P21] Authors: Amit Kumar Dewangan, Akhilesh Kumar Shrivas, Prem Kumar
 
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
 
[IJET-V1I4P7] Authors :Su Mon Myint
[IJET-V1I4P7] Authors :Su Mon Myint[IJET-V1I4P7] Authors :Su Mon Myint
[IJET-V1I4P7] Authors :Su Mon Myint
 
[IJET-V1I6P18] Authors : Wasim B. Patel , Pundlik N. Patil , Raghunath Y. Pat...
[IJET-V1I6P18] Authors : Wasim B. Patel , Pundlik N. Patil , Raghunath Y. Pat...[IJET-V1I6P18] Authors : Wasim B. Patel , Pundlik N. Patil , Raghunath Y. Pat...
[IJET-V1I6P18] Authors : Wasim B. Patel , Pundlik N. Patil , Raghunath Y. Pat...
 
[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R
[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R
[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R
 
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
 
[IJET V2I3P5] Authors: Jamuna H G, Shobha Hugar
[IJET V2I3P5] Authors: Jamuna H G, Shobha Hugar[IJET V2I3P5] Authors: Jamuna H G, Shobha Hugar
[IJET V2I3P5] Authors: Jamuna H G, Shobha Hugar
 
[IJET-V2I2P8] Authors:Ms. Madhushree M.Kubsad
[IJET-V2I2P8] Authors:Ms. Madhushree M.Kubsad[IJET-V2I2P8] Authors:Ms. Madhushree M.Kubsad
[IJET-V2I2P8] Authors:Ms. Madhushree M.Kubsad
 
[IJET-V1I6P17] Authors : Mrs.R.Kalpana, Mrs.P.Padmapriya
[IJET-V1I6P17] Authors : Mrs.R.Kalpana, Mrs.P.Padmapriya[IJET-V1I6P17] Authors : Mrs.R.Kalpana, Mrs.P.Padmapriya
[IJET-V1I6P17] Authors : Mrs.R.Kalpana, Mrs.P.Padmapriya
 
[IJET-V2I2P12] Authors:Ashok Kumar
[IJET-V2I2P12] Authors:Ashok Kumar[IJET-V2I2P12] Authors:Ashok Kumar
[IJET-V2I2P12] Authors:Ashok Kumar
 
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
 
[IJET-V2I1P9] Authors:Wasim B. Patel,Ritesh G. Deokar,Pundlik N. Patil,Raghun...
[IJET-V2I1P9] Authors:Wasim B. Patel,Ritesh G. Deokar,Pundlik N. Patil,Raghun...[IJET-V2I1P9] Authors:Wasim B. Patel,Ritesh G. Deokar,Pundlik N. Patil,Raghun...
[IJET-V2I1P9] Authors:Wasim B. Patel,Ritesh G. Deokar,Pundlik N. Patil,Raghun...
 
[IJET-V2I2P16] Authors: Jariwala Hiren, Patel Chintan, Prasad Kuldip, Shukla ...
[IJET-V2I2P16] Authors: Jariwala Hiren, Patel Chintan, Prasad Kuldip, Shukla ...[IJET-V2I2P16] Authors: Jariwala Hiren, Patel Chintan, Prasad Kuldip, Shukla ...
[IJET-V2I2P16] Authors: Jariwala Hiren, Patel Chintan, Prasad Kuldip, Shukla ...
 
[IJCT-V3I2P20] Authors: Gidijala Sai Kumar,Gadiraju Mounika , Dusi Leela Ran...
[IJCT-V3I2P20] Authors: Gidijala Sai Kumar,Gadiraju Mounika  , Dusi Leela Ran...[IJCT-V3I2P20] Authors: Gidijala Sai Kumar,Gadiraju Mounika  , Dusi Leela Ran...
[IJCT-V3I2P20] Authors: Gidijala Sai Kumar,Gadiraju Mounika , Dusi Leela Ran...
 
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
 
[IJET-V2I3P22] Authors: Harsha Pakhale,Deepak Kumar Xaxa
[IJET-V2I3P22] Authors: Harsha Pakhale,Deepak Kumar Xaxa[IJET-V2I3P22] Authors: Harsha Pakhale,Deepak Kumar Xaxa
[IJET-V2I3P22] Authors: Harsha Pakhale,Deepak Kumar Xaxa
 
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
 
[IJET-V2I1P6] Authors:
[IJET-V2I1P6] Authors:[IJET-V2I1P6] Authors:
[IJET-V2I1P6] Authors:
 

Similar to [IJCT V3I2P33] Authors: Karandeep Kaur

SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingIJECEIAES
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applicationsCSITiaesprime
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityAssociate Professor in VSB Coimbatore
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
20476-38939-1-PB.pdf
20476-38939-1-PB.pdf20476-38939-1-PB.pdf
20476-38939-1-PB.pdfIjictTeam
 
journal paper
journal paperjournal paper
journal paperrikaseorika
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 

Similar to [IJCT V3I2P33] Authors: Karandeep Kaur (20)

SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applications
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
20476-38939-1-PB.pdf
20476-38939-1-PB.pdf20476-38939-1-PB.pdf
20476-38939-1-PB.pdf
 
journal paper
journal paperjournal paper
journal paper
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 

More from IJET - International Journal of Engineering and Techniques

More from IJET - International Journal of Engineering and Techniques (20)

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p18
 
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p17
 
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p16
 
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p15
 
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p14
 
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p13
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p11
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
Ijet v5 i6p2
 
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P24
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P22
 
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P21
 
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P20
 
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P19
 
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P18
 
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17
IJET-V3I2P17
 

Recently uploaded

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

[IJCT V3I2P33] Authors: Karandeep Kaur

  • 1. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 223 An evaluation of selective security issues in Internet of Things based on Cloud Karandeep Kaur (Department of Computer Science, Guru Nanak Dev University, Amritsar) ----------------------------------------************************---------------------------------- Abstract: The implementation of Internet of Cloud needs a broad vision of technology and computing. It requires the incorporation of diverse technologies in order to realize its working. Cloud computing is enabling the use of IoT in wide application areas. Its natural feature of being readily available is showing tremendous advantages in Internet of Things and smart functionalities. However, there are a few aspects of using cloud services in the IoT mainly revolving around data security and access policies. This paper presents a perspective on this side of cloud usage and how it can be handled proficiently. A detailed study and evaluation of selective security issues has been done to help the reader get acquainted with this side of cloud in IoT. Keywords — Internet of Things, Cloud computing, Security in cloud, Cloud based IoT, Security issues in IoT ----------------------------------------************************---------------------------------- I. OVERVIEW OF INTERNET OF THINGS AND CLOUD COMPUTING The Internet of Things is the forthcoming concept of Information technology. The idea behind it is the union of web, Information and Communications (ICT) technology and mobile services. It will enable different devices in a model system to interact and coordinate with each other to perform their job efficiently. According to the definition given by ITU, “The IoT describes a worldwide network of billions or trillions of objects that can be collected from the worldwide physical environment, propagated via the Internet, and transmitted to end- users. Services are available for users to interact with these smart objects over the Internet, query their states, as well as their associated information, and even control their actions” [1]. Its main principle is to create a large network which consists of different smart devices and networks to facilitate the information sharing of global things from any place and at any time [2]. The technologies which are widely used in Internet of Things are RFID, WSN, 3S, Cloud computing etc. Radio Frequency Identification (RFID) assigns identifiable tags to various objects and devices. These tags transmit information which is read by a RSID reader and is then used as per the requirements. These tags turn the normal devices into smart devices in IoT [3]. Sensors are also used to collect and interpret the data from various resources. The 3S technology consists of GPS (Global Position system), GIS (Geography Information System) and RS (Remote Sense) which provides the details about the locations of various objects using satellites and sensors etc. and processes that information. Wireless Sensor Network (WSN) facilitates transmission of the data in IoT. Cloud services which are readily available and location-independent are used to store and compute data generated in IoT. These services may be provisioned where required very easily. Cloud services are best suitable for IoT environment due to various factors like easy availability, managing resource restraints, pay-per-use policy etc. Cloud servers can provide services in the form of software, storage space, computational power, platforms etc. The use of cloud services has its own implications RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 224 and considerations. The concerns relates to the use of cloud in IoT are covered in this paper. Table 1 discusses the security aspects of cloud in IoT focusing on data storage, access and management perspectives. II. SECURITY CONSIDERATIONS RELATED TO DATA STORAGE, ACCESS AND MANAGEMENT Looking at various factors impacting the security of cloud in IoT with respect to the data storage, access and management techniques, the following facts come up. A. SECURING COMMUNICATION The first requirement of any service based on networks is the security and integrity of data. It has been a constant effort on the part of cloud service providers to improve the level of security in the communication between devices and the cloud. Transport Layer Security (TLS), commonly used by providers, uses encryption methods to provide security. In order to modify the existing TLS for the smart devices in IoT, works are going on by the researchers. Various encryption techniques need to be used by the devices themselves to ensure security [4]. B. ACCESS CONTROL The authentication and authorization of the devices in IoT which connect to the cloud come under the access control provisions. When a device connects to the cloud, it should authenticate itself and after it is established that the device is allowed to do so, the process of authorization is initiated. It will provide access to the cloud as per the authorization rights and privileges of the device. The access control policies are required to manage this access control. Trusted Platform Modules provide services related to management of device access and rights [5]. C. SENSITIVITY OF DATA This is an important aspect when it comes to Internet of Things environment. Sensitive data has to be dealt with caution and should not be available for access to unauthorized users. In IoT the devices that produce data need to be identified and proper measures should be taken. Also, the same device may not produce sensitive data all the time so this also needs to be kept in mind. D. DATA PROTECTION ON CLOUD This is related to the security of data when it is stored on the cloud. Though TLS is offered by most of the cloud service providers, but that may not be enough when it comes to sensitive data leaks within the cloud by the insiders. This needs to be considered while using cloud in IoT. Also as cloud providers work on the notion of virtualization, measures need to be taken to facilitate the isolation at such levels [6][7]. When the cloud provider can’t be trusted, encryption may be done by the smart device itself and it should not rely on cloud only. E. DECISION REGARDING CHOICE OF CLOUD When a particular field like healthcare generates both sensitive data like patient records as well as not-so-sensitive data like monitoring heart-rate etc., the choice of cloud service is an important concern. The sensitive data needs to be stored on private cloud with complete protection and authorization while the monitoring data may be stored on public cloud. Also, this kind of environment suggests the importance of hybrid clouds which however, has its own security issues when it changes control from private to public cloud and vice-versa. F. DATA SHARING WITHIN THE CLOUD Along with the security of data stored on cloud, there should be provisions of data sharing within the cloud. For example, a sensor used to monitor patient’s heart-beat and another one to monitor its motion may work separately and store their respective data on the cloud, however they need to share the information with each other to ensure smooth working in IoT healthcare. There is a need to have policies which enable this data sharing. A methodology called Information Flow Control (IFC)
  • 3. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 225 Table 1: Security Considerations in IoT of Cloud Security considerations in IoT of cloud Solutions and Implications Securing Communications Use of TLS, encryption Need for protocols suitable for devices in IoT Access Control Access control policies Authentication and authorization Sensitivity of Data Sensitive data on private cloud Less sensitive data on public cloud Data protection on cloud TLS offered by cloud Encryption by device itself Choice of cloud Depends on the kind of data Hybrid cloud a promising solution Data sharing within cloud Information Flow Control (IFC) Access policies for sharing Encryption by IoT devices Encryption by the device to ensure security Limits the operations of cloud to storage only has been developed to ensure that such policies are adopted and also complied with [8][9]. G. ENCRYPTION BY IoT DEVICES To ensure data security, the IoT smart devices which generate the data can encrypt it before sending to the cloud. This can solve many purposes like secure transit of data, preventing data leakages on the cloud, preventing access of cloud to sensitive data, protection from insiders with malicious intent etc. However, the encryption of data can put extra burden on the devices so it should be done only when absolutely necessary. Also, the cloud can’t perform other operations like analysis and computations on the encrypted data, so this should also be considered before implementing this policy [10]. CONCLUSION The paper aims to assess the security consideration of using cloud services in Internet of Things model. The role of cloud in IoT has been discussed and its suitability reasoned. The aspects of security related to data storage, access and management are studied along with their potential solutions. The cloud computing model is the most appropriate for IoT implementation; however some aspects need to be taken care of in order to reap its potential to the most. REFERENCES [1] Lei CHEN, Mitchell TSENG, Xiang LIAN. Development of foundation models for Internet of Things. Front. Comput. Sci. China 2010, 4(3): 376–385. [2] Su-bin SHEN, Qu-li FAN, Ping ZONG. Study on the Architecture and Associated Technologies for Internet of Things. Journal of Nanjing University of Posts and Telecommunications (Natural Science).2009, 29(6):1-11. [3] ITU. ITU Internet Reports 2005: The Internet of Things, ITU (2005). [4] T. Dierks and C. Allen, “The TLS Protocol Version 1.0,” IETF, Tech. Rep., 1999. [5] T. Morris, “Trusted Platform Module,” in Encyclopedia of Cryptography and Security. Springer, 2011, pp. 1332–1335 [6] S. Soltesz, H. P¨otzl, M. E. Fiuczynski, A. Bavier, and L. Peterson, “Container-based operating system virtualization: a scalable, high performance alternative to hypervisors,” in SIGOPS Operating Systems Review, vol. 41, no. 3. ACM, 2007, pp. 275–287. [7] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, “Xen and the art of virtualization,” SIGOPS Operating Systems Review, vol. 37, no. 5, pp. 164–177, 2003. [8] J. Bacon, D. Eyers, T. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch, “Information Flow Control for Secure Cloud Computing,” IEEE TNSM SI Cloud Service Management, vol. 11, no. 1, pp. 76–89, 2014. [9] T. F. J.-M. Pasquier, J. Singh, and J. Bacon, “Information Flow Control for Strong Protection with Flexible Sharing in PaaS,” in IC2E, International Workshop on Future of PaaS. IEEE, 2015. [10] R. J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd ed. Wiley Publishing, 2008.