IoT and Cloud Privacy: Security Challenges of IoT-Cloud Based SCADA Systems

Verified

Added on  2022/10/05

|12
|2510
|318
AI Summary
This paper discusses the security challenges of IoT-cloud based SCADA systems and recommends best practices for their security. It also highlights the future research for SCADA security.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: IOT AND CLOUD PRIVACY
IOT AND CLOUD PRIVACY
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
IOT AND CLOUD PROVACY
Table of Contents
Introduction:-...................................................................................................................................3
Discussion:-.....................................................................................................................................3
Applications of SCADA:-............................................................................................................3
Security challenges of IoT-cloud based SCADA systems:-........................................................4
IoT and SCADA:-........................................................................................................................4
Network Division: -.................................................................................................................5
Predictive Investigation:-.........................................................................................................5
Device type:-............................................................................................................................5
IoT standard:-...........................................................................................................................5
Cloud strategy:-.......................................................................................................................6
SCADA system security:-............................................................................................................6
General security:-.....................................................................................................................6
IoT-Cloud base security:-........................................................................................................7
Future Researches:-.....................................................................................................................8
Conclusion:-.....................................................................................................................................8
References:-...................................................................................................................................10
Document Page
2
IOT AND CLOUD PROVACY
Introduction:-
Every business organizations are trying to grow their business. Without the help of
information technology, any business organization cannot reach the highest business profit.
Internet of things and cloud computing are modern technology. In this paper, the researcher
focus on security purposes on the IoT-cloud based SCADA systems [10]. With the help of
SCADA, the cloud servers are collecting a piece of massive information and monitoring it.
SCADA systems are facing some technical and ethical difficulties. The unauthorized person
easily accesses any server by the SCADA. In this paper, the author highlights the security issues
of SCADA and also recommend some best practices of these systems. The paper elaborately
describes the future research for SCADA security [11]. The beginning of the this combination
has carried several profits to the IT authority that includes cost reduction and embedded safety.
The cyber-physical system architectures are mainly connecting to Wireless networking, cyber
security and internet of things. Without the help of SCADA, any industries not stored their
business information.
Discussion:-
Applications of SCADA:-
With the help of PLC, this system generates the extra flexible load for data monitoring
and controlling. SCADA system includes a high number of application sectors like the energy
sector, medical sector, chemical industry etc. When a pharmaceutical industry should store all
data which is relating to the patient’s details, medical details, and doctor information. The
medical sector can be storing this information effectively by the SCADA [3]. These systems play
a vital role in IT technology. Because the IT industry spread its business all over the world. It is
Document Page
3
IOT AND CLOUD PROVACY
essential to collects all business information in a cloud system. SCADA helps to store this data
and analyze this data correctly. These systems are used to regulate and monitor manual
processes. In a power station, this system is controlling electricity transmission, water
distribution, and light signals. SCADA also helps to track real time data adjustments. SCADA
systems develop commercial cloud computing and IoT technology.
Security challenges of SCADA systems:-
SCADA systems are facing some most significant difficulties, which is very much
dangerous for the business administrator. In this paper, the researcher analyses the considerable
attacks on the SCADA system [12]. This analysis can help to concentrate on the reason for the
vulnerabilities. Several errors exist in these backgrounds that could plant viruses in SCADA
systems.
First, of the systems commands and data can be lost, sniffed and modified during the
communication. It is mainly happening because this system is very much open and easy to access
for all Users. The user friendly operations are access also the unethical person. The dishonest
person attacks this server by the corrupted files and malware than they easily connect their
network to SCADA's network. For automation and control, these systems used some unsafe
platforms like DNP3, TCP. There protection ability and protocol structures are not so much
stable then the system is affecting. SCADA are connecting to the same default settings and
unnecessary services which mainly fail to regulate all information accurately [14]. The
weaknesses mentioned above form the basis of system performance. This weakness creates a
harmful impact on the industries.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
IOT AND CLOUD PROVACY
IoT and SCADA:-
The SCADA system executes an essential purpose that permits organizations to
effectively mechanize complex business processes such as data acquisition, human-machine
interface, calculation electrical communication, data collection, control, report generation and
monitoring. For many businesses, these functions are essential to have proper control processes.
A perfect SCADA structure is very much crucial for industrial purpose.
Network Division: -
There is a vital stage in certifying business stability. Every business authority knows that
network division can protect a business. When the industry faced difficulties, then they use a
better to have only one section down rather than the complete network.
Predictive Investigation:-
This technology plays a crucial part in carrying out the SCADA systems function.
Selecting the predictive solution will give the business an indication into the upcoming analysis
and insight into business systems faults.
Device type:-
One important thing to do is to choose which of the IoT devices will continue in-house.
Proper IoT devices can protect their system very efficiently. All most every human are storing
their essential data in the Cloud through SCADA. So, security is crucial wherever the methods
will be tracing.
Document Page
5
IOT AND CLOUD PROVACY
IoT standard:-
There are specific IoT standards that a business person must take into deliberation when
moving to current SCADA systems [5]. If the measure is genuine, then the SCADA system
efficiently manages all data and storing this information in the cloud section.
Cloud strategy:-
The two types of cloud are private cloud and public cloud. All of the personal details like
business customer information, essential documents are storing into the private cloud [15]. The
public cloud was storing some data which is accessible by the standard user. Proper cloud
strategy is necessary for saving the data.
SCADA system security:-
In this paper, the author discusses the two types of SCADA security one is general
security, and another is IOT-cloud based security.
General security:-
Policy management:-
Cybersecurity has measured risk because if an unknown trespasser enters in SCADA
system, then the attacker also controls all operations. When SCADA are connecting to the
Internet server, then all threats are rising. (In this article, the authors are using Modbus protocol
to identifying these hacker's activity.) [1] The consequences disclose the SCADA systems
software increases their strength when these structures follow correct instructions for
authorization authentication.
Document Page
6
IOT AND CLOUD PROVACY
Feeble communication:-
SCADA communication links can be hacking because the user does not deliver
authentication mechanisms and encryption [6]. To deal with these weaknesses, the author
suggests four communication channels and each channel can fulfil different security services.
These network systems safety can be upgraded by applying systems discovery and securing the
updated firewalls. The security management of SCADA can be developing by the execution of
usual risk assessments and improving the clarity of security control can be developed as well.
The first stage in keeping any system is to prevent illegal entities. The internet protocol network
is currently able to protect every application. The IP protection is answerable for carrying out
communication responsibilities between two hosts [8]. These systems can secure Internet traffic.
This system also avoids Denial of service attacks. It is also able to break any arbitrary
communication packet from accessing the TCP/IP layer.
Data integrity:-
A disadvantage of this procedure is that it concentrations only the software level [2]. The
hardware is not taking into reflection. According to the research, the author presented a testbed
architecture in which the different attacks negotiate system integrity and availability. Mainly the
data integrity creates a significant impact on system security.
IoT-Cloud base security:-
Data Logging:-
In the presence of cloud systems, Data logging is the one biggest challenges of SCADA
systems [13]. Data logging is the process of storing information over a specific time to analyze
the data record. Without the help of SCADA systems, any particular information cannot be
collecting in a cloud server.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
IOT AND CLOUD PROVACY
Information Security:-
In this paper, the researcher collects some impressive information form another research
paper. The primary purpose of this paper is to distribute SCADA based specific application for
the IoT cloud systems [7]. Data privacy is very much crucial for this distribution because the
unauthorized person quickly access distributes data and manipulate it. So the main concentration
is to secure this data. If the technician creates a parallel data path and accesses this path very
efficiently, then the hacker cannot be traced to this path.
Encryption and authentication:-
There is a vast number of encryption mechanisms for cloud based SCADA systems. A
weak communication protocol is the cause of SCADA security issues. But in modern technology
helps to encrypt any specific information efficiently. Daily data authentication is one procedure
to keep the SCADA system.
Risk Management:-
Risk management is very much an essential part of any ongoing research. The researchers
highlighted some fundamental network issues and cyber failure of SCADA systems [9]. In this
research, the author quickly outlined the risk factors like unauthorized access, network failure,
the lousy structure of communication protocol etc.
Future Researches:-
The cloud system protection is very much crucial for the IT industry. But first of all,
SCADA security is very much necessary SCADA is struggling by the inappropriate management
procedure. In future, the researcher must be concentrating on the proper management
techniques[4]. Adequate construction of every application is very much crucial for System
Document Page
8
IOT AND CLOUD PROVACY
security. So in future, the researcher should focus on the SCADA system application and build a
reliable communication protocol.
Conclusion:-
The purpose of this research paper was to emphasize some significant facts about
developed SCADA systems with importance on vulnerabilities, threats following. The standard
SCADA systems are to grow their optimization, elasticity, accessibility, ability. The effort being
made to safe these systems within the upcoming internet environment were discussing
extensively SCADA systems are mainly stored massive number of information in IoT-cloud base
medium. The communication protocols of the SCADA systems are reducing. These are the most
significant difficulties of the SCADA systems security. If the technicians can modify the system
server daily, the SCADA system recovers from these issues. And the last thing is that the official
should create one parallel way which is not accessible for the unauthorized person.
Document Page
9
IOT AND CLOUD PROVACY
References:-
[1] J. Zhou, Z.Cao, X. Dong and A.V. Vasilakos, “Security and privacy for cloud-based IoT:
Challenges”,IEEE Communications Magazine, 55(1), 2017, pp.26-33.
[2] C. Stergiou, K.E. Psannis, B.G. Kim and B. Gupta,”Secure integration of IoT and cloud
computing”,Future Generation Computer Systems, 78, 2018, pp.964-975.
[3] A. Sajid, H. Abbas and K. Saleem,“Cloud-assisted IoT-based SCADA systems security: A
review of the state of the art and future challenges”,IEEE Access, 4,2016, pp.1375-1384.
[4] M. Conti, A. Dehghantanha, K. Franke and S. Watson, “ Internet of Things security and
forensics: Challenges and opportunities”, 2018.
[5] W. Li, L. Xie, Z. Deng and Z.Wang, “False sequential logic attack on SCADA system and its
physical impact analysis”,Computers & Security, 58, 2016, pp.149-159.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
IOT AND CLOUD PROVACY
[6] Y.Yang, K. McLaughlin, S. Sezer, T. Littler, E.G. Im, B. Pranggono and H.F. Wang,
“Multiattribute SCADA-specific intrusion detection system for power networks”,IEEE
Transactions on Power Delivery, 29(3), 2014, pp.1092-1102.
[7] J. Gao, J.Liu, B. Rajan, R. Nori, B. Fu, Y. Xiao, W. Liang and C.L. Philip Chen, “ SCADA
communication and security issues:, Security and Communication Networks, 7(1),2014, pp.175-
194.
[8] L.A. Maglaras, K.H. Kim, H. Janicke, M.A. Ferrag, S. Rallis, P. Fragkou, A. Maglaras and
T.J Cruz, 2018,”Cyber security of critical infrastructures”,Ict Express, 4(1),2018, pp.42-45.
[9] H. Ahmadi and H. Ghasemi,”Security-constrained unit commitment with linearized system
frequency limit constraints”,IEEE Transactions on Power Systems, 29(4), 2014 ,pp.1536-1545.
[10] A.R. Sadeghi, C. Wachsmann and M. Waidner,“Security and privacy challenges in
industrial internet of things”, In 2015 52nd ACM/EDAC/IEEE Design Automation Conference
(DAC), 2015,(pp. 1-6). IEEE.
[11] J. Geeganage, U.D. nnakkage, T. Weekes and B.A. Archer, “Application of energy-based
power system features for dynamic security assessment”,IEEE Transactions on Power Systems,
30(4), 2014, pp.1957-1965.
Document Page
11
IOT AND CLOUD PROVACY
[12] Y. Yang, H.Q. Xu , L. Gao, Y.B.Yuan, K. McLaughlin, and S. Sezer,“Multidimensional
intrusion detection system for IEC 61850-based SCADA networks”,IEEE Transactions on
Power Delivery, 32(2), 2016, pp.1068-1078.
[13] L.A. Maglaras and J. Jiang, ”Intrusion detection in SCADA systems using machine learning
techniques”, In 2014 Science and Information Conference, 2014 (pp. 626-631). IEEE.
[14] N. Erez and A. Wool,“Control variable classification, modeling and anomaly detection in
Modbus/TCP SCADA systems”,International Journal of Critical Infrastructure Protection, 10,
2015, pp.59-70.
[15] P. Maynard, K. McLaughlin and B. Haberler, ”Towards Understanding Man-in-the-middle
Attacks on IEC 60870-5-104 SCADA Networks”, In ICS-CSR,2014.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]