Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Discovering and Understanding The Security Issues In IoT Cloud
Nawaf A Almolhis, Michael Haney, Fahad Alqahtani, Khalid Al Makdi
Pages - 255 - 265 | Revised - 30-11-2019 | Published - 31-12-2019
MORE INFORMATION
KEYWORDS
IoT, Cloud, Privacy, Security, CloudIoT.
ABSTRACT
The rapid growth and adoption of IoT technologies in sectors of life are challenged by the resources constrained IoT devices. However, the growth of IoT technologies can be enhanced by integrating them with cloud computing. Hence, a new area of computing called IoT Cloud or CloudIoT has emerged. That is, the data collected from the IoT technologies are stored and processed in the cloud infrastructure so that IoT technologies are relived from resources constrained issue. As a result, some new classes of security and privacy issues are introduced. This paper presents security issues pertaining to IoT cloud.
Aazam, M., et al. Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved. in Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th-18th January, 2014. 2014. IEEE. | |
Adhikary, T., et al. The Internet of Things (IoT) Augmentation in Healthcare: An Application Analytics. in International Conference on Intelligent Computing and Communication Technologies. 2019. Springer. | |
Ahmed, A., et al., Malicious insiders attack in IoT based multi-cloud e-healthcare environment: a systematic literature review. Multimedia Tools and Applications, 2018. 77(17): p. 21947-21965. | |
Aitken, R., et al. Device and technology implications of the Internet of Things. in 2014 Symposium on VLSI Technology (VLSI-Technology): Digest of Technical Papers. 2014. IEEE. | |
Alabady, S.A., F. Al-Turjman, and S. Din, A novel security model for cooperative virtual networks in the IoT era. International Journal of Parallel Programming, 2018: p. 1-16. | |
Alhakbani, N., et al. A framework of adaptive interaction support in cloud-based internet of things (iot) environment. in International conference on internet and distributed computing systems. 2014. Springer. | |
Ali, Z.H., H.A. Ali, and M.M. Badawy, A new proposed the internet of things (IoT) virtualization framework based on sensor-as-a-service concept. Wireless Personal Communications, 2017. 97(1): p. 1419-1443. | |
Antonic, A., et al. A mobile crowdsensing ecosystem enabled by a cloud-based publish/subscribe middleware. in 2014 International Conference on Future Internet of Things and Cloud. 2014. IEEE. | |
Arabo, A. Privacy-aware IoT cloud survivability for future connected home ecosystem. in 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA). 2014. IEEE. | |
Arasteh, H., et al. Iot-based smart cities: a survey. in 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC). 2016. IEEE. | |
Araujo, V., et al., Performance evaluation of FIWARE: A cloud-based IoT platform for smart cities. Journal of Parallel and Distributed Computing, 2019. | |
Bhawiyuga, A., et al., Architectural design of IoT-cloud computing integration platform. Telkomnika, 2019. 17(3). | |
Botta, A., et al., Integration of cloud computing and internet of things: a survey. Future generation computer systems, 2016. 56: p. 684-700. | |
Choi, C. and J. Choi, Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service. IEEE Access, 2019. 7: p. 110510-110517. | |
da Silveira, F., et al., Analysis of Industry 4.0 Technologies Applied to the Health Sector: Systematic Literature Review, in Occupational and Environmental Safety and Health. 2019, Springer. p. 701-709. | |
Darwish, A., et al., The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: Opportunities, challenges, and open problems. Journal of Ambient Intelligence and Humanized Computing, 2019. 10(10): p. 4151-4166. | |
de Macedo, D.D.J., et al., Toward an efficient healthcare CloudIoT architecture by using a game theory approach. Concurrent Engineering, 2019: p. 1063293X19844548. | |
Dobre, C. and F. Xhafa, Intelligent services for big data science. Future Generation Computer Systems, 2014. 37: p. 267-281. | |
Elhabob, R., et al., Identity-based encryption with authorized equivalence test for cloud-assisted IoT. Cluster Computing, 2019: p. 1-17. | |
Gomes, M.M., R.d.R. Righi, and C.A. da Costa. Future directions for providing better IoT infrastructure. in Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing: Adjunct Publication. 2014. ACM. | |
Grozev, N. and R. Buyya, Inter-Cloud architectures and application brokering: taxonomy and survey. Software: Practice and Experience, 2014. 44(3): p. 369-390. | |
Guechi, F.A. and R. Maamri. Secure and Parallel Expressive Search over Encrypted Data with Access Control in Multi-CloudIoT. in 2018 3rd Cloudification of the Internet of Things (CIoT). 2018. IEEE. | |
Guechi, F.A. and R. Maamri. Secure Self-Destruction of Shared Data in Multi-CloudIoT. in 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud). 2017. IEEE. | |
Gupta, P.K., B.T. Maharaj, and R. Malekian, A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres. Multimedia Tools and Applications, 2017. 76(18): p. 18489-18512. | |
Han, Z., et al., A software defined network-based security assessment framework for cloudIoT. IEEE Internet of Things Journal, 2018. 5(3): p. 1424-1434. | |
Hassan, W.H., Current research on Internet of Things (IoT) security: A survey. Computer Networks, 2019. 148: p. 283-294. | |
Jaimunk, J. Privacy-preserving cloud-IoT architecture. in Proceedings of the 6th International Conference on Mobile Software Engineering and Systems. 2019. IEEE Press. | |
Jin, B.-W., J.-O. Park, and H.-J. Mun, A design of secure communication protocol using RLWE-based homomorphic encryption in IoT convergence cloud environment. Wireless Personal Communications, 2019. 105(2): p. 599-618. | |
Kanchi, R.R., V.P. Sreeramula, and D.V. Palle. Implementation of Smart Agriculture using CloudIoT and its Geotagging on Android Platform. in International Conference on Intelligent Computing and Communication Technologies. 2019. Springer. | |
Kantarci, B. and H.T. Mouftah, Trustworthy sensing for public safety in cloud-centric internet of things. IEEE Internet of Things Journal, 2014. 1(4): p. 360-368. | |
Kantarci, B. and H.T. Mouftah. Mobility-aware trustworthy crowdsourcing in cloud-centric Internet of Things. in 2014 IEEE Symposium on Computers and Communications (ISCC). 2014. IEEE. | |
Khan, M.A. and K. Salah, IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 2018. 82: p. 395-411. | |
Kumar, R. and R. Goyal, On cloud security requirements, threats, vulnerabilities and countermeasures: A survey. Computer Science Review, 2019. 33: p. 1-48. | |
Li, X., et al., Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach. IEEE Access, 2019. 7: p. 9368-9383. | |
Madhu, B., et al., IoT Based Home Automation System over Cloud. 2019. | |
Mahmud, M., et al., A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications. Cognitive Computation, 2018. 10(5): p. 864-873. | |
Mahmud, S., S. Ahmed, and K. Shikder. A Smart Home Automation and Metering System using Internet of Things (IoT). in 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST). 2019. IEEE. | |
Malik, A. and H. Om, Cloud computing and internet of things integration: Architecture, applications, issues, and challenges, in Sustainable Cloud and Energy Services. 2018, Springer. p. 1-24. | |
Massonet, P., et al. Security in lightweight network function virtualisation for federated cloud and IoT. in 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud). 2017. IEEE. | |
Mircea, M., M. Stoica, and B. Ghilic-Micu, Using Cloud Computing to Address Challenges Raised by the Internet of Things, in Connected Environments for the Internet of Things. 2017, Springer. p. 63-82. | |
Mo, Y., A Data Security Storage Method for IoT Under Hadoop Cloud Computing Platform. International Journal of Wireless Information Networks, 2019: p. 1-6. | |
Mohamed, K.S., IoT Cloud Computing, Storage, and Data Analytics, in The Era of Internet of Things. 2019, Springer. p. 71-91. | |
Moussa, A.N., et al. A Consumer-Oriented Cloud Forensic Process Model. in 2019 IEEE 10th Control and System Graduate Research Colloquium (ICSGRC). 2019. IEEE. | |
Moussa, A.N., N. Ithnin, and A. Zainal, CFaaS: bilaterally agreed evidence collection. Journal of Cloud Computing, 2018. 7(1): p. 1. | |
Moussa, A.N., N.B. Ithnin, and O.A. Miaikil. Conceptual forensic readiness framework for infrastructure as a service consumers. in 2014 IEEE Conference on Systems, Process and Control (ICSPC 2014). 2014. IEEE. | |
Nikolov, N. and O. Nakov. Creating Architecture and Software of Embedded Systems with Constrained Resources and Their Communication to the IoT Cloud. in 2019 X National Conference with International Participation (ELECTRONICA). 2019. IEEE. | |
Park, D.-M., S.-K. Kim, and Y.-S. Seo, S-mote: SMART Home Framework for Common Household Appliances in IoT Network. Journal of Information Processing Systems, 2019. 15(2). | |
Park, J., H. Kwon, and N. Kang, IoT-Cloud collaboration to establish a secure connection for lightweight devices. Wireless Networks, 2017. 23(3): p. 681-692. | |
Podnar Zarko, I., A. Antonic, and K. Pripuzic. Publish/subscribe middleware for energy-efficient mobile crowdsensing. in Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. 2013. ACM. | |
Rao, B.P., et al. Cloud computing for Internet of Things & sensing based applications. in 2012 Sixth International Conference on Sensing Technology (ICST). 2012. IEEE. | |
Ray, P.P., A survey of IoT cloud platforms. Future Computing and Informatics Journal, 2016. 1(1-2): p. 35-46. | |
Rebbah, M., D.E.H. Rebbah, and O. Smail. Intrusion detection in Cloud Internet of Things environment. in 2017 International Conference on Mathematics and Information Technology (ICMIT). 2017. IEEE. | |
Serrano, D., et al. Towards qos-oriented sla guarantees for online cloud services. in 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing. 2013. IEEE. | |
Sha, K., et al., A survey of edge computing based designs for IoT security. Digital Communications and Networks, 2019. | |
Shah, S.T.U., et al., Cloud-Assisted IoT-Based Smart Respiratory Monitoring System for Asthma Patients, in Applications of Intelligent Technologies in Healthcare. 2019, Springer. p. 77-86. | |
Sharma, G. and S. Kalra, A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 2019. 43(1): p. 619-636. | |
Sharma, G. and S. Kalra, Advanced lightweight multi-factor remote user authentication scheme for cloud-IoT applications. Journal of Ambient Intelligence and Humanized Computing, 2019: p. 1-24. | |
Sharma, S., et al., Cloud and IoT-based emerging services systems. Cluster Computing, 2019. 22(1): p. 71-91. | |
Singh, A., U. Sinha, and D.K. Sharma, Cloud-Based IoT Architecture in Green Buildings, in Green Building Management and Smart Automation. 2020, IGI Global. p. 164-183. | |
Su, M., et al., PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT. Information Sciences, 2019. | |
Wang, Z., et al., An empirical study on business analytics affordances enhancing the management of cloud computing data security. International Journal of Information Management, 2019. | |
Yassine, A., et al., IoT big data analytics for smart homes with fog and cloud computing. Future Generation Computer Systems, 2019. 91: p. 563-573. | |
Zamora-Izquierdo, M.A., et al., Smart farming IoT platform based on edge and cloud computing. Biosystems engineering, 2019. 177: p. 4-17. | |
Zhou, W., et al. Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms. in 28th {USENIX} Security Symposium ({USENIX} Security 19). 2019. | |
Mr. Nawaf A Almolhis
Computer Science Department,
University of Idaho,
Moscow, ID, 83844, USA
Computer Science Department, Jazan University, Jazan, 45142, Saudi Arabia - United States of America
Computer Science Department, Jazan University, Jazan, 45142, Saudi Arabia - United States of America
almo3113@vandals.uidaho.edu
Dr. Michael Haney
Computer Science Department,
University of Idaho,
Idaho, Falls, ID, 83401, USA - United States of America
Mr. Fahad Alqahtani
Computer Science Department,
University of Idaho,
Moscow, ID, 83844, USA
Computer Science Department,
Prince Sattam Bin Abdulaziz University,
Al-Kharj, 16278, Saudi Arabia - United States of America
Mr. Khalid Al Makdi
Computer Science Department,
University of Idaho,
Moscow, ID, 83844, USA
Computer Science Department, Najran University, Najran, 66223, Saudi Arabia - United States of America
Computer Science Department, Najran University, Najran, 66223, Saudi Arabia - United States of America
|
|
|
|
View all special issues >> | |
|
|