scholarly journals IoT Cloud Security Review

2021 ◽  
Vol 54 (4) ◽  
pp. 1-36
Author(s):  
Fei Chen ◽  
Duming Luo ◽  
Tao Xiang ◽  
Ping Chen ◽  
Junfeng Fan ◽  
...  

Recent years have seen the rapid development and integration of the Internet of Things (IoT) and cloud computing. The market is providing various consumer-oriented smart IoT devices; the mainstream cloud service providers are building their software stacks to support IoT services. With this emerging trend even growing, the security of such smart IoT cloud systems has drawn much research attention in recent years. To better understand the emerging consumer-oriented smart IoT cloud systems for practical engineers and new researchers, this article presents a review of the most recent research efforts on existing, real, already deployed consumer-oriented IoT cloud applications in the past five years using typical case studies. Specifically, we first present a general model for the IoT cloud ecosystem. Then, using the model, we review and summarize recent, representative research works on emerging smart IoT cloud system security using 10 detailed case studies, with the aim that the case studies together provide insights into the insecurity of current emerging IoT cloud systems. We further present a systematic approach to conduct a security analysis for IoT cloud systems. Based on the proposed security analysis approach, we review and suggest potential security risk mitigation methods to protect IoT cloud systems. We also discuss future research challenges for the IoT cloud security area.

Author(s):  
Jin Han ◽  
Jing Zhan ◽  
Xiaoqing Xia ◽  
Xue Fan

Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but accept them. However, since cloud users and cloud service providers have conflicts of interests, cloud users may not trust the results of security evaluation performed by the CSP. Also, different cloud users may have different security risk preferences, which makes it difficult for third party to consider all users' needs during evaluation. In addition, current security evaluation indexes for cloud are too impractical to test (e.g., indexes like interoperability, transparency, portability are not easy to be evaluated). Methods: To solve the above problems, this paper proposes a practical cloud security risk evaluation method of decision-making based on conflicting roles by using the Analytic Hierarchy Process (AHP) with Aggregation of Individual priorities (AIP). Results: Not only can our method bring forward a new index system based on risk source for cloud security and corresponding practical testing methods, but also can obtain the evaluation result with the risk preferences of conflicting roles, namely CSP and cloud users, which can lay a foundation for improving mutual trusts between the CSP and cloud users. The experiments show that the method can effectively assess the security risk of cloud platforms and in the case where the number of clouds increased by 100% and 200%, the evaluation time using our methodology increased by only by 12% and 30%. Conclusion: Our method can achieve consistent decision based on conflicting roles, high scalability and practicability for cloud security risk evaluation.


Author(s):  
Tian Xia ◽  
Hironori Washizaki ◽  
Yoshiaki Fukazawa ◽  
Takehisa Kato ◽  
Haruhiko Kaiya ◽  
...  

Requirements for cloud services include security and privacy. Although many security patterns, privacy patterns, and non-pattern-based knowledge have been reported, knowing which pattern or combination of patterns to use in a specific scenario is challenging due to the sheer volume of options and the layered cloud stack. To deal with security and privacy in cloud services, this study proposes the Cloud Security and Privacy Metamodel (CSPM). CSPM uses a consistent approach to classify and support existing security and privacy patterns. In addition, CSPM is used to develop a security and privacy awareness process to develop cloud systems. The effectiveness and practicality of CSPM is demonstrated via several case studies.


2021 ◽  
Author(s):  
◽  
Ha Do

<p>While the challenge of rehabilitating juvenile offenders has attracted international research interest, the rehabilitation of juvenile offenders in Vietnam has received little research attention. This study employed a qualitative collective case study approach to gain insights into how eight juvenile offenders perceived and experienced a rehabilitation programme in a correctional school in Vietnam. It drew on the perspectives of juvenile offenders, teachers and one manager. Deprivation, importation and Aker’s social learning theories provided a theoretical framework to explore the juvenile offenders’ experiences. Data were collected through observations, interviews and document analysis supplemented by field notes and a research journal. Data were then analysed thematically. The findings suggest that individual characteristics, family and peers played roles in the development of juvenile offenders’ antisocial behaviours and in their engagement with the rehabilitation programme. These roles could be positive and negative. The case studies illustrate the ways in which the programme was perceived to influence the young people’s thinking and behaviour in positive and negative ways. For instance, the eight young participants all recounted examples of modifying their behaviour in a deliberate attempt to ‘game’ the staff. This was done in order to gain preferential treatment, and as a means to coping with the ‘pains’ of incarceration.  The case studies illustrated short coming in the current provision of educational and vocational training programmes intended to support reintegration into the community. A lack of alignment between the school programmes and future educational and labour market opportunities is likely to potentially undermine the policy goal of successful reintegration into the community. Based on the findings of this study, it is proposed that rehabilitation policy and practice in Vietnam should be reviewed and reformed. This study highlights the need to better meet the social, emotional and educational needs of young people in the Vietnamese juvenile justice system. Future research and policy initiatives should be focused on minimising recidivism and supporting reintegration into society on release. There should be guidelines to ensure there is active cooperation between families, the correctional schools and local authorities. It is recommended that the family should be involved in youth rehabilitation processes in the correctional school.</p>


2016 ◽  
pp. 823-848 ◽  
Author(s):  
Santosh Kumar ◽  
Ali Imam Abidi ◽  
Sanjay Kumar Singh

Cloud computing has created much enthusiasm in the IT world, institutions, business groups and different organizations and provided new techniques to cut down resource costs and increase its better utilization. It is a major challenge for cloud consumers and service providers equally. Establishing one's identity has become complicated in a vastly interconnected cloud computing network. The need of a consistent cloud security technique has increased in the wake of heightened concerns about security. The rapid development in cloud data storage, network computing services, accessing the cloud services from vendors has made cloud open to security threats. In this chapter, we have proposed an approach based on Ear Biometric for cloud security of individual consumers and vendors. This approaches started to get acceptance as a genuine method for determining an individual's identity. This chapter provides with the stepping stone for future researches to unveil how biometrics can change the cloud security scenario as we know it.


Author(s):  
Tian Xia ◽  
Hironori Washizaki ◽  
Yoshiaki Fukazawa ◽  
Haruhiko Kaiya ◽  
Shinpei Ogata ◽  
...  

Security and privacy in cloud systems are critical. To address security and privacy concerns, many security patterns, privacy patterns, and non-pattern-based knowledge have been reported. However, knowing which pattern or combination of patterns to use in a specific scenario is challenging due to the sheer volume of options and the layered cloud stack. To deal with security and privacy in cloud services, this study proposes the cloud security and privacy metamodel (CSPM). CSPM uses a consistent approach to classify and handle existing security and privacy patterns. In addition, CSPM is used to develop a security and privacy awareness process to develop cloud systems. The effectiveness and practicality of CSPM is demonstrated via several case studies.


2021 ◽  
Author(s):  
◽  
Ha Do

<p>While the challenge of rehabilitating juvenile offenders has attracted international research interest, the rehabilitation of juvenile offenders in Vietnam has received little research attention. This study employed a qualitative collective case study approach to gain insights into how eight juvenile offenders perceived and experienced a rehabilitation programme in a correctional school in Vietnam. It drew on the perspectives of juvenile offenders, teachers and one manager. Deprivation, importation and Aker’s social learning theories provided a theoretical framework to explore the juvenile offenders’ experiences. Data were collected through observations, interviews and document analysis supplemented by field notes and a research journal. Data were then analysed thematically. The findings suggest that individual characteristics, family and peers played roles in the development of juvenile offenders’ antisocial behaviours and in their engagement with the rehabilitation programme. These roles could be positive and negative. The case studies illustrate the ways in which the programme was perceived to influence the young people’s thinking and behaviour in positive and negative ways. For instance, the eight young participants all recounted examples of modifying their behaviour in a deliberate attempt to ‘game’ the staff. This was done in order to gain preferential treatment, and as a means to coping with the ‘pains’ of incarceration.  The case studies illustrated short coming in the current provision of educational and vocational training programmes intended to support reintegration into the community. A lack of alignment between the school programmes and future educational and labour market opportunities is likely to potentially undermine the policy goal of successful reintegration into the community. Based on the findings of this study, it is proposed that rehabilitation policy and practice in Vietnam should be reviewed and reformed. This study highlights the need to better meet the social, emotional and educational needs of young people in the Vietnamese juvenile justice system. Future research and policy initiatives should be focused on minimising recidivism and supporting reintegration into society on release. There should be guidelines to ensure there is active cooperation between families, the correctional schools and local authorities. It is recommended that the family should be involved in youth rehabilitation processes in the correctional school.</p>


Author(s):  
Santosh Kumar ◽  
Ali Imam Abidi ◽  
Sanjay Kumar Singh

Cloud computing has created much enthusiasm in the IT world, institutions, business groups and different organizations and provided new techniques to cut down resource costs and increase its better utilization. It is a major challenge for cloud consumers and service providers equally. Establishing one's identity has become complicated in a vastly interconnected cloud computing network. The need of a consistent cloud security technique has increased in the wake of heightened concerns about security. The rapid development in cloud data storage, network computing services, accessing the cloud services from vendors has made cloud open to security threats. In this chapter, we have proposed an approach based on Ear Biometric for cloud security of individual consumers and vendors. This approaches started to get acceptance as a genuine method for determining an individual's identity. This chapter provides with the stepping stone for future researches to unveil how biometrics can change the cloud security scenario as we know it.


10.31355/33 ◽  
2018 ◽  
Vol 2 ◽  
pp. 105-120
Author(s):  
Hamed Motaghi ◽  
Saeed Nosratabadi ◽  
Thabit Qasem Atobishi

NOTE: THIS ARTICLE WAS PUBLISHED WITH THE INFORMING SCIENCE INSTITUTE. Aim/Purpose................................................................................................................................................................................................. The main objective of the current study is to develop a business model for service providers of cloud computing which is designed based on circular economy principles and can ensure the sustainable consumption. Background Even though the demand for cloud computing technology is increasing day by day in all over the world, the current the linear economy principles are incapable to ensure society development needs. To consider the benefit of the society and the vendors at the same time, the principles of circular economy can address this issue. Methodology................................................................................................................................................................................................. An extensive literature review on consumption, sustainable consumption, circular economic, business model, and cloud computing were conducted. the proposed model of Osterwalder, Pigneur and Tucci (2005) is admitted designing the circular business model. Contribution................................................................................................................................................................................................. The proposed model of the study is the contribution of this study where provides the guidelines for the cloud computing service providers to achieve both their economic profits and the society’ needs. Findings Finding reveals that if the cloud computing service providers design their business model based on the “access” principle of circular economy, they can meet their economic profits and the society’ needs at a same time. Recommendations for Practitioners.............................................................................................................................................................. It is recommended to the startup and the existing businesses to utilize the proposed model of this study to reach a sustainable development. Recommendation for Researchers................................................................................................................................................................ It proposes a new circular business model and its linkages with community building. Impact on Society............................................................................................................................................................................................ The proposed model of the study provides guidelines to the cloud computing service providers to design a business model which is able not only to meet their economic profit, but also to meet the society’s and customers’ benefits. Future Research............................................................................................................................................................................................... Future researches can build on this research model which proposed in this study to examine the limitations of this model by using empirical researches.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Huoyin Zhang ◽  
Shiyunmeng Zhang ◽  
Jiachen Lu ◽  
Yi Lei ◽  
Hong Li

AbstractPrevious studies in humans have shown that brain regions activating social exclusion overlap with those related to attention. However, in the context of social exclusion, how does behavioral monitoring affect individual behavior? In this study, we used the Cyberball game to induce the social exclusion effect in a group of participants. To explore the influence of social exclusion on the attention network, we administered the Attention Network Test (ANT) and compared results for the three subsystems of the attention network (orienting, alerting, and executive control) between exclusion (N = 60) and inclusion (N = 60) groups. Compared with the inclusion group, the exclusion group showed shorter overall response time and better executive control performance, but no significant differences in orienting or alerting. The excluded individuals showed a stronger ability to detect and control conflicts. It appears that social exclusion does not always exert a negative influence on individuals. In future research, attention to network can be used as indicators of social exclusion. This may further reveal how social exclusion affects individuals' psychosomatic mechanisms.


2021 ◽  
Vol 2 (1) ◽  
pp. 43-61
Author(s):  
Francesc Fusté-Forné ◽  
Tazim Jamal

Research on the relationship between automation services and tourism has been rapidly growing in recent years and has led to a new service landscape where the role of robots is gaining both practical and research attention. This paper builds on previous reviews and undertakes a comprehensive analysis of the research literature to discuss opportunities and challenges presented by the use of service robots in hospitality and tourism. Management and ethical issues are identified and it is noted that practical and ethical issues (roboethics) continue to lack attention. Going forward, new directions are urgently needed to inform future research and practice. Legal and ethical issues must be proactively addressed, and new research paradigms developed to explore the posthumanist and transhumanist transitions that await. In addition, closer attention to the potential of “co-creation” for addressing innovations in enhanced service experiences in hospitality and tourism is merited. Among others, responsibility, inclusiveness and collaborative human-robot design and implementation emerge as important principles to guide future research and practice in this area.


Sign in / Sign up

Export Citation Format

Share Document