Open Access Open Access  Restricted Access Subscription Access

Secure Management of Logs in Internet of Things


Affiliations
1 Information Networking Institute, Carnegie Mellon University, Pittsburgh-Pennsylvania, United States
 

Ever since the advent of computing, managing data has been of extreme importance. With innumerable devices getting added to network infrastructure, there has been a proportionate increase in the data which needs to be stored. With the advent of Internet of Things (IOT) it is anticipated that billions of devices will be a part of the internet in another decade. Since those devices will be communicating with each other on a regular basis with little or no human intervention, plethora of real time data will be generated in quick time which will result in large number of log files. Apart from complexity pertaining to storage, it will be mandatory to maintain confidentiality and integrity of these logs in IOT enabled devices. This paper will provide a brief overview about how logs can be efficiently and securely stored in IOT devices.

Keywords

Authentication, Device Management, Internet of Things (IOTs), Intrusions, Logging, Malware, Monitoring, Spam, Virus.
User
Notifications
Font Size

Abstract Views: 184

PDF Views: 3




  • Secure Management of Logs in Internet of Things

Abstract Views: 184  |  PDF Views: 3

Authors

Udit Gupta
Information Networking Institute, Carnegie Mellon University, Pittsburgh-Pennsylvania, United States

Abstract


Ever since the advent of computing, managing data has been of extreme importance. With innumerable devices getting added to network infrastructure, there has been a proportionate increase in the data which needs to be stored. With the advent of Internet of Things (IOT) it is anticipated that billions of devices will be a part of the internet in another decade. Since those devices will be communicating with each other on a regular basis with little or no human intervention, plethora of real time data will be generated in quick time which will result in large number of log files. Apart from complexity pertaining to storage, it will be mandatory to maintain confidentiality and integrity of these logs in IOT enabled devices. This paper will provide a brief overview about how logs can be efficiently and securely stored in IOT devices.

Keywords


Authentication, Device Management, Internet of Things (IOTs), Intrusions, Logging, Malware, Monitoring, Spam, Virus.