SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 223
An evaluation of selective security issues in Internet of Things
based on Cloud
Karandeep Kaur
(Department of Computer Science, Guru Nanak Dev University, Amritsar)
----------------------------------------************************----------------------------------
Abstract:
The implementation of Internet of Cloud needs a broad vision of technology and computing. It
requires the incorporation of diverse technologies in order to realize its working. Cloud computing is
enabling the use of IoT in wide application areas. Its natural feature of being readily available is showing
tremendous advantages in Internet of Things and smart functionalities. However, there are a few aspects of
using cloud services in the IoT mainly revolving around data security and access policies. This paper
presents a perspective on this side of cloud usage and how it can be handled proficiently. A detailed study
and evaluation of selective security issues has been done to help the reader get acquainted with this side of
cloud in IoT.
Keywords — Internet of Things, Cloud computing, Security in cloud, Cloud based IoT, Security
issues in IoT
----------------------------------------************************----------------------------------
I. OVERVIEW OF INTERNET OF THINGS
AND CLOUD COMPUTING
The Internet of Things is the forthcoming concept
of Information technology. The idea behind it is the
union of web, Information and Communications
(ICT) technology and mobile services. It will
enable different devices in a model system to
interact and coordinate with each other to perform
their job efficiently. According to the definition
given by ITU, “The IoT describes a worldwide
network of billions or trillions of objects that can be
collected from the worldwide physical environment,
propagated via the Internet, and transmitted to end-
users. Services are available for users to interact
with these smart objects over the Internet, query
their states, as well as their associated information,
and even control their actions” [1]. Its main
principle is to create a large network which consists
of different smart devices and networks to facilitate
the information sharing of global things from any
place and at any time [2].
The technologies which are widely used in
Internet of Things are RFID, WSN, 3S, Cloud
computing etc. Radio Frequency Identification
(RFID) assigns identifiable tags to various objects
and devices. These tags transmit information which
is read by a RSID reader and is then used as per the
requirements. These tags turn the normal devices
into smart devices in IoT [3]. Sensors are also used
to collect and interpret the data from various
resources. The 3S technology consists of GPS
(Global Position system), GIS (Geography
Information System) and RS (Remote Sense) which
provides the details about the locations of various
objects using satellites and sensors etc. and
processes that information. Wireless Sensor
Network (WSN) facilitates transmission of the data
in IoT.
Cloud services which are readily available and
location-independent are used to store and compute
data generated in IoT. These services may be
provisioned where required very easily. Cloud
services are best suitable for IoT environment due
to various factors like easy availability, managing
resource restraints, pay-per-use policy etc. Cloud
servers can provide services in the form of software,
storage space, computational power, platforms etc.
The use of cloud services has its own implications
RESEARCH ARTICLE OPEN ACCESS
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 224
and considerations. The concerns relates to the use
of cloud in IoT are covered in this paper. Table 1
discusses the security aspects of cloud in IoT
focusing on data storage, access and management
perspectives.
II. SECURITY CONSIDERATIONS
RELATED TO DATA STORAGE, ACCESS
AND MANAGEMENT
Looking at various factors impacting the security
of cloud in IoT with respect to the data storage,
access and management techniques, the following
facts come up.
A. SECURING COMMUNICATION
The first requirement of any service based on
networks is the security and integrity of data. It has
been a constant effort on the part of cloud service
providers to improve the level of security in the
communication between devices and the cloud.
Transport Layer Security (TLS), commonly used by
providers, uses encryption methods to provide
security. In order to modify the existing TLS for the
smart devices in IoT, works are going on by the
researchers. Various encryption techniques need to
be used by the devices themselves to ensure
security [4].
B. ACCESS CONTROL
The authentication and authorization of the
devices in IoT which connect to the cloud come
under the access control provisions. When a device
connects to the cloud, it should authenticate itself
and after it is established that the device is allowed
to do so, the process of authorization is initiated. It
will provide access to the cloud as per the
authorization rights and privileges of the device.
The access control policies are required to manage
this access control. Trusted Platform Modules
provide services related to management of device
access and rights [5].
C. SENSITIVITY OF DATA
This is an important aspect when it comes to
Internet of Things environment. Sensitive data has
to be dealt with caution and should not be available
for access to unauthorized users. In IoT the devices
that produce data need to be identified and proper
measures should be taken. Also, the same device
may not produce sensitive data all the time so this
also needs to be kept in mind.
D. DATA PROTECTION ON CLOUD
This is related to the security of data when it is
stored on the cloud. Though TLS is offered by most
of the cloud service providers, but that may not be
enough when it comes to sensitive data leaks within
the cloud by the insiders. This needs to be
considered while using cloud in IoT. Also as cloud
providers work on the notion of virtualization,
measures need to be taken to facilitate the isolation
at such levels [6][7]. When the cloud provider
can’t be trusted, encryption may be done by the
smart device itself and it should not rely on cloud
only.
E. DECISION REGARDING CHOICE OF CLOUD
When a particular field like healthcare generates
both sensitive data like patient records as well as
not-so-sensitive data like monitoring heart-rate etc.,
the choice of cloud service is an important concern.
The sensitive data needs to be stored on private
cloud with complete protection and authorization
while the monitoring data may be stored on public
cloud. Also, this kind of environment suggests the
importance of hybrid clouds which however, has its
own security issues when it changes control from
private to public cloud and vice-versa.
F. DATA SHARING WITHIN THE CLOUD
Along with the security of data stored on cloud,
there should be provisions of data sharing within
the cloud. For example, a sensor used to monitor
patient’s heart-beat and another one to monitor its
motion may work separately and store their
respective data on the cloud, however they need to
share the information with each other to ensure
smooth working in IoT healthcare. There is a need
to have policies which enable this data sharing. A
methodology called Information Flow Control (IFC)
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 225
Table 1: Security Considerations in IoT of Cloud
Security considerations in IoT of cloud Solutions and Implications
Securing Communications Use of TLS, encryption
Need for protocols suitable for devices in IoT
Access Control Access control policies
Authentication and authorization
Sensitivity of Data Sensitive data on private cloud
Less sensitive data on public cloud
Data protection on cloud TLS offered by cloud
Encryption by device itself
Choice of cloud Depends on the kind of data
Hybrid cloud a promising solution
Data sharing within cloud Information Flow Control (IFC)
Access policies for sharing
Encryption by IoT devices Encryption by the device to ensure security
Limits the operations of cloud to storage only
has been developed to ensure that such policies are
adopted and also complied with [8][9].
G. ENCRYPTION BY IoT DEVICES
To ensure data security, the IoT smart devices
which generate the data can encrypt it before
sending to the cloud. This can solve many purposes
like secure transit of data, preventing data leakages
on the cloud, preventing access of cloud to sensitive
data, protection from insiders with malicious intent
etc. However, the encryption of data can put extra
burden on the devices so it should be done only
when absolutely necessary. Also, the cloud can’t
perform other operations like analysis and
computations on the encrypted data, so this should
also be considered before implementing this policy
[10].
CONCLUSION
The paper aims to assess the security consideration
of using cloud services in Internet of Things model.
The role of cloud in IoT has been discussed and its
suitability reasoned. The aspects of security related
to data storage, access and management are studied
along with their potential solutions. The cloud
computing model is the most appropriate for IoT
implementation; however some aspects need to be
taken care of in order to reap its potential to the
most.
REFERENCES
[1] Lei CHEN, Mitchell TSENG, Xiang LIAN. Development of
foundation models for Internet of Things. Front. Comput. Sci. China
2010, 4(3): 376–385.
[2] Su-bin SHEN, Qu-li FAN, Ping ZONG. Study on the Architecture and
Associated Technologies for Internet of Things. Journal of Nanjing
University of Posts and Telecommunications (Natural Science).2009,
29(6):1-11.
[3] ITU. ITU Internet Reports 2005: The Internet of Things, ITU (2005).
[4] T. Dierks and C. Allen, “The TLS Protocol Version 1.0,” IETF, Tech.
Rep., 1999.
[5] T. Morris, “Trusted Platform Module,” in Encyclopedia of
Cryptography and Security. Springer, 2011, pp. 1332–1335
[6] S. Soltesz, H. P¨otzl, M. E. Fiuczynski, A. Bavier, and L. Peterson,
“Container-based operating system virtualization: a scalable, high
performance alternative to hypervisors,” in SIGOPS Operating
Systems Review, vol. 41, no. 3. ACM, 2007, pp. 275–287.
[7] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R.
Neugebauer, I. Pratt, and A. Warfield, “Xen and the art of
virtualization,” SIGOPS Operating Systems Review, vol. 37, no. 5, pp.
164–177, 2003.
[8] J. Bacon, D. Eyers, T. Pasquier, J. Singh, I. Papagiannis, and P.
Pietzuch, “Information Flow Control for Secure Cloud Computing,”
IEEE TNSM SI Cloud Service Management, vol. 11, no. 1, pp. 76–89,
2014.
[9] T. F. J.-M. Pasquier, J. Singh, and J. Bacon, “Information Flow Control
for Strong Protection with Flexible Sharing in PaaS,” in IC2E,
International Workshop on Future of PaaS. IEEE, 2015.
[10] R. J. Anderson, Security Engineering: A Guide to Building Dependable
Distributed Systems, 2nd ed. Wiley Publishing, 2008.

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET Journal
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's ApplicationsAakashjit Bhattacharya
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded SystemsIRJET Journal
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsVishwesh Nagamalla
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system IJECEIAES
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspectiveijtsrd
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 

Was ist angesagt? (20)

IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Lecture 16
Lecture 16Lecture 16
Lecture 16
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's Applications
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systems
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 

Andere mochten auch

Andere mochten auch (19)

[IJCT-V3I2P27] Authors: Palwinder Singh
[IJCT-V3I2P27] Authors: Palwinder Singh[IJCT-V3I2P27] Authors: Palwinder Singh
[IJCT-V3I2P27] Authors: Palwinder Singh
 
[IJET-V2I3P21] Authors: Amit Kumar Dewangan, Akhilesh Kumar Shrivas, Prem Kumar
[IJET-V2I3P21] Authors: Amit Kumar Dewangan, Akhilesh Kumar Shrivas, Prem Kumar[IJET-V2I3P21] Authors: Amit Kumar Dewangan, Akhilesh Kumar Shrivas, Prem Kumar
[IJET-V2I3P21] Authors: Amit Kumar Dewangan, Akhilesh Kumar Shrivas, Prem Kumar
 
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
 
[IJET-V1I4P7] Authors :Su Mon Myint
[IJET-V1I4P7] Authors :Su Mon Myint[IJET-V1I4P7] Authors :Su Mon Myint
[IJET-V1I4P7] Authors :Su Mon Myint
 
[IJET-V1I6P18] Authors : Wasim B. Patel , Pundlik N. Patil , Raghunath Y. Pat...
[IJET-V1I6P18] Authors : Wasim B. Patel , Pundlik N. Patil , Raghunath Y. Pat...[IJET-V1I6P18] Authors : Wasim B. Patel , Pundlik N. Patil , Raghunath Y. Pat...
[IJET-V1I6P18] Authors : Wasim B. Patel , Pundlik N. Patil , Raghunath Y. Pat...
 
[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R
[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R
[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R
 
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
 
[IJET V2I3P5] Authors: Jamuna H G, Shobha Hugar
[IJET V2I3P5] Authors: Jamuna H G, Shobha Hugar[IJET V2I3P5] Authors: Jamuna H G, Shobha Hugar
[IJET V2I3P5] Authors: Jamuna H G, Shobha Hugar
 
[IJET-V2I2P8] Authors:Ms. Madhushree M.Kubsad
[IJET-V2I2P8] Authors:Ms. Madhushree M.Kubsad[IJET-V2I2P8] Authors:Ms. Madhushree M.Kubsad
[IJET-V2I2P8] Authors:Ms. Madhushree M.Kubsad
 
[IJET-V1I6P17] Authors : Mrs.R.Kalpana, Mrs.P.Padmapriya
[IJET-V1I6P17] Authors : Mrs.R.Kalpana, Mrs.P.Padmapriya[IJET-V1I6P17] Authors : Mrs.R.Kalpana, Mrs.P.Padmapriya
[IJET-V1I6P17] Authors : Mrs.R.Kalpana, Mrs.P.Padmapriya
 
[IJET-V2I2P12] Authors:Ashok Kumar
[IJET-V2I2P12] Authors:Ashok Kumar[IJET-V2I2P12] Authors:Ashok Kumar
[IJET-V2I2P12] Authors:Ashok Kumar
 
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
 
[IJET-V2I1P9] Authors:Wasim B. Patel,Ritesh G. Deokar,Pundlik N. Patil,Raghun...
[IJET-V2I1P9] Authors:Wasim B. Patel,Ritesh G. Deokar,Pundlik N. Patil,Raghun...[IJET-V2I1P9] Authors:Wasim B. Patel,Ritesh G. Deokar,Pundlik N. Patil,Raghun...
[IJET-V2I1P9] Authors:Wasim B. Patel,Ritesh G. Deokar,Pundlik N. Patil,Raghun...
 
[IJET-V2I2P16] Authors: Jariwala Hiren, Patel Chintan, Prasad Kuldip, Shukla ...
[IJET-V2I2P16] Authors: Jariwala Hiren, Patel Chintan, Prasad Kuldip, Shukla ...[IJET-V2I2P16] Authors: Jariwala Hiren, Patel Chintan, Prasad Kuldip, Shukla ...
[IJET-V2I2P16] Authors: Jariwala Hiren, Patel Chintan, Prasad Kuldip, Shukla ...
 
[IJCT-V3I2P20] Authors: Gidijala Sai Kumar,Gadiraju Mounika , Dusi Leela Ran...
[IJCT-V3I2P20] Authors: Gidijala Sai Kumar,Gadiraju Mounika  , Dusi Leela Ran...[IJCT-V3I2P20] Authors: Gidijala Sai Kumar,Gadiraju Mounika  , Dusi Leela Ran...
[IJCT-V3I2P20] Authors: Gidijala Sai Kumar,Gadiraju Mounika , Dusi Leela Ran...
 
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
 
[IJET-V2I3P22] Authors: Harsha Pakhale,Deepak Kumar Xaxa
[IJET-V2I3P22] Authors: Harsha Pakhale,Deepak Kumar Xaxa[IJET-V2I3P22] Authors: Harsha Pakhale,Deepak Kumar Xaxa
[IJET-V2I3P22] Authors: Harsha Pakhale,Deepak Kumar Xaxa
 
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
 
[IJET-V2I1P6] Authors:
[IJET-V2I1P6] Authors:[IJET-V2I1P6] Authors:
[IJET-V2I1P6] Authors:
 

Ähnlich wie [IJCT V3I2P33] Authors: Karandeep Kaur

SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingIJECEIAES
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applicationsCSITiaesprime
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityAssociate Professor in VSB Coimbatore
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
20476-38939-1-PB.pdf
20476-38939-1-PB.pdf20476-38939-1-PB.pdf
20476-38939-1-PB.pdfIjictTeam
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 

Ähnlich wie [IJCT V3I2P33] Authors: Karandeep Kaur (20)

SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applications
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
20476-38939-1-PB.pdf
20476-38939-1-PB.pdf20476-38939-1-PB.pdf
20476-38939-1-PB.pdf
 
journal paper
journal paperjournal paper
journal paper
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 

Mehr von IJET - International Journal of Engineering and Techniques

Mehr von IJET - International Journal of Engineering and Techniques (20)

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p18
 
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p17
 
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p16
 
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p15
 
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p14
 
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p13
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p11
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
Ijet v5 i6p2
 
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P24
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P22
 
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P21
 
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P20
 
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P19
 
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P18
 
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17
IJET-V3I2P17
 

Kürzlich hochgeladen

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Kürzlich hochgeladen (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

[IJCT V3I2P33] Authors: Karandeep Kaur

  • 1. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 223 An evaluation of selective security issues in Internet of Things based on Cloud Karandeep Kaur (Department of Computer Science, Guru Nanak Dev University, Amritsar) ----------------------------------------************************---------------------------------- Abstract: The implementation of Internet of Cloud needs a broad vision of technology and computing. It requires the incorporation of diverse technologies in order to realize its working. Cloud computing is enabling the use of IoT in wide application areas. Its natural feature of being readily available is showing tremendous advantages in Internet of Things and smart functionalities. However, there are a few aspects of using cloud services in the IoT mainly revolving around data security and access policies. This paper presents a perspective on this side of cloud usage and how it can be handled proficiently. A detailed study and evaluation of selective security issues has been done to help the reader get acquainted with this side of cloud in IoT. Keywords — Internet of Things, Cloud computing, Security in cloud, Cloud based IoT, Security issues in IoT ----------------------------------------************************---------------------------------- I. OVERVIEW OF INTERNET OF THINGS AND CLOUD COMPUTING The Internet of Things is the forthcoming concept of Information technology. The idea behind it is the union of web, Information and Communications (ICT) technology and mobile services. It will enable different devices in a model system to interact and coordinate with each other to perform their job efficiently. According to the definition given by ITU, “The IoT describes a worldwide network of billions or trillions of objects that can be collected from the worldwide physical environment, propagated via the Internet, and transmitted to end- users. Services are available for users to interact with these smart objects over the Internet, query their states, as well as their associated information, and even control their actions” [1]. Its main principle is to create a large network which consists of different smart devices and networks to facilitate the information sharing of global things from any place and at any time [2]. The technologies which are widely used in Internet of Things are RFID, WSN, 3S, Cloud computing etc. Radio Frequency Identification (RFID) assigns identifiable tags to various objects and devices. These tags transmit information which is read by a RSID reader and is then used as per the requirements. These tags turn the normal devices into smart devices in IoT [3]. Sensors are also used to collect and interpret the data from various resources. The 3S technology consists of GPS (Global Position system), GIS (Geography Information System) and RS (Remote Sense) which provides the details about the locations of various objects using satellites and sensors etc. and processes that information. Wireless Sensor Network (WSN) facilitates transmission of the data in IoT. Cloud services which are readily available and location-independent are used to store and compute data generated in IoT. These services may be provisioned where required very easily. Cloud services are best suitable for IoT environment due to various factors like easy availability, managing resource restraints, pay-per-use policy etc. Cloud servers can provide services in the form of software, storage space, computational power, platforms etc. The use of cloud services has its own implications RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 224 and considerations. The concerns relates to the use of cloud in IoT are covered in this paper. Table 1 discusses the security aspects of cloud in IoT focusing on data storage, access and management perspectives. II. SECURITY CONSIDERATIONS RELATED TO DATA STORAGE, ACCESS AND MANAGEMENT Looking at various factors impacting the security of cloud in IoT with respect to the data storage, access and management techniques, the following facts come up. A. SECURING COMMUNICATION The first requirement of any service based on networks is the security and integrity of data. It has been a constant effort on the part of cloud service providers to improve the level of security in the communication between devices and the cloud. Transport Layer Security (TLS), commonly used by providers, uses encryption methods to provide security. In order to modify the existing TLS for the smart devices in IoT, works are going on by the researchers. Various encryption techniques need to be used by the devices themselves to ensure security [4]. B. ACCESS CONTROL The authentication and authorization of the devices in IoT which connect to the cloud come under the access control provisions. When a device connects to the cloud, it should authenticate itself and after it is established that the device is allowed to do so, the process of authorization is initiated. It will provide access to the cloud as per the authorization rights and privileges of the device. The access control policies are required to manage this access control. Trusted Platform Modules provide services related to management of device access and rights [5]. C. SENSITIVITY OF DATA This is an important aspect when it comes to Internet of Things environment. Sensitive data has to be dealt with caution and should not be available for access to unauthorized users. In IoT the devices that produce data need to be identified and proper measures should be taken. Also, the same device may not produce sensitive data all the time so this also needs to be kept in mind. D. DATA PROTECTION ON CLOUD This is related to the security of data when it is stored on the cloud. Though TLS is offered by most of the cloud service providers, but that may not be enough when it comes to sensitive data leaks within the cloud by the insiders. This needs to be considered while using cloud in IoT. Also as cloud providers work on the notion of virtualization, measures need to be taken to facilitate the isolation at such levels [6][7]. When the cloud provider can’t be trusted, encryption may be done by the smart device itself and it should not rely on cloud only. E. DECISION REGARDING CHOICE OF CLOUD When a particular field like healthcare generates both sensitive data like patient records as well as not-so-sensitive data like monitoring heart-rate etc., the choice of cloud service is an important concern. The sensitive data needs to be stored on private cloud with complete protection and authorization while the monitoring data may be stored on public cloud. Also, this kind of environment suggests the importance of hybrid clouds which however, has its own security issues when it changes control from private to public cloud and vice-versa. F. DATA SHARING WITHIN THE CLOUD Along with the security of data stored on cloud, there should be provisions of data sharing within the cloud. For example, a sensor used to monitor patient’s heart-beat and another one to monitor its motion may work separately and store their respective data on the cloud, however they need to share the information with each other to ensure smooth working in IoT healthcare. There is a need to have policies which enable this data sharing. A methodology called Information Flow Control (IFC)
  • 3. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 225 Table 1: Security Considerations in IoT of Cloud Security considerations in IoT of cloud Solutions and Implications Securing Communications Use of TLS, encryption Need for protocols suitable for devices in IoT Access Control Access control policies Authentication and authorization Sensitivity of Data Sensitive data on private cloud Less sensitive data on public cloud Data protection on cloud TLS offered by cloud Encryption by device itself Choice of cloud Depends on the kind of data Hybrid cloud a promising solution Data sharing within cloud Information Flow Control (IFC) Access policies for sharing Encryption by IoT devices Encryption by the device to ensure security Limits the operations of cloud to storage only has been developed to ensure that such policies are adopted and also complied with [8][9]. G. ENCRYPTION BY IoT DEVICES To ensure data security, the IoT smart devices which generate the data can encrypt it before sending to the cloud. This can solve many purposes like secure transit of data, preventing data leakages on the cloud, preventing access of cloud to sensitive data, protection from insiders with malicious intent etc. However, the encryption of data can put extra burden on the devices so it should be done only when absolutely necessary. Also, the cloud can’t perform other operations like analysis and computations on the encrypted data, so this should also be considered before implementing this policy [10]. CONCLUSION The paper aims to assess the security consideration of using cloud services in Internet of Things model. The role of cloud in IoT has been discussed and its suitability reasoned. The aspects of security related to data storage, access and management are studied along with their potential solutions. The cloud computing model is the most appropriate for IoT implementation; however some aspects need to be taken care of in order to reap its potential to the most. REFERENCES [1] Lei CHEN, Mitchell TSENG, Xiang LIAN. Development of foundation models for Internet of Things. Front. Comput. Sci. China 2010, 4(3): 376–385. [2] Su-bin SHEN, Qu-li FAN, Ping ZONG. Study on the Architecture and Associated Technologies for Internet of Things. Journal of Nanjing University of Posts and Telecommunications (Natural Science).2009, 29(6):1-11. [3] ITU. ITU Internet Reports 2005: The Internet of Things, ITU (2005). [4] T. Dierks and C. Allen, “The TLS Protocol Version 1.0,” IETF, Tech. Rep., 1999. [5] T. Morris, “Trusted Platform Module,” in Encyclopedia of Cryptography and Security. Springer, 2011, pp. 1332–1335 [6] S. Soltesz, H. P¨otzl, M. E. Fiuczynski, A. Bavier, and L. Peterson, “Container-based operating system virtualization: a scalable, high performance alternative to hypervisors,” in SIGOPS Operating Systems Review, vol. 41, no. 3. ACM, 2007, pp. 275–287. [7] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, “Xen and the art of virtualization,” SIGOPS Operating Systems Review, vol. 37, no. 5, pp. 164–177, 2003. [8] J. Bacon, D. Eyers, T. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch, “Information Flow Control for Secure Cloud Computing,” IEEE TNSM SI Cloud Service Management, vol. 11, no. 1, pp. 76–89, 2014. [9] T. F. J.-M. Pasquier, J. Singh, and J. Bacon, “Information Flow Control for Strong Protection with Flexible Sharing in PaaS,” in IC2E, International Workshop on Future of PaaS. IEEE, 2015. [10] R. J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd ed. Wiley Publishing, 2008.