Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Security and Privacy Concerns of Internet of Things (IOT) in the Cloud


Affiliations
1 Department of Computer Science, St. Xavier’s College, India
2 Department of Computer Science, Women’s Christian College, India
3 Department of Artificial Intelligence and Data Science, St. Xavier’s Catholic College of Engineering, India
     

   Subscribe/Renew Journal


The term Internet of Things is used to describe a wide range of web-enabled services and products, including cutting-edge gadgetry. To put it simply, cloud computing is the method of making information and software normally housed on separate local servers available to consumers through the Internet on demand. Cloud services mediate between IoT devices and the applications that control them. Because of this, essential data may be easily accessed without the need for costly infrastructure. The cloud based IoT paradigm connects the virtual and real realms. Two devices need to check their identities against each other before they can exchange data. Creating a one-of-a-kind identifier for every piece of electrical equipment; this might be a number or a name A person's right to privacy has been violated because this data can be used to harm them. Therefore, the suggested system will only store essential information about the user. If you want to keep the exam's identifiers secret, you should choose a method that leaves no paper trail. Therefore, protecting the privacy of users is so crucial. Viruses and other malicious software pose a significant risk to your network and the data it contains. Many IoT applications necessitate the construction of a distributed, scalable, and geographically dispersed datacenter network to meet the demands of their users. The providers of the desired information services are the ones responsible for automating the extensive data classification, analysis, and processing. Protective measures should ideally be handled by the security service desk. Using current approaches exposes too much data and services to risk. The goal of this completely new layout is to create a framework that can't be harmed by environmental elements in any way.

Keywords

Privacy, Internet of Things, Cloud, Security
Subscription Login to verify subscription
User
Notifications
Font Size

  • L.R. Waitman, X. Song and A.M. Davis, “Enhancing PCORnet Clinical Research Network Data Completeness by Integrating Multistate Insurance Claims with Electronic Health Records in a Cloud Environment Aligned with CMS Security and Privacy Requirements”, Journal of the American Medical Informatics Association, Vol. 29, No. 4, pp. 660-670, 2022.
  • U. Selvi and S. Puspha, “A Review of Big Data an Anonymization Algorithms”, International Journal of
  • Applied Engineering Research, Vol. 10, No, 17, pp. 13125- 13130, 2015
  • A. Ometov, “A Survey of Security in Cloud, Edge, and Fog Computing”, Sensors, Vol. 22, No. 3, pp. 927-935, 2022.
  • N. Li, T. Li and S. Venkatasubramanian, “T-Closeness: Privacy Beyond k-Anonymity and ‘-Diversity”, Proceedings of International Conference on Data Engineering, pp. 106-115, 2007
  • S. Carlin and K. Curran, “Cloud Computing Technologies”, International Journal of Cloud Computing and Services Science, Vol. 1, No. 2, pp. 59-65, 2012.
  • M. Ahmad, M. Chong and A. Hamid, “Enhancing Trust Management in Cloud Environment”, Proceedings of International Conference on Innovation, Management and Technology Research, pp. 314-321, 2014.
  • G.S. Sriram, “Resolving Security and Data Concerns in Cloud Computing by Utilizing a Decentralized Cloud Computing Option”, International Research Journal of Modernization in Engineering Technology and Science, Vol. 4, No. 1, pp. 1269-1273, 2022.
  • E.S. Hajji and T. Maha, “From Single to Multi-Clouds Computing Privacy and Fault Tolerance”, Proceedings of International Conference on Future Information Engineering, pp. 112-118, 2014.
  • J. Gong and N.J. Navimipour, “An In-Depth and Systematic Literature Review on the Blockchain-Based Approaches for Cloud Computing”, Cluster Computing, Vol. 25, No. 1, pp. 383-400. 2022.
  • C. Chandravathy, V. Kumar and G. Murugaboopathi, “Study on Cloud Computing and Security Approaches”, International Journal of Soft Computing and Engineering, Vol. 3, No. 1, pp. 2231-2307, 2013.

Abstract Views: 225

PDF Views: 1




  • Security and Privacy Concerns of Internet of Things (IOT) in the Cloud

Abstract Views: 225  |  PDF Views: 1

Authors

M. R. Sheeba
Department of Computer Science, St. Xavier’s College, India
G. Suganthi
Department of Computer Science, Women’s Christian College, India
R. Jemila Rose
Department of Artificial Intelligence and Data Science, St. Xavier’s Catholic College of Engineering, India

Abstract


The term Internet of Things is used to describe a wide range of web-enabled services and products, including cutting-edge gadgetry. To put it simply, cloud computing is the method of making information and software normally housed on separate local servers available to consumers through the Internet on demand. Cloud services mediate between IoT devices and the applications that control them. Because of this, essential data may be easily accessed without the need for costly infrastructure. The cloud based IoT paradigm connects the virtual and real realms. Two devices need to check their identities against each other before they can exchange data. Creating a one-of-a-kind identifier for every piece of electrical equipment; this might be a number or a name A person's right to privacy has been violated because this data can be used to harm them. Therefore, the suggested system will only store essential information about the user. If you want to keep the exam's identifiers secret, you should choose a method that leaves no paper trail. Therefore, protecting the privacy of users is so crucial. Viruses and other malicious software pose a significant risk to your network and the data it contains. Many IoT applications necessitate the construction of a distributed, scalable, and geographically dispersed datacenter network to meet the demands of their users. The providers of the desired information services are the ones responsible for automating the extensive data classification, analysis, and processing. Protective measures should ideally be handled by the security service desk. Using current approaches exposes too much data and services to risk. The goal of this completely new layout is to create a framework that can't be harmed by environmental elements in any way.

Keywords


Privacy, Internet of Things, Cloud, Security

References