Twenty Security Considerations for Cloud-Supported Internet of Things

@article{Singh2016TwentySC,
  title={Twenty Security Considerations for Cloud-Supported Internet of Things},
  author={Jatinder Singh and Thomas Pasquier and Jean Bacon and Hajoon Ko and D. Eyers},
  journal={IEEE Internet of Things Journal},
  year={2016},
  volume={3},
  pages={269-284}
}
To realize the broad vision of pervasive computing, underpinned by the “Internet of Things” (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends toward the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy, and personal safety risks… Expand
Securing Fog Computing for Internet of Things Applications: Challenges and Solutions
TLDR
The architecture and features of fog computing are reviewed and critical roles of fog nodes are studied, including real-time services, transient storage, data dissemination and decentralized computation, which are expected to draw more attention and efforts into this new architecture. Expand
Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges
TLDR
This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved in the CoT by investigating the architecture and existing applications. Expand
Internet of things: Survey on security
TLDR
This work focuses on IoT intrinsic vulnerabilities and their implications to the fundamental information security challenges in confidentiality, integrity, and availability. Expand
Using Cloud Computing to Address Challenges Raised by the Internet of Things
TLDR
This chapter addresses one of the solutions, namely, Cloud Computing and dwells on the seven challenges in IoT and the extent to which Cloud Computing can address them (the Big 7 of IoT). Expand
Hardware Security of Fog End-Devices for the Internet of Things
TLDR
The importance and benefits of fog computing for IoT networks are highlighted, the means of providing hardware security to these devices with an enriched literature review are investigated, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory. Expand
Overcoming Data Security Challenges of Cloud of Things: An Architectural Perspective
TLDR
The main goal of this study is to develop a security architecture of CoT, called SACT for maintaining data security, which provides a three-tier architecture for data transmission from one device to another. Expand
Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs
TLDR
This research focuses on securing the entire process of data migration to cloud from devices while the in‐cloud data flow is monitored by the Information Flow Control policies specified by the users. Expand
Towards a Secure and Scalable IoT Infrastructure: A Pilot Deployment for a Smart Water Monitoring System
TLDR
This paper proposes an adaptive end-to-end security model that supports the defense requirements for a scalable IoT infrastructure integrating both the IoT devices and the controller as one embedded device, with a focus on the integration of a security protocol at the embedded interface. Expand
Authentication in cloud-driven IoT-based big data environment: Survey and outlook
TLDR
The network and threat models of the authentication schemes for cloud-driven IoT-based big data environment, which provides important real-time event processing in critical scenarios like surveillance and monitoring of an industrial plant, are discussed. Expand
Authorization Model for IoT Healthcare Systems: Case Study
TLDR
This work discusses different security models provided for Cloud-Enabled IoT architectures security issues, and proposes a security model using Amazon Web Service (AWS) cloud provider platform with Attribute-Based Access Control (ABAC) on different levels: IoT, Edge, and the cloud. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 125 REFERENCES
Securing the Internet of Things: A Standardization Perspective
TLDR
An in-depth review of the communication security solutions for IoT, specifically the standard security protocols to be used in conjunction with the Constrained Application Protocol (CoAP), an application protocol specifically tailored to the needs of adapting to the constraints of IoT devices. Expand
Security and privacy threats in IoT architectures
TLDR
The strong view is that the IoT will be an important part of the global huge ICT infrastructure ("future Internet") humanity will be strongly relying on in the future with relatively few data centers connected to trillions of sensors and other "things" over gateways, various access networks and a global network connecting them. Expand
A gap analysis of Internet-of-Things platforms
TLDR
A gap analysis of the current IoT landscape aims to highlight the deficiencies of today's solutions to improve their integration to tomorrow's ecosystems and concludes with a list of recommendations for extending these IoT platforms in order to fill in the gaps. Expand
Overview of the Internet of Things
TLDR
The development of IOT is a difficult process, but its bright future is worth further efforts, and the bottlenecks in technical standards, security, and protocol etc are discussed. Expand
The internet of things: a survey
TLDR
The definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed and the major challenges which need addressing by the research community and corresponding potential solutions are investigated. Expand
Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things
TLDR
Performance analysis of the protocol in terms of computational time compared to other existing solutions is discussed, which addresses challenges in IoT and security attacks are modelled with the use cases to give an actual view of IoT networks. Expand
Internet of Things for Smart Cities
: The Internet of Things (IoT) shall be able to incorporate transparently and seamlessly a large number of different and heterogeneous end systems, while providing open access to selected subsets ofExpand
On Technical Security Issues in Cloud Computing
TLDR
This paper focuses on technical security issues arising from the usage of Cloud services and especially by the underlying technologies used to build these cross-domain Internet-connected collaborations. Expand
LLCPS: A new security framework based on TLS for NFC P2P applications in the Internet of Things
  • P. Urien
  • Computer Science
  • 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC)
  • 2013
TLDR
This demonstration presents Peer to Peer (P2P) transactions protected by a new protocol, LLCPS, i.e. the Logical Link Control protocol (LLCP) secured by TLS, which should enable a wide range of trusted services for the IoT. Expand
Information Flow Control for Secure Cloud Computing
TLDR
The properties of cloud computing-Platform-as-a-Service clouds in particular- are described and a range of IFC models and implementations are reviewed to identify opportunities for using IFC within a cloud computing context. Expand
...
1
2
3
4
5
...