Integration of Cloud Computing and Internet of things a Survey PDF
Verified
Added on 2021/06/18
|23
|6801
|132
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) Integration of Cloud computing and Internet of Things (IoT) Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) Table of Contents Challenges........................................................................................................................................7 Security Solutions..........................................................................................................................10 Virtualization and multi tenure......................................................................................................13 Information Encryption Schemes..................................................................................................15 Case Study.....................................................................................................................................16 References......................................................................................................................................18
3 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2016. Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, pp.684-700. Cloud computing has quicken the development of the organization by enabling the workforce and changing the business activities. The arrangements have been produced by the Cloud computing that connotes the vision of the organization with greatest adaptability and least hazard. This security risks are talked about with appropriate answer for it. The Cloud computing is a model that assistants in engaging all inclusive and on-ask for arrange access for a pool of figuring resources (Botta et al. 2016).The integration of the cloud computing with the IoT has been creating a major impact in the technological aspect of various business. The use of the IoT devices have been helping in maintaining the services in business organization. The future aspect of the cloud computing have been highlighting the integration with the IoT devices.The IoT devices have been storing their data and information over the cloud. Therefore, this data can be accessed from anywhere using the internet. A Cloud computing is a phase that gives dynamic web applications and organizations that helpers in constraining extra effort made by different associations.As commented by (Rittinghouse and Ransome, 2016), Cloud computing has prepared to give assorted purposes important to the business affiliation and distinctive customers in the market. The use of the Cloud computing has restricted the organization effort in the market. The Cloud computing gives adequacy and versatility to the figuring resources. It went for giving most noteworthy organizations at insignificant cost (Saa, Moscoso-Zea, Costales, and Luján-Mora, 2017). Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues.Information Systems,47, pp.98-115.
4 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) Cloud computing is an arrangement of assets, which is sought after in the market. Diverse better approaches for business and administrations are proposed by the Cloud Computing. Along these lines,this development have given different openings and changes in the task of the business association. Big data has been a great approach in the technological aspect of the business organization. Huge amount of data and information are collected from various success over the internet.Therefore, the storage and analysis of the data has been a great issue for the business organization.Therefore, cloud computing have helped in integrating with the bug data concept. This concept has been implying a great change in management of huge amount of data and information of the business organization. The Cloud computing have helped in making a virtual universe of administrations and appropriate conveyance of it. Distinctive organizations are giving Cloud computing administrations including Google Engine, Oracle Cloud, Amazon Web Services and Office 365 (Almorsy, Grundy and Muller, 2016). Tao, F., Cheng, Y., Da Xu, L., Zhang, L. and Li, B.H., 2014. CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system.IEEE Transactions on Industrial Informatics,10(2), pp.1435-1442. The Cloud computing has helped in putting away the individual information over the Cloud storage. There have been numerous instances of information break from the Cloud storage over the web. The security convention of the Cloud computing has been assaulted by the programmers over the web. The Cloud computing comprise of three layers including Software layer, Platform layer and Infrastructure layer.The integration of the IoT with the cloud computing have been a great success in the manufacturing system of the cloud services.The use of the IoT devices in the manufacturing system have been enhancing the production of the company. The industrial informatics ystem has been using various IoT devices that have held in
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) managing the production of the system in the sector. The use of the cloud computing have been enhancing the quality if the production by its accessibility and flexibility services.The troubles in execution of the SaaS show has been recognized in the report. The major issue is the security of the dataand informationincluding dataarrangementissue, dataopennessissue, data trustworthiness issue and data domain of little and medium endeavors in the market (Puthal, Sahoo, Mishra, and Swain, 2015). This report bases on giving response for the data and information security issues including assessing technique, RAID and security game plans in the SaaS model of Cloud computing in autonomous endeavors. This report provide light to the Policies for diminishing the security issues in the SaaS model of Cloud computing in the private wander endeavors (Au, Fung and Tses, 2016). The consequences of the report have prepared to direct the troubles looked by the business relationship in promote. The security of the data and information has been constrained with the results and aftereffects of the investigation. Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2014, August. On the integration of cloud computing and internet of things. InFuture internet of things and cloud (FiCloud), 2014 international conference on(pp. 23-30). IEEE. Cloud computing has ready to get the consideration in the market by the business association. The pattern of the Cloud Computing has been expanding among the operational administration of the business association. This have helped in executing the cloud benefits in the business association. The idea of the Cloud computing has been talked about with its advantages in the business association. Different cloud models are legitimately clarified with outlines. Improvement of the cloud administrations have given ascent diverse digital risks in the businessassociations.Themajorityofthebusinessassociationsareutilizingthecloud administrations to meet necessities of the customers and representatives of the organization.
6 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) There are has been consistent movement sought after of Cloud computing in advertise. The Cloud computing and Software-as-a-Service (SaaS) has pulled in various free organizations. There have been various purposes of enthusiasm of the SaaS in the autonomous wander endeavors. On the other hand, there has been security issues winning in the SaaS show. The sending of the cloud organizations has prepared to give distinctive organizations to the business relationship in the market. The usage of the Cloud computing has some imperative including the perils and risk of the data and information of affiliation (Saa, Moscoso-Zea, Costales, and Luján- Mora, 2017). The Cloud computing has prepared to give versatility and on-ask for organizations to the business relationship in the market; thusly, it has made a need in the market for the little undertakings. Aazam, M., Khan, I., Alsaffar, A.A. and Huh, E.N., 2014, January. Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved. InApplied Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference on(pp. 414-419). IEEE. The cloud benefits that are imparted to open and can be adjusted and gotten to by any client is known as open cloud (Almorsy, M; Grundy, J; Muller, 2016). The information and data put away in the pubic cloud can be utilized by any client in the association. In this way, the security in the general population cloud is ideally not as much as other cloud composes.The integration of the IoT services in the cloud computing have been a great approach for the researchers. The cloud computing services have helped in providing a new approach to the data storage process.The use of the cloud computing helps in maintaining the data and information of the organization over the cloud.Secrecy alludes to set of tenets and direction that screens the working and usefulness of the devices and procedures utilized as a part of the Cloud computing these of the safety efforts for securing information and data has been consistently ailing if there
7 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) should be an occurrence of Cloud computing. Therefore, privacy alludes to securing information and data of clients and associations in the market. The utilization of individual data of clients is not satisfactory in the association. The security of information and data of client is the earlier thing for association (Cimler et al., 2015). Yi, S., Li, C. and Li, Q., 2015, June. A survey of fog computing: concepts, applications and issues. InProceedings of the 2015 Workshop on Mobile Big Data(pp. 37-42). ACM. Cloud computing have made an electronic system that introduces distinctive online administrations to clients and associations everywhere throughout the word. Cloud computing is conveyed engineering, which helps in bringing together server assets on versatile stage and give on request registering assets. Cloud computing helps in giving sought after support of the clients. The programmers get to databases in cloud situations with the assistance of hacking procedures including session seizing and system channel spying. This report has depicted the security issues in the fog computing in the privately owned businesses.Fog computing have been used in the network architecture of an organization. However, cloud models are not designed on volume, velocity and variety of data that is generated by the IoT.The fog computing helps in extending the cloud computing to the IoT. The fog computing include several layers.The Software layer gives interface to client to utilize administrations of Cloud computing. The stage helps in giving stage and condition to executing programming by engineer (Coppolino et al., 2017). The foundation layer helps in giving the equipment segments including system and capacity. Subsequently, the programmers can assault at any of the three layers for getting to the information and data of the organization over the cloud. Stergiou, C., Psannis, K.E., Kim, B.G. and Gupta, B., 2018. Secure integration of IoT and cloud computing.Future Generation Computer Systems,78, pp.964-975.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) The capacity of the information a data at the remote area with the assistance of Cloud computing May causes issues in the association. The area of the information and data is just known by the information proprietor. Hence, without the information proprietor, information and data cannot access by the association in crisis cases (Coughlin, Keller and Wustrow, 2017). In this manner, risks to accessibility of the information and data is winning in the association with utilization of Cloud computing.The integration of the cloud computing and IoT have been helping in maintaining the security of the data and information collected from the IoT devices from various sources.The use of the IoT devices in data collection have been great approach for the researchers.The cloud computing have helped in storing the data and information over the internet that helps in maintaining and securing data and information of the organization.The Cloud computing is in charge of giving on request administrations to the clients. In this manner, without the information proprietor, it can satisfy the prerequisite of the customers that disregards the Service level Agreement for the Cloud computing. Challenges The ethics of the information and data is an imperative in keeping up the database of the cloud. It is great process for capacity of information secure constant information stockpiling, which can be, recover or recovered in same design, as it was put away later (Dang-Pham, Pittayachawan and Bruno, 2017). Along these lines, trustworthiness and observing of the information and data for limiting information defilement and information crash in the server. The uprightness of the information and data is an imperative in keeping up the database of the cloud. It is great process for capacity of information security determined information stockpiling, which canbe,recoverorrecoveredinsameformat,asitwasputawaylater(Dang-Pham,
9 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) Pittayachawan and Bruno, 2017). In this way, respectability and checking of the information and data for limiting information debasement and information crash in the server. Data Confidentiality issue The protection of data and information is earnest segment in a business affiliation. Protection implies the rules and bearings constrained by a relationship to limit the passageway of various resources and assets of association (Dang-Pham, Pittayachawan, and Bruno, 2017). The private information about the agents and clients are not bestowed to anyone that offers security to the data and information. The mystery of the data and information in the affiliation might be broken because of the advanced attacks over the web. The customers of the cloud organization approach distinctive records of the customers. Along these lines, the data and information can be revealed beginning with one record then onto the following record in the association (Aikat, et al., 2017). The break in the security tradition of the association may reveal the private data md information in the market. Data Availability issue Securing data and informationin remoteregion to givehigh securitymay make dissatisfaction in getting the data and information. For the circumstance, of cloud organizations quit working as a result of a couple of reasons, the data and information cannot be gotten to from the remote region. The proprietor of the data may get adversity in data bringing (Aljawarneh, Alawneh, and Jaradat, Cloud security outlining, 2017). There are risks in the data availability including data flooding attacks that causes block from asserting organizations in the association. The Cloud computing gives on-ask for organizations to the business affiliation. In this way, if the
10 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) organization is not available in light of any mistake, the demand of the Cloud computing may reduce. It might mishandle the Service Level Agreement (SLA) with the customers and business relationship in the market (Duncan, Zhao, and Whittington, 2017). Data Integrity Issue The data dependability suggests the consistency and authenticity of the organizations gave by the Cloud computing in the market. The usage of the Cloud computing in the business affiliation has been extending in the market. Therefore, on account of some noteworthy hardware issue, the organizations won't not be open in the market (Aljawarneh, Alawneh, and Jaradat, Cloud security building, 2017). As needs be, the proprietor of the data and information can't get to. The Cloud storage is responsible for securing the data and information of the relationship over the web. In this way, there is a plausibility of data crack over the cloud that causes data loss of the association in the market. Data accessibility issue The data accessibility issue in the model for securing the data and information of the business relationship over the cloud. The Small associations can store their data and information over the web using the Cloud storage show (Luna, Taha, Trapero, and Suri, 2017). Advanced strikes are genuine risks for the association over the web. Various contaminations and malwares attacks the server of the Small associations, as they have less secured security tradition. These malwares enter the server of the association and break private information to the pariah.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
11 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) Security Solutions Distinctive cases have given demand of security respond in due order regarding different Cloud computing models. This report has proposed a model that may help in securing data an information over the cloud. Security organization, chance organization and consistence The basic commitment of any business affiliation is to control and screen use process in the association. The organization may compel a couple of courses of action and laws that assistants in restricting the mishandle of the preparing resources in work environment. As commented by (Mumme, Wallace, and McGraw, 2017), security structures help in fruitful risk organizationprocessinthebusinessrelationshiptorecognizedistinctiveperilsforthe association. The peril organization helps in separating the recognized threats and treats in the association. Distinctive frameworks and Policies are made to reduce these security threats and risks in Small associations. Auditing Auditing inside a CC territory essentially suggests the course toward data respectability uprightness of outsourced information and additional the client's figuring time and online weight of extra managing. (Rewadkar and Ghatage , 2014). Proposed a security saving checking on (TPA). TPA will attest the point of confinement rightness of the outsourced information occasionally when the clients start an enthusiasm for confirmation. The objective of the TPA is to lessen the greatness of clients by sparing their calculation assets while guaranteeing the rightness of their informational index away in the cloud (Coppolino, D'Antonio, Mazzeo, and Romano, 2017). The issue that could ascend by picking not to utilize TPA is that CSP's, for cash
12 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) related reasons, may destroy information that is not being utilized or they may cover the information hardship occasions to deal with notoriety. Obviously, the clients have the alternative of checking this information themselves, however these decisions are irrational or risks the request of the information (Rewadkar and Ghatage , 2014). The proposed plan will play out the investigating on the client's demand. This will be done by sending the check metadata from the client to the server and the reaction will by then be insisted by the TPA. It besides combines an asserted 'gathering evaluating', which will diminish the reaction time for overview demands when sent by various clients (Rewadkar and Ghatage , 2014). Techniques Techniques are a great part of the time utilized as an approach to manage guarantee that connection wide security targets are being dealt with a relative way completed the alliance. While Policies disengaged cannot comprehend security issues, they are a major association contraption. Appropriated enlisting is no extraordinary case to this (De Carvalho, de Castro Andrade, de Castro, Coutinho, and Agoulmine, 2017). While affecting a system with respect to flowed figuring to survey that the cloud ace group must consider the course of action. For without question it may be savvier to build up a shared awareness of the strategy together with the specialist group (Behl and Behl, 2012). This is fundamental in perspective of the way that the CSP may have a few clients with various security needs and along these lines, it may be incomprehensible for the CSP to plan that spreads all the security needs of the noteworthy number of clients. Or on the other hand possibly it is more insightful to make approaches that arrangement with single clients and their particular needs (Sabahi, 2011). At last an approach is as they say sensible if the connection owning it dependably makes secure manages utilizing the
13 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) course of action as a base. Regardless of whether it is, porting a present approach or making another blueprints alone can't not deal with the security issues all cloud clients confront. Attack In the structure, "Capable, Scalable and Secure Network Storage (RSSNS)" appeared by (Demchenko, Turkmen, Slawik, and de Laat, 2017) an encryption instrument is first connected with the information, which in this way is part, into figure pieces. These squares of figure information are by then set among a few grouped CSPs. Anis by then encoded before trading and is part into various pieces of information; A1, A2 and A3. These are then scattered on various servers inside the cloud. RSSNS accomplishes this by applying a Redundant Array of Independent Disks (RAID) use at every server inside the cloud (Coughlin, Keller, and Wustrow, 2017). They analyze diverse modifications of RAID and achieve the conclusion that RAID 10 (1 + 0) is all around profitable. Snare 10 gives two or three phenomenal highlights, for example, informationemphasis,transparencyandacclimationtoinsidefrustrationby blendingthe highlights of striping and reflecting. Receptiveness is capable by the utilization of decency. Parity in data relating to a figure square and can be utilized to patch up a report that is been harmed or is far off for different purposes (Juels, Oprea, and Bowers, 2017). For example, if A1 is secured in S1, A2 is secured in S2 and A3 is secured in S3, the adjust data from A1 and A2 is secured in S3. From this time forward, if A1 is harmed, the entire report can be recovered by utilizing the data set away in S2 and S3 (Al-Anzi, Salman, Jacob, and Soni, 2014). Hindrance of the review The composition focuses on various security issues and risks in the Cloud computing in Small associations. There are diverse components discussed that makes security challenges in the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
14 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) Cloud computing. In any case, there are diverse issues in Cloud computing that has been disregarded in this written work study. The proposed show has not been truly modified in the review. There have diverse journals and s been used for the written work review. Nevertheless, courses of action obliged calming the challenges may have been more profitable than present one. There could have been practical use of the philosophies discussed in the written work review. Virtualization and multi tenure Virtualization and multi tenure are the two essential factors being used of the Cloud computing in the business associations. The conventional method for facilitating applications includes the utilization of working framework on physical layer. Along these lines, consequently sort of customary facilitating technique has been utilized for making an utilitarian effective cloud. These can be accomplished with the assistance of connecting numerous servers utilizing Virtual LAN (VLAN) (Dave et al., 2017). Nonetheless, this procedure is uncertain and wasteful for long haul, as gigantic piece of physical equipment isn't utilized. Thusly, Virtualization has helped in keeping up these issues in the Cloud computing the Virtual Machine Monitor (VMM) has been made for a solitary physical server that can have various server at once in the working framework (Mohammad, Kak and Alam, 2017). Subsequently, a solitary server can go about as numerous handling server at once. It has improved the productivity of the equipment and upgrading its execution. The virtual layer is otherwise called hypervisor. Two methods for utilizing this hypervisor for running virtual machines (VM) (Krishna et al., 2016). These are known as full virtualization and paravirtualization. A VM conveyed utilizing full virtualization has copying BIOS and drives of the OS, notwithstanding alternate capacities.
15 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) Figure 1: Descriptive image of Virtualization (Source:Kshetri, 2013, pp.374) There are two models for conveying virtual machines facilitated design. The facilitated design, the virtual layer is dealt with by server. The application is energized for keeping the virtual machines in the working framework. Be that as it may, the hypervisor design skips working framework and runs specifically on equipment. Multi tenure aides in permitting different sharing if the registering assets in sensible partition of the clients in the occupant of a framework. With regards to Cloud computing, each virtual machines are consider as an occupant of the framework (Lin and Liao, 2017). Multi occupancy is not constrained to the various virtual machines that are running in a similar equipment. Programming and applications can utilize numerous inhabitants for upgrading the productivity of the virtual machines in the working framework. In IaaS cloud models, clients make new drives on virtual machines and store information on those drives (Luna et al., 2017). Be that as it may, information in every one of the three-cloud models can be gotten to by unapproved workers and outer programmers.
16 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) Information Encryption Schemes Different security issues talked about in the before areas. Nonetheless, there are a few answers for alleviating the issues in the Cloud computing identified with security of the information and data. Intermediary Re-encryption Scheme The Proxy Re-encryption is cryptographic plan that decipher figure writings starting with one encryption key then onto the next key. From that point forward, PRE advances encoded messageswithoutindicatingcleartothepotentialclients.Anintermediaryre-encryption calculation interprets a figure message under an open key PKato figure PKbalongside re- encryption key RK A →B. Character Based PRE Scheme In this encryption conspire, IP address or email delivers can be utilized to define open keys for clients. The sender utilizes beneficiary's way of life as people in general key to encode messages in personality based encryption procedure. The intermediary requires intermediary keys, or re-encryption keys, to perform interpretations without being perusing unique message (McCormac et al., 2017). The IBE method has different pragmatic applications including trait based appointments, secure email sending, and access control in organized record stockpiling. Characteristic Based PRE Scheme This encryption plot manages an intermediary server that aides in keeping up extra data that can be change into figure message under different traits into another figure message on a similar message. Hence, the information supplier may get the first that aides in sharing the figure message in the message. In this plan, private key client has a benefit of qualities that aides in
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
17 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) giving scrambled figure message that may indicate an entrance approach (Modi et al., 2013). In this plan, the information is scrambled in the capacity on different server that aides in keeping up go down for the first and message. Key Private PRE Scheme In a key private PRE, the intermediary and set of clients are never gotten by message beneficiary from figure and open keys. This plan helps in helps in giving key protection to intermediary re-encryption plots in which intermediary plays out all interpretations that can't recognize the personalities of taking an interest parties (Mishra, 2017). Case Study Different IT pioneers have been assessing this procedure in the market and distinguished the difficulties looked amid this procedure. The utilization of the Cloud computing have given different administrations to the clients in the Los Angeles. In any case, the legislature have indicated different difficulties in this procedure of change. The requirements and desires of the clients have not been met by the movement procedure. These have expanded the multifaceted nature of process. Accordingly, the utilization of the Cloud computing in the framework have helped in limiting the multifaceted nature in the framework. A reasonable openness get to give by Cloud computing have helped in giving straightforward answers for issues. In any case, 13500 part Los AngelesPolice Departmenthave been additionally moving to the cloud administrations. The Cloud computing has prepared to screen the arrangement of activity of the associations in the market. The Cloud computing used to give on-ask for organizations to the free wander that help keeping up the hypothesis cost of the association in the market. It give benefits on a month to month and yearly based that helpers in restricting the hidden hail of the little and
18 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) medium undertakings. While impacting a philosophy with respect to coursed figuring to survey that the cloud ace group must consider the approach. For without question it may be savvier to build up a common comprehension of the approach together with the expert group. The database of the police division have been made over the Gmail cloud administrations. Aside from the difficulties, the city have foreseen about $5 million funds more than five years from the move. In this manner, such an immense measure of cash can be spared by the obligation government by the utilization of the cloud administrations. The utilization of different administrations in the Cloud computing have been keeping up the database of the legislature of Los Angeles. The city gave possessed the capacity to watch mass money related change in their income. These money related limitations of the obligation have been legitimately spared that exceeded challenges
19 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) References Aazam, M., Khan, I., Alsaffar, A.A. and Huh, E.N., 2014, January. Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved. InApplied Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference on(pp. 414-419). IEEE. Abbas, R., Farooq, A., and Afghan, S. 2015. A security Model for SaaS in Cloud Computing. University of Engineering and Technology Taxila. Technical Journal, 20(4), 103. Ahmed, H. S., and Zolkipli, M. B. 2016. Data security issues in cloud computing. International Journal of Software Engineering and Computer Systems, 2(1), 58-65. Ahmed, M., and Litchfield, A. T. 2016. Taxonomy for identification of security issues in cloud computing environments. Journal of Computer Information Systems, 1-10. Ahmed, R., Hussain, M., Rahmani, T. S., Mansoor, A., and Ali, M. L. 2017. Minimization of security Issues in Cloud Computing. Journal of information communication technologies and robotics applications (jictra), 3(1), 1-39. Aikat, J., Akella, A., Chase, J. S., Juels, A., Reiter, M. K., Ristenpart, T., . . . Swift, M. 2017. Rethinking security in the Era of Cloud Computing. IEEE securityandSecurity, 15(3), 60-69. Al-Anzi, F. S., Salman, A. A., Jacob, N. K., and Soni, J. 2014. Towards robust, scalable and secure network storagein CloudComputing.In DigitalInformationand Communication Technology and it's Applications (DICTAP), 2014 Fourth International Conference (pp. 51-55). IEEE. Alassafi, M. O., Hussain, R. K., Ghashgari, G., Walters, R. J., and Wills, G. B. 2017. security in organisations: governance, risks and vulnerabilities in moving to the cloud. Springer, Cham.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
20 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) Albaroodi, H., Manickam, S., and Singh, P. 2014. Critical review of OpenStack security: Issues and weaknesses. Journal of Computer Science, 10(1), 23-33. Aljawarneh, S. A., and Yassein, M. B. 2016. A conceptual security framework for cloud computing issues. International Journal of Intelligent Information Technologies (IJIIT), 12(2), 12-24. Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2014, August. On the integration of cloud computing and internet of things. InFuture internet of things and cloud (FiCloud), 2014 international conference on(pp. 23-30). IEEE Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2016. Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, pp.684-700. Duncan, B., Zhao, Y., and Whittington, M. 2017. Corporate Governance, Risk Appetite and Cloud security Risk: A Little Known Paradox. How Do We Square the Circle?. In Eighth InternationalConferenceonCloudComputing,GRIDs,andVirtualization(CLOUD COMPUTING 2017). IARIA. Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., and Inácio, P. R. 2014. security issues in cloud environments: a survey. International Journal of Information security, 13(2), 113- 170. Flint, D. 2017. Storms Ahead for Cloud Service Providers. Business Law Review, 38(3), 125- 126. Garg, A., and Babbar, H. 2017. Cloud security: A Big Challenge, Issues and Solutions. Imperial Journal of Interdisciplinary Research, 3(3).
21 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) Goyal, S. 2014. Public vs private vs hybrid vs community-cloud computing: a critical review. International Journal of Computer Network and Information security, 6(3), 20. Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues.Information Systems,47, pp.98-115. Hashizume, K., Rosado, D. G., Fernández-Medina, E., and Fernandez, E. B. 2013. An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5. ISO/IEC13335-1:2004(E).(2004,1115).RetrievedfromInternationalOrganizationfor Standardization: https://webstore.iec.ch/preview/info_isoiec13335-1%7Bed1.0%7Den.pdf Juels, A., Oprea, A., and Bowers, K. D. 2017. security Issues for Cloud Computing [3]. 4(5). Khan, M. A. 2016. A survey of security issues for cloud computing. Journal of Network and Computer Applications, 71, 11-29. Khan, N., and Al-Yasiri, A. 2016. Cloud security threats and techniques to strengthen cloud computing adoption framework. International Journal of Information Technology and Web Engineering (IJITWE), 11(3), 50-64. Krishna, B. H., Kiran, S., Murali, G., and Reddy, R. K. 2016. security Issues In Service Model Of Cloud Computing Environment. Procedia Computer Science, 87, 246-251. Kshetri, N. 2013. Security and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4), 372-386. Lin, I. C., and Liao, T. C. 2017. A Survey of Blockchain security Issues and Challenges. IJ Network security, 19(5), 653-659.
22 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) Luna, J., Taha, A., Trapero, R., and Suri, N. 2017. Quantitative reasoning about cloud security using service level agreements. IEEE Transactions on Cloud Computing. McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., and Pattinson, M. . 2017. Individual differences and information security awareness. Computers in Human Behavior, 69, 151-156. Mishra, A. 2017. Cloud Computing Models: Background, Data security, andsecurity Issues. Journal of Web Development and Web Designing, 2(1,2). Modi, C., Patel, D., Borisaniya, B., Patel, A., and Rajarajan, M. 2013. A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-592. Mohammad, A., Kak, S. M., and Alam, M. A. 2017. Cloud Computing: Issues and security Challenges. International Journal, 8(2). Mumme, D. C., Wallace, B., and McGraw, R. 2017. Cloud security via Virtualized Out-of-Band Execution and Obfuscation. In Cloud Computing (CLOUD), 2017 IEEE 10th International Conference, 286-293. Pachauri, S., Srivastava, R., and Trivedi, U. B. 2014. Cloud-computing: Challenges, security and Solutions Using, SaaS. Puthal, D., Sahoo, B. S., Mishra, S., and Swain, S. (2015, January). Cloud computing features, issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), 2015 International Conference (pp. 116-123). IEEE.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
23 INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT) Rai, R., Sahoo, G., and Mehfuz, S. 2013. Securing software as a service model of cloud computing: Issues and solutions. arXiv preprint arXiv:1309.2426. Rajasekaran, S., Ni, Z., Shah, N., Chawla, H. S., Wood, T., and Berger, E. 2016. Scalable Cloud security via Asynchronous Virtual Machine Introspection. In HotCloud. Ramachandra, G., Iftikhar, M., and Khan, F. A. 2017. A Comprehensive Survey on security in Cloud Computing. Procedia Computer Science, 465-472. SecurityAct1993.(2017,September28).RetrievedfromLegislation: http://www.legislation.govt.nz/act/public/1993/0028/latest/DLM296639.html Stergiou, C., Psannis, K.E., Kim, B.G. and Gupta, B., 2018. Secure integration of IoT and cloud computing.Future Generation Computer Systems,78, pp.964-975. Tao, F., Cheng, Y., Da Xu, L., Zhang, L. and Li, B.H., 2014. CCIoT-CMfg: cloud computing andinternetofthings-basedcloudmanufacturingservicesystem.IEEETransactionson Industrial Informatics,10(2), pp.1435-1442. Yang, J., He, S., Lin, Y. and Lv, Z., 2017. Multimedia cloud transmission and storage system based on internet of things.Multimedia Tools and Applications,76(17), pp.17735-17750. Yi, S., Li, C. and Li, Q., 2015, June. A survey of fog computing: concepts, applications and issues. InProceedings of the 2015 Workshop on Mobile Big Data(pp. 37-42). ACM.