logo

IoT Cloud-based Security Issues: Blockchain Technology as a Solution

   

Added on  2024-05-10

27 Pages5671 Words406 Views
 | 
 | 
 | 
WEEKLY REPORT
Week – 5
IoT Cloud-based security issues: Blockchain technology as a
solution
Name : Kanakadurga Sridevi Maddipati
Student ID : 11606404
Subject : Emerging Technologies and
Innovations
Subject Code : ITC571
Staff : Dr Chandana Withana
IoT Cloud-based Security Issues: Blockchain Technology as a Solution_1

TABLE OF CONTENTS
What is IoT and definition of IoT
Definition of IoT basic terms
IoT device
IoT ecosystem
Entity
Physical layer
Network layer
Application layer
Data storage
Applications of IoT
Health Care
Wearables
Connect Vehicles
Home Automation
Location-based services
Smart Meters
Major components or functional blocks of IoT
Device and sensor
Gateway
Cloud
Analytics
Application/User interface
IoT Architecture layers and its relationship with the components
Challenges associated with cloud-based IoT
Identity Privacy
Location Privacy
Node Compromise Attack
Target-oriented compromise attack
Layer Removing/Adding Attack
Forward and Backward Security
Semi-Trusted or Malicious Cloud Security
Data Breach
IoT Cloud-based Security Issues: Blockchain Technology as a Solution_2

Shared technologies vulnerabilities
Account or service traffic hijacking
Denial of service (DoS) attacks
Malicious insiders
Cloud and what are the different types of clouds
Structure of Cloud
Features of Cloud
Centralized cloud storage and what are its security issues
What is blockchain technology and explain its architecture
Explain the working of blockchain technology and its applications
Compare cloud storage and block storage
Benefits of moving from cloud storage to blockchain
IoT Cloud-based Security Issues: Blockchain Technology as a Solution_3

Everything in its way to be computerized and most of the objects are coming to be
smart in present days. Modern Internet of Thing (IoT) allows these objects to be on
the network by using IoT platforms. The internet of things (IoT) information can
be shared among certain devices through the internet. Such devices are smart-
devices include smartphones, tablets, PCs, wearables, sensors and so on. Many
other smart devices have been introduced recently which can communicate with
each other using the internet and other communication techniques. These
techniques include RFID, near-field communications, various types of barcodes,
and so on. The capabilities of communications in IoT are built-in and allow new
services. The frequent increase in the smart devices connected to the internet lead
to the increase in several issues related to flexibility, security, efficiency and
scalability. According to Sharma, et al. (2017), the blockchain technology is the
solution utilized for resolving the issues as it supports in developing effective
architecture for IoT that help in advancing the security aspects.
Definition of IoT and its basic terms:
There is no universal definition for the term IoT; different definitions are used by
different parties, foundations, and groups to describe a specific view of what IoT
means. The goal that needs to be accomplished for the IoT is integrity,
confidentiality and authentication (Cheng, et al. 2017).
IoT or Internet of Things is defined as a system that permits the devices for
communicating with each other directly without human intervention. IEEE, in its
special report on Internet of things described IoT as "A network of items-each
embedded with sensors which are connected to the Internet" (Special Report: The
Internet of Things). In 2016, The International Telecommunication Union (ITU)
published a requirement of the network for the Internet of things and IoT is defined
IoT Cloud-based Security Issues: Blockchain Technology as a Solution_4

as a global infrastructure for society of information that enables interconnected
things to communicate with each other and performs advance services-based on
existing and evolving interoperable information and communication technologies
(Requirements of the network for the Internet of things, 2016).
According to Cheng, et al. (2017), there is the requirement of cryptographic
primitives and advanced algorithms like advanced encryption standard (AES) with
intention to amplify the confidentiality and security aspects for IoT. The
communication in the IoT needs to be secured with intention to enhance
confidentiality and maintain trustworthiness.
In The Internet of Things: An Overview (2015), IoTis defined as a framework
wherein all things have a representation and existence in the internet. IoT goals for
offering new applications and services bridge both physical and virtual
worlds.Also, IoT is defined as internet of three things: People to people, People to
machine, machine to machine, Interacting through internet.
According to Gil, Ferrández, Mora-Mora, & Peral (2016), there are numerous
visions about IoT starting with various perspectives. As of the viewpoint from
services, IoT implies our current reality, the place where things could naturally
correspond with one another giving the profit to the mankind. From the viewpoint
of connectivity, IoT intends anytime, anywhere connectivity for anyone and
anything. From that viewpoint about communication, IoT alludes a world-wide
system of interconnected things or devices that are particularly addressable
considering standard conventions. Lastly, starting with the viewpoint from
networking, IoT may be the web developed from a system of interconnected
machines with a system of interconnectedness devices.
(Meddeb, 2016) describes the terms as follows:
IoT Cloud-based Security Issues: Blockchain Technology as a Solution_5

Internet of Things: Network of internet connected devices that gather
information and return information using sensors.
IoT device: Any internet-connected device that could be monitored or
controlled within a remote area.
IoT ecosystem: Components that allow businesses, governments, customers
to connect with IoT devices like remotes, dashboards, networks, gateways,
analytics, information storage, security.
Entity: Businesses, governments, and customers are the entities.
Physical layer: Hardware of an IoT devices.
Network layer: Liable for transmitting the information gathered by the
physical layer.
Application layer: Protocols for devices to communicate with one another.
Data storage: Place where information from IoT devices will be kept.
IoT Cloud-based Security Issues: Blockchain Technology as a Solution_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security of Internet of Things - Issues, Vulnerabilities and Measures
|12
|555
|406

Annotated Bibliography: Emerging Technologies and Innovation
|11
|3289
|337

IoT devices. Connection between diff erent device s. In
|17
|350
|256

Internet of things - Assignment
|13
|4549
|42

IoT Security and Privacy Challenges
|9
|1402
|116

Department of Computer Technology PDF
|5
|4213
|21