Security Challenges and Strategies for the IoT in Cloud Computing

The Internet of Things is progressively turning into a pervasive computing service, needing enormous volumes of data storage and processing. However, due to the distinctive properties of resource constraints, self-organization, and short-range communication in Internet of Things (IoT), it always adopts to cloud for outsourced storage and computation. This integration of IoT with cloud has a row of unfamiliar security challenges for the data at rest. Cloud computing delivers highly scalable and flexible computing and storage resources on pay-per-use policy. Cloud computing services for computation and storage are getting increasingly popular and many organizations are now moving their data from in-house data centers to the Cloud Storage Providers (CSPs). Time varying workload and data intensive IoT applications are vulnerable to encounter challenges while using cloud computing services. Additionally, the encryption techniques and third-party auditors to maintain data integrity are still in their developing stage and therefore the data at rest is still a concern for IoT applications. In this paper, we perform an analysis study to investigate the challenges and strategies adapted by Cloud Computing to facilitate a safe transition of IoT applications to the Cloud.

[1]  Nadra Guizani,et al.  Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs , 2019, IEEE Access.

[2]  Mohsen Guizani,et al.  5G Vehicular Network Resource Management for Improving Radio Access Through Machine Learning , 2020, IEEE Access.

[3]  Qian Wang,et al.  SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage , 2020, IEEE Internet of Things Journal.

[4]  Victor I. Chang,et al.  A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment , 2018, Future Gener. Comput. Syst..

[5]  Ikram Ud Din,et al.  Intrusion Prevention Framework for Secure Routing in WSN-Based Mobile Internet of Things , 2019, IEEE Access.

[6]  Ahmad Almogren,et al.  An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology , 2018, Cluster Computing.

[7]  Ahmad S. Almogren,et al.  SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography , 2019, IEEE Access.

[8]  Ahmad Almogren,et al.  Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model , 2020, IEEE Transactions on Industrial Informatics.

[9]  Ahmad S. Al-Mogren Developing a Powerful and Resilient Smart Body Sensor Network through Hypercube Interconnection , 2015, Int. J. Distributed Sens. Networks.

[10]  Hanan Elazhary,et al.  Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions , 2019, J. Netw. Comput. Appl..

[11]  Klaus Wehrle,et al.  A comprehensive approach to privacy in the cloud-based Internet of Things , 2016, Future Gener. Comput. Syst..

[12]  WehrleKlaus,et al.  A comprehensive approach to privacy in the cloud-based Internet of Things , 2016 .

[13]  Muhammad Al-Qurishi,et al.  Analysis of network issues and their impact on Cloud Storage , 2019, 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS).

[14]  IBRAHIM S. ALKHALIFA,et al.  NSSC: Novel Segment Based Safety Message Broadcasting in Cluster-Based Vehicular Sensor Network , 2020, IEEE Access.

[15]  Stefano Savazzi,et al.  A Cloud-IoT Platform for Passive Radio Sensing: Challenges and Application Case Studies , 2018, IEEE Internet of Things Journal.

[16]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[17]  Ahmad Almogren,et al.  An efficient networking protocol for internet of things to handle multimedia big data , 2018, Multimedia Tools and Applications.

[18]  Ahmad Almogren,et al.  Workload aware VM consolidation method in edge/cloud computing for IoT applications , 2019, J. Parallel Distributed Comput..

[19]  Xiaolei Dong,et al.  Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.

[20]  Mohsen Guizani,et al.  RobustTrust – A Pro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things , 2019, IEEE Access.

[21]  Jenjira Jaimunk Privacy-preserving cloud-IoT architecture , 2019, MOBILESoft@ICSE.

[22]  Vijay Kumar,et al.  Data in your space [wireless access] , 2001, Proceedings Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems. WECWIS 2001.

[23]  Ahmad S. Almogren,et al.  A Resilient Smart Body Sensor Network Through Pyramid Interconnection , 2019, IEEE Access.

[24]  Ahmad S. Almogren,et al.  Intrusion detection in Edge-of-Things computing , 2020, J. Parallel Distributed Comput..

[25]  Xuyun Zhang,et al.  A computation offloading method over big data for IoT-enabled cloud-edge computing , 2019, Future Gener. Comput. Syst..