scholarly journals IoT Communication Security Issues for Companies: Challenges, Protocols and The Web of Data

2020 ◽  
Vol 14 (1) ◽  
pp. 1109-1120
Author(s):  
Alin Zamfiroiu ◽  
Bogdan Iancu ◽  
Catalin Boja ◽  
Tiberiu-Marian Georgescu ◽  
Cosmin Cartas ◽  
...  

AbstractThis article analyzes and highlights the security perspective of Internet of Things (IoT) connected devices and their communication challenges, as IoT is considered one of the key emerging fields in Industry 4.0. The IoT architectures can consist of physical systems, virtual ones or even hybrids, combining a collection of different physically active things, sensors, cloud services, specific IoT protocols, communication layers, users and developers. On top of all, it is the business layer, because the scope of the entire IoT environment is to deliver data, to monitor and to facilitate the management of complex processes. In order to facilitate the data exchange between the IoT layers, there have been developed a series of protocols particular to the IoT domain. As in many IT related fields, the solutions are not perfect from the data security and privacy perspectives, many challenges being still open research issues. As the two concepts of IoT and Cloud of Things are connected, bringing real world data into the Cloud to process it, raises Cloud Computing security concerns regarding the privacy and security of data. Although in recent years, many efforts have been made to improve Cloud Computing security, there are risks that need to be taken into consideration. From the Web of Data’s point of view, things are even more prone to security risks. Because privacy is one of the fundamental right of digital users, it is extremely important for new technologies to comply with privacy regulations and policies, such as the new European data protection and privacy frameworks. In this context, companies must take into account standards, challenges and new trends in IoT. In the absence of specific measures, raw or processed data can be easily stolen from the Web of Data. In this paper we analyze and present the main protocols of communication in the IoT field from a data security perspective. Also, we do a review of the main architectures that can improve the security of the communication between IoT devices and the Cloud data storage.

2015 ◽  
Vol 15 (1) ◽  
pp. 46-54
Author(s):  
K. Govinda ◽  
E. Sathiyamoorthy

Abstract Cloud computing has become a victorious archetype for data storage, as well as for computation purposes. Greater than ever it concerns user’s privacy, so that data security in a cloud is increasing day by day. Ensuring security and privacy for data organization and query dispensation in the cloud is important for superior and extended uses of cloud based technologies. Cloud users can barely have the full benefits of cloud computing if we can ensure the real user’s privacy and his data security concerns this approach along with storing thin-skinned personal information in databases and software spread around the cloud. There are numerous service suppliers in WWW (World Wide Web), who can supply each service as a cloud. These cloud services will switch over data with a supplementary cloud, so that when the data is exchanged between the clouds, the problem of confidentiality revelation exists. So the privacy revelation problem concerning a person or a corporation is unavoidably open when releasing or data distributing in the cloud service. Confidentiality is a significant issue in any cloud computing environment. In this paper we propose and implement a mechanism to maintain privacy and secure data storage for group members or a community in cloud environment.


2017 ◽  
Vol 54 ◽  
pp. 1-2 ◽  
Author(s):  
Yong Yu ◽  
Atsuko Miyaji ◽  
Man Ho Au ◽  
Willy Susilo

2014 ◽  
Vol 10 (7) ◽  
pp. 190903 ◽  
Author(s):  
Yunchuan Sun ◽  
Junsheng Zhang ◽  
Yongping Xiong ◽  
Guangyu Zhu

2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


2021 ◽  
Author(s):  
◽  
L. P. Bopape

With the advent of IoT, Device-to-Device (D2D) communications has afforded a new paradigm that reliably facilitates data exchange among devices in proximity without necessarily involving the base (core) network. It is geared towards the need to improve network performance where short-range communications is concerned, as well as supporting proximitybased services. However, the relentless growth in the number of network end-users as well as interconnected communication-capable devices, in the next-generation IoT-based 5G cellular networks has resulted in novel services and applications, most of which are security-sensitive. It is thus of paramount importance that security issues be addressed. A posing challenge is that the devices are mostly resource-constrained in both power and computing. As such, it is not practical to implement present day as well as traditional security frameworks and protocols under such a scenario, unless strides are taken towards the improvements of data throughput rates, higher bandwidth provisioning, lower round trip latencies, enhanced spectral efficiencies, and energy efficiency (leading to even lower power consumption, by the already constrained devices) in IoT 5G/LTE networks. Therefore, this work focused on exploring and designing schemes that enhance security and privacy among communicating parties. Otherwise, without reliable as well as robust privacy and security preservation measures in the network, most services and applications will be exposed to various forms of malicious attacks. With such a widened cyber-attack space, both privacy and security for end users can easily be compromised. The work herein addresses privacy for subscribers to the various available services and applications as well as security of the associated data. Ultimately, we propose a Fog-Cloud computing paradigm-assisted security framework that comprises two schemes. The aim is to implement a lightweight-based cartographic algorithm that ensures that communication overheads, round trip latencies, computational loads as well as energy consumption by the otherwise resource-constrained surveillance cameras deployed remotely, are kept minimal. Overall, by way of both analysis and simulation, we ascertain that a Fog-Cloud computing-based lightweight security-based scheme has the potential to greatly improve security and privacy preservation, as well as overall performance despite the resource-constrained nature of the devices.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Shurui Gao ◽  
Weidong Meng

PurposeCloud-based technologies are reliably improving Information Technology (IT) environment incorporating changes and modifications to the present business structure. Cloud computing enables small and medium-sized businesses (SMBs) to organize and exchange pertinent data and information in real time. This study checks out the influence of cloud-based services (IT infrastructure, expenses of cloud services, cloud data security and IT knowledge of human resources) on customers' satisfaction in SMBs.Design/methodology/approachCloud computing offers a way to coordinate and share organizational and personal information and data. The adoption of cloud services is one of the most emerging technological advances in the current competitive business environment. Cloud-based services allow start-ups or SMBs to take advantage of technological advancements and respond more quickly to changing consumer demands. In the available literature, cloud computing has received a lot of attention. However, there is also a research gap in creating a paradigm that links the value development drivers in the electronic industry with the leveraging impact of cloud and intercloud computing resources for start-ups and SMBs. A hypothetical model was constructed based on a literature review, and the associations between the latent variables were investigated utilizing structural equations.FindingsFindings from the study confirmed the validity of the proposed model for customer satisfaction assessment. Besides, the results showed that customer satisfaction is affected by cloud-based services in SMBs. The results illustrated that IT infrastructure influences customer satisfaction significantly and positively, with a T-value of 2.42. Also, the results confirmed that the cost of cloud services with a T-value of 2.68 affects customer satisfaction significantly and positively. Cloud data security also impacts customer satisfaction with a T-value of 5.20. The results also showed that the IT knowledge of human resources affects customer satisfaction with a T-value of 3.01.Originality/valueThe main originality of this research is proposing a new conceptual model to assess the impact of cloud-based services on the satisfaction of the customers in SMBs.


Author(s):  
Natasha Csicsmann ◽  
Victoria McIntyre ◽  
Patrick Shea ◽  
Syed S. Rizvi

Strong authentication and encryption schemes help cloud stakeholders in performing the robust and accurate cloud auditing of a potential service provider. All security-related issues and challenges, therefore, need to be addressed before a ubiquitous adoption of cloud computing. In this chapter, the authors provide an overview of existing biometrics-based security technologies and discuss some of the open research issues that need to be addressed for making biometric technology an effective tool for cloud computing security. Finally, this chapter provides a performance analysis on the use of large-scale biometrics-based authentication systems for different cloud computing platforms.


Sign in / Sign up

Export Citation Format

Share Document