Open Access
Subscription Access
Open Access
Subscription Access
Security and Privacy Concerns of Internet of Things (IOT) in the Cloud
Subscribe/Renew Journal
The term Internet of Things is used to describe a wide range of web-enabled services and products, including cutting-edge gadgetry. To put it simply, cloud computing is the method of making information and software normally housed on separate local servers available to consumers through the Internet on demand. Cloud services mediate between IoT devices and the applications that control them. Because of this, essential data may be easily accessed without the need for costly infrastructure. The cloud based IoT paradigm connects the virtual and real realms. Two devices need to check their identities against each other before they can exchange data. Creating a one-of-a-kind identifier for every piece of electrical equipment; this might be a number or a name A person's right to privacy has been violated because this data can be used to harm them. Therefore, the suggested system will only store essential information about the user. If you want to keep the exam's identifiers secret, you should choose a method that leaves no paper trail. Therefore, protecting the privacy of users is so crucial. Viruses and other malicious software pose a significant risk to your network and the data it contains. Many IoT applications necessitate the construction of a distributed, scalable, and geographically dispersed datacenter network to meet the demands of their users. The providers of the desired information services are the ones responsible for automating the extensive data classification, analysis, and processing. Protective measures should ideally be handled by the security service desk. Using current approaches exposes too much data and services to risk. The goal of this completely new layout is to create a framework that can't be harmed by environmental elements in any way.
Keywords
Privacy, Internet of Things, Cloud, Security
Subscription
Login to verify subscription
User
Font Size
Information
- L.R. Waitman, X. Song and A.M. Davis, “Enhancing PCORnet Clinical Research Network Data Completeness by Integrating Multistate Insurance Claims with Electronic Health Records in a Cloud Environment Aligned with CMS Security and Privacy Requirements”, Journal of the American Medical Informatics Association, Vol. 29, No. 4, pp. 660-670, 2022.
- U. Selvi and S. Puspha, “A Review of Big Data an Anonymization Algorithms”, International Journal of
- Applied Engineering Research, Vol. 10, No, 17, pp. 13125- 13130, 2015
- A. Ometov, “A Survey of Security in Cloud, Edge, and Fog Computing”, Sensors, Vol. 22, No. 3, pp. 927-935, 2022.
- N. Li, T. Li and S. Venkatasubramanian, “T-Closeness: Privacy Beyond k-Anonymity and ‘-Diversity”, Proceedings of International Conference on Data Engineering, pp. 106-115, 2007
- S. Carlin and K. Curran, “Cloud Computing Technologies”, International Journal of Cloud Computing and Services Science, Vol. 1, No. 2, pp. 59-65, 2012.
- M. Ahmad, M. Chong and A. Hamid, “Enhancing Trust Management in Cloud Environment”, Proceedings of International Conference on Innovation, Management and Technology Research, pp. 314-321, 2014.
- G.S. Sriram, “Resolving Security and Data Concerns in Cloud Computing by Utilizing a Decentralized Cloud Computing Option”, International Research Journal of Modernization in Engineering Technology and Science, Vol. 4, No. 1, pp. 1269-1273, 2022.
- E.S. Hajji and T. Maha, “From Single to Multi-Clouds Computing Privacy and Fault Tolerance”, Proceedings of International Conference on Future Information Engineering, pp. 112-118, 2014.
- J. Gong and N.J. Navimipour, “An In-Depth and Systematic Literature Review on the Blockchain-Based Approaches for Cloud Computing”, Cluster Computing, Vol. 25, No. 1, pp. 383-400. 2022.
- C. Chandravathy, V. Kumar and G. Murugaboopathi, “Study on Cloud Computing and Security Approaches”, International Journal of Soft Computing and Engineering, Vol. 3, No. 1, pp. 2231-2307, 2013.
Abstract Views: 224
PDF Views: 1