Twenty Security Considerations for Cloud-Supported Internet of Things

@article{Singh2016TwentySC,
  title={Twenty Security Considerations for Cloud-Supported Internet of Things},
  author={Jatinder Singh and Thomas Pasquier and Jean Bacon and Hajoon Ko and D. Eyers},
  journal={IEEE Internet of Things Journal},
  year={2016},
  volume={3},
  pages={269-284}
}
To realize the broad vision of pervasive computing, underpinned by the “Internet of Things” (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends toward the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy, and personal safety risks… 

Figures and Tables from this paper

Securing Fog Computing for Internet of Things Applications: Challenges and Solutions
TLDR
The architecture and features of fog computing are reviewed and critical roles of fog nodes are studied, including real-time services, transient storage, data dissemination and decentralized computation, which are expected to draw more attention and efforts into this new architecture.
Internet of things: Survey on security
TLDR
This work focuses on IoT intrinsic vulnerabilities and their implications to the fundamental information security challenges in confidentiality, integrity, and availability.
Using Cloud Computing to Address Challenges Raised by the Internet of Things
TLDR
This chapter addresses one of the solutions, namely, Cloud Computing and dwells on the seven challenges in IoT and the extent to which Cloud Computing can address them (the Big 7 of IoT).
Hardware Security of Fog End-Devices for the Internet of Things
TLDR
The importance and benefits of fog computing for IoT networks are highlighted, the means of providing hardware security to these devices with an enriched literature review are investigated, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.
Overcoming Data Security Challenges of Cloud of Things: An Architectural Perspective
TLDR
The main goal of this study is to develop a security architecture of CoT, called SACT for maintaining data security, which provides a three-tier architecture for data transmission from one device to another.
Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs
TLDR
This research focuses on securing the entire process of data migration to cloud from devices while the in‐cloud data flow is monitored by the Information Flow Control policies specified by the users.
Towards a Secure and Scalable IoT Infrastructure: A Pilot Deployment for a Smart Water Monitoring System
TLDR
This paper proposes an adaptive end-to-end security model that supports the defense requirements for a scalable IoT infrastructure integrating both the IoT devices and the controller as one embedded device, with a focus on the integration of a security protocol at the embedded interface.
Authorization Model for IoT Healthcare Systems: Case Study
TLDR
This work discusses different security models provided for Cloud-Enabled IoT architectures security issues, and proposes a security model using Amazon Web Service (AWS) cloud provider platform with Attribute-Based Access Control (ABAC) on different levels: IoT, Edge, and the cloud.
...
...

References

SHOWING 1-10 OF 126 REFERENCES
Security and privacy threats in IoT architectures
TLDR
The strong view is that the IoT will be an important part of the global huge ICT infrastructure ("future Internet") humanity will be strongly relying on in the future with relatively few data centers connected to trillions of sensors and other "things" over gateways, various access networks and a global network connecting them.
A gap analysis of Internet-of-Things platforms
The internet of things: a survey
TLDR
The definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed and the major challenges which need addressing by the research community and corresponding potential solutions are investigated.
Overview of the Internet of Things
TLDR
The development of IOT is a difficult process, but its bright future is worth further efforts, and the bottlenecks in technical standards, security, and protocol etc are discussed.
Internet of Things for Smart Cities
TLDR
This paper focuses specifically to an urban IoT systems that, while still being quite a broad category, are characterized by their specific application domain and are designed to support the Smart City vision.
Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things
TLDR
Performance analysis of the protocol in terms of computational time compared to other existing solutions is discussed, which addresses challenges in IoT and security attacks are modelled with the use cases to give an actual view of IoT networks.
On Technical Security Issues in Cloud Computing
TLDR
This paper focuses on technical security issues arising from the usage of Cloud services and especially by the underlying technologies used to build these cross-domain Internet-connected collaborations.
LLCPS: A new security framework based on TLS for NFC P2P applications in the Internet of Things
  • P. Urien
  • Computer Science
    2013 IEEE 10th Consumer Communications and Networking Conference (CCNC)
  • 2013
TLDR
This demonstration presents Peer to Peer (P2P) transactions protected by a new protocol, LLCPS, i.e. the Logical Link Control protocol (LLCP) secured by TLS, which should enable a wide range of trusted services for the IoT.
Information Flow Control for Secure Cloud Computing
TLDR
The properties of cloud computing-Platform-as-a-Service clouds in particular- are described and a range of IFC models and implementations are reviewed to identify opportunities for using IFC within a cloud computing context.
...
...