logo

Cloud Computing in IoT Security: Issues, Threats, and Countermeasures

   

Added on  2023-06-13

14 Pages4648 Words362 Views
Cloud Computing in IoT Security
Issues, Threats, and Countermeasures
4/18/2018
Cloud Computing in IoT Security: Issues, Threats, and Countermeasures_1
Cloud Computing in IoT Security
Table of Contents
Introduction...........................................................................................................................................2
Significance of the Research..............................................................................................................2
Literature Review: Security Issues and Threats.................................................................................2
Device Security Issues...................................................................................................................2
Authorization & Authentication Issues..........................................................................................2
Device Updates for Security..........................................................................................................3
Secure Communication Issues.......................................................................................................3
Data Privacy & Integrity Issues.....................................................................................................3
Cloud Architecture Issues..............................................................................................................4
In-Cloud Data Protection Issues....................................................................................................4
Data Encryption Issues..................................................................................................................4
Identity Management Security Issues............................................................................................4
Scale Management for IoT-Cloud..................................................................................................5
Denial of Service & Distributed Denial of Service Attacks...........................................................5
Research Gap.....................................................................................................................................5
Aim of the Research..........................................................................................................................6
Materials & Methods.............................................................................................................................6
Discussion.............................................................................................................................................9
Set of Countermeasures & Solutions.................................................................................................9
Device Security.............................................................................................................................9
Securing the Cloud........................................................................................................................9
IoT Security Lifecycle Management............................................................................................10
Recommendations & Conclusion........................................................................................................10
References...........................................................................................................................................11
1
Cloud Computing in IoT Security: Issues, Threats, and Countermeasures_2
Cloud Computing in IoT Security
Introduction
Internet of Things (IoT) is an inter-connection of the gadgets, devices, networks, algorithms,
databases, and codes to carry out specific activities for achieving a particular goal. The IoT-
based applications have gained a lot of popularity recently and are being used in a variety of
sectors and areas. Some of the industrial sectors that are the prime applicants of IoT include
healthcare sector, e-commerce, sales & marketing, banking and finance, commercial services,
and applications.
Significance of the Research
Cloud computing plays a significant role in the functioning of an IoT application. There are
huge clusters of data sets that are generated and processed by an IoT application on a daily
basis [1]. Cloud computing services and application provide a mechanism for storage,
processing, and transmission of these data sets. There are different pricing models on the
basis of the cloud delivery model that is selected. Economies of scale are one of the
mechanisms through which cloud can provide cost-effective solutions and benefits to the IoT
start-ups [2]. Virtual data storage along with the collaboration of varied components is made
possible by cloud computing. The sharing and allocation of the resources required by the
components in an IoT-based application is also handled by cloud services. There are several
benefits that cloud computing offers to IoT. However, there are certain security issues and
threats that have emerged with the involvement of cloud computing in IoT [3].
Literature Review: Security Issues and Threats
Device Security Issues
The number of devices connected in an IoT application has limits on the amount of data
storage or memory along with the processing capabilities that may be offered. These devices
shall operate on power saver modes when running on batteries. These constrained devices
cannot be protected with the aid of encryption as the execution of encryption and decryption
processes is not quick enough for secure data transmission [4]. There may be side channel
attacks, or power analysis attacks that may take place. There may also be issues of device loss
or stealing that may occur leading to compromise on security [5].
2
Cloud Computing in IoT Security: Issues, Threats, and Countermeasures_3
Cloud Computing in IoT Security
Authorization & Authentication Issues
There are varied access points leading to emergence of varied points of failure with the
involvement of cloud computing in IoT. Authorization and authentication of the devices and
the cloud-based components emerges as an issue that leads to the presence of security
vulnerabilities [6]. There may be components or devices that may use weaker passwords or
poor access control mechanisms that may be utilized by the malevolent entities to give shape
to the security attacks. This may lead to the exposure of confidential data sets.
Device Updates for Security
The installation of updates and security patches is essential to ensure that the security of the
devices and the components is always maintained. The tracking of available updates in the
cloud-based medium becomes a challenge as there are numerous interfaces and components
involved. Missing out on the installation of a necessary security update may lead to the
emergence of a security attack [7]. There may also be certain devices or cloud-based
components that may demand enhanced downtime impacting overall performance of the
application [8].
Secure Communication Issues
The other set of security challenges that may be witnessed include communication issues
over the network and cloud services. Most of the messages that are transmitted between the
IoT devices and the cloud services or applications are not encrypted. These unsecure
messages and communication mechanisms lead to leakage and breaching of the data sets [9].
Data Privacy & Integrity Issues
It is necessary that the data sets that are transmitted over the cloud platforms, they are stored
and processed in a secure manner. The data privacy norms that are applied on the sensitive
data sets are separated from the IoT data payloads [10]. There may also be unwanted data and
information sets that shall be eliminated to ensure that the regulatory and legal policies are
complied. However, with the involvement of cloud networks, components, and services, there
are a number of privacy issues that crop up [11].
Some of the common data privacy issues include exposure of sensitive and confidential data
sets due to security attacks, such as malware attacks. These malicious codes may be injected
over a cloud network or a specific data set in the form of a virus, worm, Trojan Horses, Logic
bombs, ransomware, spyware, adware, etc. [12]. There are also a number of integrity issues
3
Cloud Computing in IoT Security: Issues, Threats, and Countermeasures_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Internet of Things & Cyber Security
|19
|5950
|53

Significance of IoT in Communication System and Importance of Big Data and Cloud Computing
|11
|3013
|282

Internet of Things (IoT) Research Paper 2022
|16
|3575
|31

Security in the Internet of Things Assignment PDF
|12
|489
|132

Data Security in Cloud Computing
|6
|874
|413

Internet of things - Assignment
|13
|4549
|42