Cloud Computing and Internet of Things (IoT) Integration Report

Verified

Added on  2021/06/18

|23
|6801
|132
Report
AI Summary
This report provides a detailed analysis of the integration between cloud computing and the Internet of Things (IoT). It explores the challenges associated with this integration, including security concerns such as data confidentiality and potential attacks on cloud infrastructure. The report delves into various security solutions, including information encryption schemes and virtualization techniques, aimed at mitigating these risks. It also examines the impact of big data and fog computing on the integration process. Furthermore, the report discusses the importance of data integrity and the ethical considerations surrounding information management within cloud environments. The integration of cloud computing and IoT devices is shown to improve business functions and maintain data, however, security and data privacy remain significant concerns that need to be addressed. The case study illustrates the practical implications of these concepts. The report concludes by highlighting the need for robust security protocols to ensure data protection and the successful implementation of cloud-based IoT systems.
Document Page
Running head: INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS
(IOT)
Integration of Cloud computing and Internet of Things (IoT)
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT)
Table of Contents
Challenges........................................................................................................................................7
Security Solutions..........................................................................................................................10
Virtualization and multi tenure......................................................................................................13
Information Encryption Schemes..................................................................................................15
Case Study.....................................................................................................................................16
References......................................................................................................................................18
Document Page
3
INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT)
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2016. Integration of cloud computing and
internet of things: a survey. Future Generation Computer Systems, 56, pp.684-700.
Cloud computing has quicken the development of the organization by enabling the
workforce and changing the business activities. The arrangements have been produced by the
Cloud computing that connotes the vision of the organization with greatest adaptability and least
hazard. This security risks are talked about with appropriate answer for it. The Cloud computing
is a model that assistants in engaging all inclusive and on-ask for arrange access for a pool of
figuring resources (Botta et al. 2016). The integration of the cloud computing with the IoT has
been creating a major impact in the technological aspect of various business. The use of the IoT
devices have been helping in maintaining the services in business organization. The future aspect
of the cloud computing have been highlighting the integration with the IoT devices. The IoT
devices have been storing their data and information over the cloud. Therefore, this data can be
accessed from anywhere using the internet. A Cloud computing is a phase that gives dynamic
web applications and organizations that helpers in constraining extra effort made by different
associations. As commented by (Rittinghouse and Ransome, 2016), Cloud computing has
prepared to give assorted purposes important to the business affiliation and distinctive customers
in the market. The use of the Cloud computing has restricted the organization effort in the
market. The Cloud computing gives adequacy and versatility to the figuring resources. It went
for giving most noteworthy organizations at insignificant cost (Saa, Moscoso-Zea, Costales, and
Luján-Mora, 2017).
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of
“big data” on cloud computing: Review and open research issues. Information Systems, 47,
pp.98-115.
Document Page
4
INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT)
Cloud computing is an arrangement of assets, which is sought after in the market. Diverse
better approaches for business and administrations are proposed by the Cloud Computing. Along
these lines, this development have given different openings and changes in the task of the
business association. Big data has been a great approach in the technological aspect of the
business organization. Huge amount of data and information are collected from various success
over the internet. Therefore, the storage and analysis of the data has been a great issue for the
business organization. Therefore, cloud computing have helped in integrating with the bug data
concept. This concept has been implying a great change in management of huge amount of data
and information of the business organization. The Cloud computing have helped in making a
virtual universe of administrations and appropriate conveyance of it. Distinctive organizations
are giving Cloud computing administrations including Google Engine, Oracle Cloud, Amazon
Web Services and Office 365 (Almorsy, Grundy and Muller, 2016).
Tao, F., Cheng, Y., Da Xu, L., Zhang, L. and Li, B.H., 2014. CCIoT-CMfg: cloud computing and
internet of things-based cloud manufacturing service system. IEEE Transactions on Industrial
Informatics, 10(2), pp.1435-1442.
The Cloud computing has helped in putting away the individual information over the
Cloud storage. There have been numerous instances of information break from the Cloud storage
over the web. The security convention of the Cloud computing has been assaulted by the
programmers over the web. The Cloud computing comprise of three layers including Software
layer, Platform layer and Infrastructure layer. The integration of the IoT with the cloud
computing have been a great success in the manufacturing system of the cloud services. The use
of the IoT devices in the manufacturing system have been enhancing the production of the
company. The industrial informatics ystem has been using various IoT devices that have held in
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT)
managing the production of the system in the sector. The use of the cloud computing have been
enhancing the quality if the production by its accessibility and flexibility services. The troubles
in execution of the SaaS show has been recognized in the report. The major issue is the security
of the data and information including data arrangement issue, data openness issue, data
trustworthiness issue and data domain of little and medium endeavors in the market (Puthal,
Sahoo, Mishra, and Swain, 2015). This report bases on giving response for the data and
information security issues including assessing technique, RAID and security game plans in the
SaaS model of Cloud computing in autonomous endeavors. This report provide light to the
Policies for diminishing the security issues in the SaaS model of Cloud computing in the private
wander endeavors (Au, Fung and Tses, 2016). The consequences of the report have prepared to
direct the troubles looked by the business relationship in promote. The security of the data and
information has been constrained with the results and aftereffects of the investigation.
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2014, August. On the integration of cloud
computing and internet of things. In Future internet of things and cloud (FiCloud), 2014
international conference on (pp. 23-30). IEEE.
Cloud computing has ready to get the consideration in the market by the business
association. The pattern of the Cloud Computing has been expanding among the operational
administration of the business association. This have helped in executing the cloud benefits in
the business association. The idea of the Cloud computing has been talked about with its
advantages in the business association. Different cloud models are legitimately clarified with
outlines. Improvement of the cloud administrations have given ascent diverse digital risks in the
business associations. The majority of the business associations are utilizing the cloud
administrations to meet necessities of the customers and representatives of the organization.
Document Page
6
INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT)
There are has been consistent movement sought after of Cloud computing in advertise. The
Cloud computing and Software-as-a-Service (SaaS) has pulled in various free organizations.
There have been various purposes of enthusiasm of the SaaS in the autonomous wander
endeavors. On the other hand, there has been security issues winning in the SaaS show. The
sending of the cloud organizations has prepared to give distinctive organizations to the business
relationship in the market. The usage of the Cloud computing has some imperative including the
perils and risk of the data and information of affiliation (Saa, Moscoso-Zea, Costales, and Luján-
Mora, 2017). The Cloud computing has prepared to give versatility and on-ask for organizations
to the business relationship in the market; thusly, it has made a need in the market for the little
undertakings.
Aazam, M., Khan, I., Alsaffar, A.A. and Huh, E.N., 2014, January. Cloud of Things: Integrating
Internet of Things and cloud computing and the issues involved. In Applied Sciences and
Technology (IBCAST), 2014 11th International Bhurban Conference on (pp. 414-419). IEEE.
The cloud benefits that are imparted to open and can be adjusted and gotten to by any
client is known as open cloud (Almorsy, M; Grundy, J; Muller, 2016). The information and data
put away in the pubic cloud can be utilized by any client in the association. In this way, the
security in the general population cloud is ideally not as much as other cloud composes. The
integration of the IoT services in the cloud computing have been a great approach for the
researchers. The cloud computing services have helped in providing a new approach to the data
storage process. The use of the cloud computing helps in maintaining the data and information
of the organization over the cloud. Secrecy alludes to set of tenets and direction that screens the
working and usefulness of the devices and procedures utilized as a part of the Cloud computing
these of the safety efforts for securing information and data has been consistently ailing if there
Document Page
7
INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT)
should be an occurrence of Cloud computing. Therefore, privacy alludes to securing information
and data of clients and associations in the market. The utilization of individual data of clients is
not satisfactory in the association. The security of information and data of client is the earlier
thing for association (Cimler et al., 2015).
Yi, S., Li, C. and Li, Q., 2015, June. A survey of fog computing: concepts, applications and
issues. In Proceedings of the 2015 Workshop on Mobile Big Data (pp. 37-42). ACM.
Cloud computing have made an electronic system that introduces distinctive online
administrations to clients and associations everywhere throughout the word. Cloud computing is
conveyed engineering, which helps in bringing together server assets on versatile stage and give
on request registering assets. Cloud computing helps in giving sought after support of the clients.
The programmers get to databases in cloud situations with the assistance of hacking procedures
including session seizing and system channel spying. This report has depicted the security issues
in the fog computing in the privately owned businesses. Fog computing have been used in the
network architecture of an organization. However, cloud models are not designed on volume,
velocity and variety of data that is generated by the IoT. The fog computing helps in extending
the cloud computing to the IoT. The fog computing include several layers. The Software layer
gives interface to client to utilize administrations of Cloud computing. The stage helps in giving
stage and condition to executing programming by engineer (Coppolino et al., 2017). The
foundation layer helps in giving the equipment segments including system and capacity.
Subsequently, the programmers can assault at any of the three layers for getting to the
information and data of the organization over the cloud.
Stergiou, C., Psannis, K.E., Kim, B.G. and Gupta, B., 2018. Secure integration of IoT and cloud
computing. Future Generation Computer Systems, 78, pp.964-975.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT)
The capacity of the information a data at the remote area with the assistance of Cloud
computing May causes issues in the association. The area of the information and data is just
known by the information proprietor. Hence, without the information proprietor, information and
data cannot access by the association in crisis cases (Coughlin, Keller and Wustrow, 2017). In
this manner, risks to accessibility of the information and data is winning in the association with
utilization of Cloud computing. The integration of the cloud computing and IoT have been
helping in maintaining the security of the data and information collected from the IoT devices
from various sources. The use of the IoT devices in data collection have been great approach
for the researchers. The cloud computing have helped in storing the data and information over
the internet that helps in maintaining and securing data and information of the organization. The
Cloud computing is in charge of giving on request administrations to the clients. In this manner,
without the information proprietor, it can satisfy the prerequisite of the customers that disregards
the Service level Agreement for the Cloud computing.
Challenges
The ethics of the information and data is an imperative in keeping up the database of the
cloud. It is great process for capacity of information secure constant information stockpiling,
which can be, recover or recovered in same design, as it was put away later (Dang-Pham,
Pittayachawan and Bruno, 2017). Along these lines, trustworthiness and observing of the
information and data for limiting information defilement and information crash in the server. The
uprightness of the information and data is an imperative in keeping up the database of the cloud.
It is great process for capacity of information security determined information stockpiling, which
can be, recover or recovered in same format, as it was put away later (Dang-Pham,
Document Page
9
INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT)
Pittayachawan and Bruno, 2017). In this way, respectability and checking of the information and
data for limiting information debasement and information crash in the server.
Data Confidentiality issue
The protection of data and information is earnest segment in a business affiliation.
Protection implies the rules and bearings constrained by a relationship to limit the passageway of
various resources and assets of association (Dang-Pham, Pittayachawan, and Bruno, 2017). The
private information about the agents and clients are not bestowed to anyone that offers security
to the data and information. The mystery of the data and information in the affiliation might be
broken because of the advanced attacks over the web. The customers of the cloud organization
approach distinctive records of the customers. Along these lines, the data and information can be
revealed beginning with one record then onto the following record in the association (Aikat, et
al., 2017). The break in the security tradition of the association may reveal the private data md
information in the market.
Data Availability issue
Securing data and information in remote region to give high security may make
dissatisfaction in getting the data and information. For the circumstance, of cloud organizations
quit working as a result of a couple of reasons, the data and information cannot be gotten to from
the remote region. The proprietor of the data may get adversity in data bringing (Aljawarneh,
Alawneh, and Jaradat, Cloud security outlining, 2017). There are risks in the data availability
including data flooding attacks that causes block from asserting organizations in the association.
The Cloud computing gives on-ask for organizations to the business affiliation. In this way, if the
Document Page
10
INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT)
organization is not available in light of any mistake, the demand of the Cloud computing may
reduce. It might mishandle the Service Level Agreement (SLA) with the customers and business
relationship in the market (Duncan, Zhao, and Whittington, 2017).
Data Integrity Issue
The data dependability suggests the consistency and authenticity of the organizations
gave by the Cloud computing in the market. The usage of the Cloud computing in the business
affiliation has been extending in the market. Therefore, on account of some noteworthy hardware
issue, the organizations won't not be open in the market (Aljawarneh, Alawneh, and Jaradat,
Cloud security building, 2017). As needs be, the proprietor of the data and information can't get
to. The Cloud storage is responsible for securing the data and information of the relationship
over the web. In this way, there is a plausibility of data crack over the cloud that causes data loss
of the association in the market.
Data accessibility issue
The data accessibility issue in the model for securing the data and information of the
business relationship over the cloud. The Small associations can store their data and information
over the web using the Cloud storage show (Luna, Taha, Trapero, and Suri, 2017). Advanced
strikes are genuine risks for the association over the web. Various contaminations and malwares
attacks the server of the Small associations, as they have less secured security tradition. These
malwares enter the server of the association and break private information to the pariah.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11
INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT)
Security Solutions
Distinctive cases have given demand of security respond in due order regarding different
Cloud computing models. This report has proposed a model that may help in securing data an
information over the cloud.
Security organization, chance organization and consistence
The basic commitment of any business affiliation is to control and screen use process in
the association. The organization may compel a couple of courses of action and laws that
assistants in restricting the mishandle of the preparing resources in work environment. As
commented by (Mumme, Wallace, and McGraw, 2017), security structures help in fruitful risk
organization process in the business relationship to recognize distinctive perils for the
association. The peril organization helps in separating the recognized threats and treats in the
association. Distinctive frameworks and Policies are made to reduce these security threats and
risks in Small associations.
Auditing
Auditing inside a CC territory essentially suggests the course toward data respectability
uprightness of outsourced information and additional the client's figuring time and online weight
of extra managing. (Rewadkar and Ghatage , 2014). Proposed a security saving checking on
(TPA). TPA will attest the point of confinement rightness of the outsourced information
occasionally when the clients start an enthusiasm for confirmation. The objective of the TPA is
to lessen the greatness of clients by sparing their calculation assets while guaranteeing the
rightness of their informational index away in the cloud (Coppolino, D'Antonio, Mazzeo, and
Romano, 2017). The issue that could ascend by picking not to utilize TPA is that CSP's, for cash
Document Page
12
INTEGRATION OF CLOUD COMPUTING AND INTERNET OF THINGS (IOT)
related reasons, may destroy information that is not being utilized or they may cover the
information hardship occasions to deal with notoriety. Obviously, the clients have the alternative
of checking this information themselves, however these decisions are irrational or risks the
request of the information (Rewadkar and Ghatage , 2014). The proposed plan will play out the
investigating on the client's demand. This will be done by sending the check metadata from the
client to the server and the reaction will by then be insisted by the TPA. It besides combines an
asserted 'gathering evaluating', which will diminish the reaction time for overview demands
when sent by various clients (Rewadkar and Ghatage , 2014).
Techniques
Techniques are a great part of the time utilized as an approach to manage guarantee that
connection wide security targets are being dealt with a relative way completed the alliance.
While Policies disengaged cannot comprehend security issues, they are a major association
contraption. Appropriated enlisting is no extraordinary case to this (De Carvalho, de Castro
Andrade, de Castro, Coutinho, and Agoulmine, 2017). While affecting a system with respect to
flowed figuring to survey that the cloud ace group must consider the course of action. For
without question it may be savvier to build up a shared awareness of the strategy together with
the specialist group (Behl and Behl, 2012). This is fundamental in perspective of the way that the
CSP may have a few clients with various security needs and along these lines, it may be
incomprehensible for the CSP to plan that spreads all the security needs of the noteworthy
number of clients. Or on the other hand possibly it is more insightful to make approaches that
arrangement with single clients and their particular needs (Sabahi, 2011). At last an approach is
as they say sensible if the connection owning it dependably makes secure manages utilizing the
chevron_up_icon
1 out of 23
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]