SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5167
Enhancing Security Features for IOT Devices Connected to Cloud
Services through IAM
Anandhavalli D1, Gladstone Abraham R2, Sugadev D3
1Assisstant Professor, Velammal College of Engineering & Technology, Madurai
2&3UG Students, Velammal College of Engineering & Technology, Madurai
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In the World of Internet of things, all tasks are
automated and are integrated together with the help of some
hosted Cloud Application. Lotsofdevicesaregettingconnected
to these Applications with different tasks, each with its own
complexities and criticality. Not all the devices getting
connected to the Application can be allowed to Access the
resources of the Cloud Application. Internet being vast with
lots of anonymous users, leads the security of the Application
in jeopardy. This leads us to a position where, we have to
authenticate every device’s identity and authorize the access
to its resources. It’s very complicated to handle identity of
every single device connectingtotheapplication, therearelots
of existing standards used with validating users can help us
with it. The solution I am proposing is with OAuth2.0(Open
Authorization) standard has a grant type named client
credentials, which authenticates the device or any component
with a Client Id, Client Secret, X509 Certificates and JWT(Java
script object notation Web Token). In addition to that, the
further authorization of the devices which requests services
can be permitted based on Permissions and Policieswhich will
be defined in a Simple IAM implementation.
Key Words: Cloud Computing,Security,OAuth,Certification,
IAM
1. INTRODUCTION
Under IoT, one of the root problems, in the context
of cyber security assurance, is the lack ofa rigorousnotionof
“Identity” in the Internet-of-Things (IDoT). In traditional
systems and networks, multi-factor authentication is often
used to define and recognize the “Identity” of a user (IDoU).
Typically, three categories of information areinvolved.They
are knowledge, procession, and inherence, which
corresponds to the logics, built in the device, the resources
allocated, and context in which the device is used.
IoT devices are primarily deployed in most
commonly accessible public locations that lead to a greater
security threat for IoT. However multi-factor authentication
approach is much more complex and challenging.Thisisdue
to the new difficulties and challenges in defining and
composing identity for IoT objects. In the followingsections,
we will first analyze the differentinformationcategoriesthat
can possibly serve as identifierstocompositeidentityfor IoT
objects and the other complex issues, when managing this
information in the IoT network.
Leveraging the ideas from the “Identity” of a user
(IDoU) in traditional systems and network, to be used as the
information stack for “Identity” in the IoT (IDoT). In this
information stack, there are four categories: inheritance,
association, knowledge and context. The first information
category in the stack is the “inheritance”. Just like the
biometrics identifiers (such as fingerprints and retina) of
human, researchersare exploringsimilartypeofinformation
that is inherited from the IoT object hardware. The result is
the PUF (physical unclonable function), whichisdefinedasa
physical entity that is embodiedina physical structureandis
easy to evaluate, but hard to predict even for an attacker
with physical access, or practically impossible to duplicate
even given the exact manufacturingprocessthatproducedit.
Very often, it depends on the uniqueness of their
physical microstructure and manufacturing process. A
typical example is the Silicon PUF that is embedded into an
integrated circuit. When the PUF is queried with a challenge
or physical stimulus, it will return an unpredictable (but
repeatable) response that depends on both stimulusandthe
unique object-specific physical characteristics of the object
containing the PUF.
These “inheritance” informationcategories arevery
attractive to aid the definition and construction of IDoT.
However, as expected, it is not as flexible as other
information categories because it depends on the
chip/hardware manufacturers. Furthermore, since PUF can
be very noisy, precautions will be needed to ensure that the
expected requirements for the function can be achieved.
Currently, it is only used in applications with high security
requirements.
The second information category in the stack is the
“association”. Unlike the “procession” information category
for IDoU, it is not easy for an IoT object to processsomething
external such as hardware token. However, under some
specific situations or for some specific IoT objects such as
personal wearables, it is common for the IoT objects to be
associated (or linked) to a given personal gateway such as
smart phone so that data will only be sent to the data cloud
store through the predefined smart phone.
The third information category in the stack is the
“knowledge”. Similar to thesecondinformationcategory, the
kind and amount of information thattheIoTobjectcanknow
is limited when compared to the case of IDoU. One typical
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5168
example of this information type is the IMEI (International
Mobile Equipment Identity) of the mobile phone. But
changing IMEI of a mobile phone is not as trivial as changing
the password, in short if the owner of a given IoT network
claims to change the IMEI of all the IoT objects that he/she
deployed. Recently, one new research direction that people
are investigating under this information category is to use
the historical sensed data that a given IoT object has
captured to define/construct its dynamic “Identity”.
However, this is still in the early stage of research.
The last information category in the stack is the
“context”. Unlike in the situation of IDoU where this
information category is not used so often, this category
attracts a lot of attention in IoT security. Normally, IoT
sensors are deployed in groups that are related to each
other. By studying the monitored behavior profile of
different members within the same group and comparing it
against the expected behaviorprofile,certainaspectsofIDoT
can be derived. Note that unlike the first three categories
that come from the same IoT object, this information
category is likely to derive from multiple inter-related IoT
objects. The precision and quality of information in this
category is relative lower than the other three information
categories.
2. RELATED WORK
From the last section, it is clear that using the
proposed information stack to define IDoT is indeed a new
challenge, as compared to that for IDoU [1]. Duetothelimited
information availabilityinthe“association”and “knowledge”
categories, together with the inflexibility of the category
“inheritance” and the imprecision of the category “context”,
risk-based authentication using multi-factors would
definitely be the preferred option. And the category
“context” will likely be the information target for IDoT
researchers to explore. On top of the challengestousemulti-
factors from the proposed information stack to define and
construct IDoT, there are at least twoadditional issuesin IoT
that further complicates the management of IDoT [2].
The first issue is related to the ownership and user
identity relationship of an IoT object. At anytimet,everyIoT
object should have an device owner, but might have one or
more users authorized by the device owner [5]. The
relationship among the IoT object, owner, and users might
also change with respect to time in its lifecycle.Inaddition to
it, each IoT object might capture or sense from one or more
data sources simultaneously. All these complicate the IDoT
for authenticationandother subsequentprocesses,including
authorization and governance, in particular when the upper
information categories such as “context” are used to define
IDoT [3].
The second issue is related to the management of
identifies and namespace of IoT objects. On the Internet,
each resource has an URI (Uniform Resource Identifier).
There is also DNS (Domain Name System) that maps URI to
its current resource IP address; and this DNS is managed by
the organization Internet Assigned Numbers Authority
(IANA). With this namespace and identifier mapping
framework, the dynamics of identifiers such as IP addressof
an URI can be hidden and communication between URIs
becomes much easier[4].
However, in the IoT space, duetothe widevarietyof
already existing mapping solutions from different
manufacturers, defining this kind of unified identity
framework will not be easy, at least not in the near future.
Obviously, this will have negative impacts on IDoT when the
information category “context” is used. It also affects the
practicability of edge computing on IoT security [8].
3. PROPOSED WORK
Security being the prior concern of any application,
the highest priority in deployment phase is to deploy the
security services. The application is deployed in a cloud
server, with the Node JS server hosted with HTTPS
implementation with a Root Central Authority Signed
Certificate matching its sub domain name. The varioussteps
involved in the deployment phase includes.,
1. Set up the Application Server
2. Planning and project setup
3. Setting up the IOT device.
4. Testing and Evaluation
5. Model Deployment
3.1. System Architecture
The OAuth2.0 Specification for Client Credentials,
The devices are considered as a client to the authorization
server. And the Authorization Server issues theaccesstoken
for the devices and the Resource Server uses the access
token to validate the devices with the Resource Owner.
The Authorization Server must be configured with
the device’s credentials like Client id and Secret, X509
certificates, JSON Web Token. So that, the device gets it’s
own identity when connecting to the application assigned to
it.
Fig:1 Base Architecture for the Device Credential
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5169
Device Roles are created to the devicesbasedonthe
different categories of the tasks the devices perform. And
then the roles are mapped to the devices such the
permissions and policies can be formulated based on the
need. The Policies defined here helps, to set different
authorization levels for the roles created here. TheResource
Server also acts as a client to the Authorization Server,sofor
accessing specific resources a client, the role mapped to the
resource must be mapped with the client requesting it too.
The Resource Server must also be configured with
the credentials such that the trust with the Authentication
Server.
For Proof of Concept purpose, Client Id and Client
Secret is used. Policy Enforcers can be implemented based
on the different groups of devices/users and Realms. The
Inter Realm communications can also be handled. This can
also support the Single Sign On option if the Authentication
Server handles more than one Resource Servers, then the
same access token can be accessed across the Entire
Application of Services.
The device requesting it must also be configured
with its own credentials, which is used to get the Access
token from the Authentication Server.
3.2. Sequence Diagram
A scenario is a specific sequence of action elements
between the client and the API service and with the identity
and access management. The access token is fetched from
the IAM and then utilized in the further steps to access the
authorized resources.
Fig:2 Sequence diagram for Client Authentication
The device connects to the Authorization Server
with the device credentials and gets access token that is
mapped with the roles of the device. The device requeststhe
resources from the resource server with the access token in
its header as mentioned in the OAuth Specification.
3.3. Setting Up the Identity and Access Management
After the completion of X509 CertificateCreation,
Setting Up the Express JS Application Server and Setting Up
the IOT Device, the main configuration part is done on the
IAM since all the user management and the roles assigned to
them are well organized in it. The roles define the levels of
authorization. The resource owner usually defines the roles
which can access resources.
1. Create a new Realm: A new realm for this project is to
be created, such that all thecomponentswill beclients
to this realm. The realm created has various
configuration settings shown in fig 3. Since we are
using the X509 certificates, login settings can be
switched to SSL only.
2. Create the client entries for the Application Server and
the IOT device. The credentials are configured based
on the options chosen. The common authentication
credentials include the JWT, X509 certificates, the
client id and client secret. From theinstallationtabget
the configuration file for both the clients, this helps in
configuring the clients to the IAM server.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5170
Fig:3 Create New realm
3. Creating a new Role for the client such that the client is
has the roles and the various clients can be mappedto
it using the service accounts tab.
4. Role Mapping is done in the IAM such that the clients
can interact with each other.
5. Groups can be used to group users, whenmorethanone
client or users belong to the same role then the users
can be a part of the group and the role can be mapped
to the group created.
6. Client credentials used for authentication can be
specified in the Credentials tab.
4. RESULTS
The Resource Server uses the access token to
validate the device connectingtoit,withouttheaccesstoken,
resource server redirects to the authentication server to get
a access token. When the token is mapped to role that is not
authorized to access the server then, the resource is not
allowed to be accessed.
Fig:4 Validation (Sample for Rejection)
On Success it just returns the resource back. Sincethedevice
is authorized by the Resource Owner to access the resource.
Fig:5 Validation (Sample for Acceptance)
5. Conclusion
The Security concerns with respect to the
IOT in the cloud era, mainly focuses on the Identity
management and Authorization levels handling for
different resources. This paper helps to improve the
levels of security by enhancingthegranttypesolvingthe
above issue. By this flow, the device acts as user and
each device is mapped to specific roles. Devices
involving human automation are identifiedandmapped
to various authorization levels of accessing the
resources. In future, The Authentication made here can
be further enhanced by additional levelsofsecurity. The
sample model must be developed as an applicationwith
multiple sub domains and the inter communication
between the components. Now the implemented model
for authorization is Subject-Push model instead
Resource-Pulling model must be implemented.
6. References
[1] Granjal, J., Monteiro, E., Silva, J.S.: Security for the
internet of things: a survey of existingprotocolsand
open research issues. IEEECommun.Surv.Tutorials
17(3), 1294–1312 (2015)
[2] Zhao, K., Ge, L.: A survey on the internet of things
security. In: ProceedingsofNinthIEEEInternational
Conference on Computational Intelligence and
Security (2013)
[3] Zhao, K., Ge, L.: A survey on the internet of things
security. In: ProceedingsofNinthIEEEInternational
Conference on Computational Intelligence and
Security (2013)
[4] Deepak H. Sharmaa *, Dr. C. A. Dhoteb , Manish M.
Poteyc: Identity and Access Management as
Security-as-a-Service from Clouds. In: 7th
International Conference on Communication,
Computing and Virtualization (2016)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5171
[5] I. Indua, P.M. RubeshAnanda,VidhyacharanBhaskar
:Identity and access management in cloud
environment: Mechanisms and challenges In :
Engineering Science and Technology, an
International Journal 21 (2018)
[6] S. Eludiora, A user identitymanagement protocol for
cloud computingparadigm, Int. J. Commun. Netw.
Syst. Sci. 4 (2011) 152–163,
[7] S. Subashini, V. Kavitha, A survey on security issues
in service delivery modelsof cloud computing, J.
Netw. Comput. Appl. 34 (2011)
[8] Shuai Zhang, Shufen Zhang, Xuebin Chen,
XiuzhenHuo, “Cloud Computing Research and
Development Trend”, 2010 Second
InternationalConference on Future Networks, IEEE
2010
[9] Deepak Sharma, Dr. C A. Dhote, Manish Potey,
“Security-as-a-Service from Clouds: A
comprehensive Analysis‟, IJCA Volume 67-Number
3, April 2013
[10] ChunduruAnilkumar, Sumathy:Security strategies
for cloud identity management In : International
Journal of Engineering and Technology 7(2018)

More Related Content

What's hot

IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET Journal
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...AIRCC Publishing Corporation
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksAIRCC Publishing Corporation
 
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...AIRCC Publishing Corporation
 
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...IAEME Publication
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalWendy Murphy
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedtanvir616
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...Lillie Coney
 
The Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsThe Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsSimon Moffatt
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsIJSRED
 
Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Pvrtechnologies Nellore
 

What's hot (20)

IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
 
76 s201918
76 s20191876 s201918
76 s201918
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing Attacks
 
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
 
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-converted
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
 
The Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsThe Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security Concerns
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...
 

Similar to IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Services through IAM

Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyIRJET Journal
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...ijtsrd
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
Federated_Learning_for_the_Internet_of_Things_Applications_Challenges_and_Opp...
Federated_Learning_for_the_Internet_of_Things_Applications_Challenges_and_Opp...Federated_Learning_for_the_Internet_of_Things_Applications_Challenges_and_Opp...
Federated_Learning_for_the_Internet_of_Things_Applications_Challenges_and_Opp...MuhammadFurqan192676
 
IoT Security proposal.pptx
IoT Security proposal.pptxIoT Security proposal.pptx
IoT Security proposal.pptxsaaaatt
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IJCI JOURNAL
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 

Similar to IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Services through IAM (20)

Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
Federated_Learning_for_the_Internet_of_Things_Applications_Challenges_and_Opp...
Federated_Learning_for_the_Internet_of_Things_Applications_Challenges_and_Opp...Federated_Learning_for_the_Internet_of_Things_Applications_Challenges_and_Opp...
Federated_Learning_for_the_Internet_of_Things_Applications_Challenges_and_Opp...
 
IoT Security proposal.pptx
IoT Security proposal.pptxIoT Security proposal.pptx
IoT Security proposal.pptx
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 

Recently uploaded (20)

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 

IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Services through IAM

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5167 Enhancing Security Features for IOT Devices Connected to Cloud Services through IAM Anandhavalli D1, Gladstone Abraham R2, Sugadev D3 1Assisstant Professor, Velammal College of Engineering & Technology, Madurai 2&3UG Students, Velammal College of Engineering & Technology, Madurai ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In the World of Internet of things, all tasks are automated and are integrated together with the help of some hosted Cloud Application. Lotsofdevicesaregettingconnected to these Applications with different tasks, each with its own complexities and criticality. Not all the devices getting connected to the Application can be allowed to Access the resources of the Cloud Application. Internet being vast with lots of anonymous users, leads the security of the Application in jeopardy. This leads us to a position where, we have to authenticate every device’s identity and authorize the access to its resources. It’s very complicated to handle identity of every single device connectingtotheapplication, therearelots of existing standards used with validating users can help us with it. The solution I am proposing is with OAuth2.0(Open Authorization) standard has a grant type named client credentials, which authenticates the device or any component with a Client Id, Client Secret, X509 Certificates and JWT(Java script object notation Web Token). In addition to that, the further authorization of the devices which requests services can be permitted based on Permissions and Policieswhich will be defined in a Simple IAM implementation. Key Words: Cloud Computing,Security,OAuth,Certification, IAM 1. INTRODUCTION Under IoT, one of the root problems, in the context of cyber security assurance, is the lack ofa rigorousnotionof “Identity” in the Internet-of-Things (IDoT). In traditional systems and networks, multi-factor authentication is often used to define and recognize the “Identity” of a user (IDoU). Typically, three categories of information areinvolved.They are knowledge, procession, and inherence, which corresponds to the logics, built in the device, the resources allocated, and context in which the device is used. IoT devices are primarily deployed in most commonly accessible public locations that lead to a greater security threat for IoT. However multi-factor authentication approach is much more complex and challenging.Thisisdue to the new difficulties and challenges in defining and composing identity for IoT objects. In the followingsections, we will first analyze the differentinformationcategoriesthat can possibly serve as identifierstocompositeidentityfor IoT objects and the other complex issues, when managing this information in the IoT network. Leveraging the ideas from the “Identity” of a user (IDoU) in traditional systems and network, to be used as the information stack for “Identity” in the IoT (IDoT). In this information stack, there are four categories: inheritance, association, knowledge and context. The first information category in the stack is the “inheritance”. Just like the biometrics identifiers (such as fingerprints and retina) of human, researchersare exploringsimilartypeofinformation that is inherited from the IoT object hardware. The result is the PUF (physical unclonable function), whichisdefinedasa physical entity that is embodiedina physical structureandis easy to evaluate, but hard to predict even for an attacker with physical access, or practically impossible to duplicate even given the exact manufacturingprocessthatproducedit. Very often, it depends on the uniqueness of their physical microstructure and manufacturing process. A typical example is the Silicon PUF that is embedded into an integrated circuit. When the PUF is queried with a challenge or physical stimulus, it will return an unpredictable (but repeatable) response that depends on both stimulusandthe unique object-specific physical characteristics of the object containing the PUF. These “inheritance” informationcategories arevery attractive to aid the definition and construction of IDoT. However, as expected, it is not as flexible as other information categories because it depends on the chip/hardware manufacturers. Furthermore, since PUF can be very noisy, precautions will be needed to ensure that the expected requirements for the function can be achieved. Currently, it is only used in applications with high security requirements. The second information category in the stack is the “association”. Unlike the “procession” information category for IDoU, it is not easy for an IoT object to processsomething external such as hardware token. However, under some specific situations or for some specific IoT objects such as personal wearables, it is common for the IoT objects to be associated (or linked) to a given personal gateway such as smart phone so that data will only be sent to the data cloud store through the predefined smart phone. The third information category in the stack is the “knowledge”. Similar to thesecondinformationcategory, the kind and amount of information thattheIoTobjectcanknow is limited when compared to the case of IDoU. One typical
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5168 example of this information type is the IMEI (International Mobile Equipment Identity) of the mobile phone. But changing IMEI of a mobile phone is not as trivial as changing the password, in short if the owner of a given IoT network claims to change the IMEI of all the IoT objects that he/she deployed. Recently, one new research direction that people are investigating under this information category is to use the historical sensed data that a given IoT object has captured to define/construct its dynamic “Identity”. However, this is still in the early stage of research. The last information category in the stack is the “context”. Unlike in the situation of IDoU where this information category is not used so often, this category attracts a lot of attention in IoT security. Normally, IoT sensors are deployed in groups that are related to each other. By studying the monitored behavior profile of different members within the same group and comparing it against the expected behaviorprofile,certainaspectsofIDoT can be derived. Note that unlike the first three categories that come from the same IoT object, this information category is likely to derive from multiple inter-related IoT objects. The precision and quality of information in this category is relative lower than the other three information categories. 2. RELATED WORK From the last section, it is clear that using the proposed information stack to define IDoT is indeed a new challenge, as compared to that for IDoU [1]. Duetothelimited information availabilityinthe“association”and “knowledge” categories, together with the inflexibility of the category “inheritance” and the imprecision of the category “context”, risk-based authentication using multi-factors would definitely be the preferred option. And the category “context” will likely be the information target for IDoT researchers to explore. On top of the challengestousemulti- factors from the proposed information stack to define and construct IDoT, there are at least twoadditional issuesin IoT that further complicates the management of IDoT [2]. The first issue is related to the ownership and user identity relationship of an IoT object. At anytimet,everyIoT object should have an device owner, but might have one or more users authorized by the device owner [5]. The relationship among the IoT object, owner, and users might also change with respect to time in its lifecycle.Inaddition to it, each IoT object might capture or sense from one or more data sources simultaneously. All these complicate the IDoT for authenticationandother subsequentprocesses,including authorization and governance, in particular when the upper information categories such as “context” are used to define IDoT [3]. The second issue is related to the management of identifies and namespace of IoT objects. On the Internet, each resource has an URI (Uniform Resource Identifier). There is also DNS (Domain Name System) that maps URI to its current resource IP address; and this DNS is managed by the organization Internet Assigned Numbers Authority (IANA). With this namespace and identifier mapping framework, the dynamics of identifiers such as IP addressof an URI can be hidden and communication between URIs becomes much easier[4]. However, in the IoT space, duetothe widevarietyof already existing mapping solutions from different manufacturers, defining this kind of unified identity framework will not be easy, at least not in the near future. Obviously, this will have negative impacts on IDoT when the information category “context” is used. It also affects the practicability of edge computing on IoT security [8]. 3. PROPOSED WORK Security being the prior concern of any application, the highest priority in deployment phase is to deploy the security services. The application is deployed in a cloud server, with the Node JS server hosted with HTTPS implementation with a Root Central Authority Signed Certificate matching its sub domain name. The varioussteps involved in the deployment phase includes., 1. Set up the Application Server 2. Planning and project setup 3. Setting up the IOT device. 4. Testing and Evaluation 5. Model Deployment 3.1. System Architecture The OAuth2.0 Specification for Client Credentials, The devices are considered as a client to the authorization server. And the Authorization Server issues theaccesstoken for the devices and the Resource Server uses the access token to validate the devices with the Resource Owner. The Authorization Server must be configured with the device’s credentials like Client id and Secret, X509 certificates, JSON Web Token. So that, the device gets it’s own identity when connecting to the application assigned to it. Fig:1 Base Architecture for the Device Credential
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5169 Device Roles are created to the devicesbasedonthe different categories of the tasks the devices perform. And then the roles are mapped to the devices such the permissions and policies can be formulated based on the need. The Policies defined here helps, to set different authorization levels for the roles created here. TheResource Server also acts as a client to the Authorization Server,sofor accessing specific resources a client, the role mapped to the resource must be mapped with the client requesting it too. The Resource Server must also be configured with the credentials such that the trust with the Authentication Server. For Proof of Concept purpose, Client Id and Client Secret is used. Policy Enforcers can be implemented based on the different groups of devices/users and Realms. The Inter Realm communications can also be handled. This can also support the Single Sign On option if the Authentication Server handles more than one Resource Servers, then the same access token can be accessed across the Entire Application of Services. The device requesting it must also be configured with its own credentials, which is used to get the Access token from the Authentication Server. 3.2. Sequence Diagram A scenario is a specific sequence of action elements between the client and the API service and with the identity and access management. The access token is fetched from the IAM and then utilized in the further steps to access the authorized resources. Fig:2 Sequence diagram for Client Authentication The device connects to the Authorization Server with the device credentials and gets access token that is mapped with the roles of the device. The device requeststhe resources from the resource server with the access token in its header as mentioned in the OAuth Specification. 3.3. Setting Up the Identity and Access Management After the completion of X509 CertificateCreation, Setting Up the Express JS Application Server and Setting Up the IOT Device, the main configuration part is done on the IAM since all the user management and the roles assigned to them are well organized in it. The roles define the levels of authorization. The resource owner usually defines the roles which can access resources. 1. Create a new Realm: A new realm for this project is to be created, such that all thecomponentswill beclients to this realm. The realm created has various configuration settings shown in fig 3. Since we are using the X509 certificates, login settings can be switched to SSL only. 2. Create the client entries for the Application Server and the IOT device. The credentials are configured based on the options chosen. The common authentication credentials include the JWT, X509 certificates, the client id and client secret. From theinstallationtabget the configuration file for both the clients, this helps in configuring the clients to the IAM server.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5170 Fig:3 Create New realm 3. Creating a new Role for the client such that the client is has the roles and the various clients can be mappedto it using the service accounts tab. 4. Role Mapping is done in the IAM such that the clients can interact with each other. 5. Groups can be used to group users, whenmorethanone client or users belong to the same role then the users can be a part of the group and the role can be mapped to the group created. 6. Client credentials used for authentication can be specified in the Credentials tab. 4. RESULTS The Resource Server uses the access token to validate the device connectingtoit,withouttheaccesstoken, resource server redirects to the authentication server to get a access token. When the token is mapped to role that is not authorized to access the server then, the resource is not allowed to be accessed. Fig:4 Validation (Sample for Rejection) On Success it just returns the resource back. Sincethedevice is authorized by the Resource Owner to access the resource. Fig:5 Validation (Sample for Acceptance) 5. Conclusion The Security concerns with respect to the IOT in the cloud era, mainly focuses on the Identity management and Authorization levels handling for different resources. This paper helps to improve the levels of security by enhancingthegranttypesolvingthe above issue. By this flow, the device acts as user and each device is mapped to specific roles. Devices involving human automation are identifiedandmapped to various authorization levels of accessing the resources. In future, The Authentication made here can be further enhanced by additional levelsofsecurity. The sample model must be developed as an applicationwith multiple sub domains and the inter communication between the components. Now the implemented model for authorization is Subject-Push model instead Resource-Pulling model must be implemented. 6. References [1] Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of things: a survey of existingprotocolsand open research issues. IEEECommun.Surv.Tutorials 17(3), 1294–1312 (2015) [2] Zhao, K., Ge, L.: A survey on the internet of things security. In: ProceedingsofNinthIEEEInternational Conference on Computational Intelligence and Security (2013) [3] Zhao, K., Ge, L.: A survey on the internet of things security. In: ProceedingsofNinthIEEEInternational Conference on Computational Intelligence and Security (2013) [4] Deepak H. Sharmaa *, Dr. C. A. Dhoteb , Manish M. Poteyc: Identity and Access Management as Security-as-a-Service from Clouds. In: 7th International Conference on Communication, Computing and Virtualization (2016)
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5171 [5] I. Indua, P.M. RubeshAnanda,VidhyacharanBhaskar :Identity and access management in cloud environment: Mechanisms and challenges In : Engineering Science and Technology, an International Journal 21 (2018) [6] S. Eludiora, A user identitymanagement protocol for cloud computingparadigm, Int. J. Commun. Netw. Syst. Sci. 4 (2011) 152–163, [7] S. Subashini, V. Kavitha, A survey on security issues in service delivery modelsof cloud computing, J. Netw. Comput. Appl. 34 (2011) [8] Shuai Zhang, Shufen Zhang, Xuebin Chen, XiuzhenHuo, “Cloud Computing Research and Development Trend”, 2010 Second InternationalConference on Future Networks, IEEE 2010 [9] Deepak Sharma, Dr. C A. Dhote, Manish Potey, “Security-as-a-Service from Clouds: A comprehensive Analysis‟, IJCA Volume 67-Number 3, April 2013 [10] ChunduruAnilkumar, Sumathy:Security strategies for cloud identity management In : International Journal of Engineering and Technology 7(2018)