MITS4004 Assignment 1: Secure Integration of IoT and Cloud Computing
VerifiedAdded on  2022/07/28
|8
|1688
|28
Report
AI Summary
This report is an article review focusing on the secure integration of IoT and cloud computing. It begins with an introduction to the technologies, highlighting the importance of cloud computing in handling the increasing data generated by IoT devices. The critique section analyzes the benefits of cloud storage, such as cost-effectiveness and efficient data management, and discusses the role of the IoT agent platform in separating IoT functions from physical devices. The review explores the concepts of IoT security, cloud security, and mobile cloud computing, emphasizing the need for secure data transmission and the advantages of the IoT agent platform model. The conclusion summarizes the key points, stressing the significance of the IoT agent platform in ensuring secure data exchange within the cloud storage environment. The report also references the original research article that is the subject of the review.

Running head: SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
Name of student
Name of university
Author’s note:
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
Name of student
Name of university
Author’s note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
Table of Contents
Introduction....................................................................................................................2
Critique...........................................................................................................................2
Conclusion......................................................................................................................6
References......................................................................................................................7
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
Table of Contents
Introduction....................................................................................................................2
Critique...........................................................................................................................2
Conclusion......................................................................................................................6
References......................................................................................................................7

2
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
Introduction
The incorporation of the cloud computing technology with IoT could be considered to
be the major development in the sector of the cloud computing. This particular technology
denotes to the infrastructure somewhere both the data storage as well as the data processing
operates separate of any particular mobile device. One more popular technology has been
found to be the Internet of Things. The Internet of Things could be considered to be the
innovative technology. The most popular technology that is used presently for safeguarding
the platform of IoT as well as the cloud computing is the mechanism of IoT agent platform
for separating the functions of IoT from any particular physical devices as well as for
executing remote IoT functions on the cloud environment.
Critique
It has been mentioned in this article that the hypothesis of the Internet of Things could
be considered as the objects or the things that interacts and then exchanges the increasingly
large scale information. The organisations are presently sing the IoT devices for collecting
the real time and the constant data and help in making the improved business decisions for
increasing the customer satisfaction. The operation has the requirement of storing the data
generated from Internet of Things and this particular data is presently observed to be growing
exponentially and it forces the consideration of the cloud storage for the storage of various
IoT data.
It has been argued by the researchers that the cloud storage is being considered to be
the most effective storage space where the data generated from the IoT devices could be
stored. It has been argued in this article that the storage of the data in the cloud is
significantly cost effective than storage of data in the on-premise data storages. Initially, it
could be considered that direct connection is offered among the various devices as well as the
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
Introduction
The incorporation of the cloud computing technology with IoT could be considered to
be the major development in the sector of the cloud computing. This particular technology
denotes to the infrastructure somewhere both the data storage as well as the data processing
operates separate of any particular mobile device. One more popular technology has been
found to be the Internet of Things. The Internet of Things could be considered to be the
innovative technology. The most popular technology that is used presently for safeguarding
the platform of IoT as well as the cloud computing is the mechanism of IoT agent platform
for separating the functions of IoT from any particular physical devices as well as for
executing remote IoT functions on the cloud environment.
Critique
It has been mentioned in this article that the hypothesis of the Internet of Things could
be considered as the objects or the things that interacts and then exchanges the increasingly
large scale information. The organisations are presently sing the IoT devices for collecting
the real time and the constant data and help in making the improved business decisions for
increasing the customer satisfaction. The operation has the requirement of storing the data
generated from Internet of Things and this particular data is presently observed to be growing
exponentially and it forces the consideration of the cloud storage for the storage of various
IoT data.
It has been argued by the researchers that the cloud storage is being considered to be
the most effective storage space where the data generated from the IoT devices could be
stored. It has been argued in this article that the storage of the data in the cloud is
significantly cost effective than storage of data in the on-premise data storages. Initially, it
could be considered that direct connection is offered among the various devices as well as the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
cloud service provider (Stergiou et al. 2018). This particular direct link permits the storage of
the data significantly faster and therefore it requires the reduced storage and the lower cost
per device. Secondly, it has been argued that the data management as well as the storage
management is the issue of the cloud service provider and therefore the organisation are
required to exploit the service solely and nothing else. The cloud grown to be the absolute
storage location for the storage as well as the processing of the IoT data but there are some
issues associated with the cloud storage and the data of the IoT devices.
The main objective of this article is bridging the basic gap among the physical devices
as well as the embedded software of IoT. This particular issue has been resolved in this
article along with the difficulty in the IoT security in the implementation of both the device
functions as well as the IoT functions on any similar physical device. It has been argued in
this article that the IoT security has been considered as the sector of the protection of data
with the connected devices as well as the network linked in the Internet of Things (Stergiou et
al. 2018). The Internet of Things includes the swift acknowledge of the entities as well as the
objects offered with the distinctive identifiers as well as ability of the repeatedly transferring
the data over any particular network. The significant escalation in the IoT communication
initiates from the computing equipment as well as the embedded sensor systems that are
being used in the machine to machine communications in the industrial sector, the smart
energy grids, the vehicle to vehicle communication as well as the adjustable computing
devices.
It has also been argued that the cloud computing provides the computation, the
services, the storage as well as the application over internet. Commonly for restoring the
energy of the smartphones efficient and the computationally efficient, the major revolution to
hardware as well as the software ranges are needed. This particular aspect linked with the
cooperation of the manufacturers and the developers (Stergiou et al. 2018). The mobile
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
cloud service provider (Stergiou et al. 2018). This particular direct link permits the storage of
the data significantly faster and therefore it requires the reduced storage and the lower cost
per device. Secondly, it has been argued that the data management as well as the storage
management is the issue of the cloud service provider and therefore the organisation are
required to exploit the service solely and nothing else. The cloud grown to be the absolute
storage location for the storage as well as the processing of the IoT data but there are some
issues associated with the cloud storage and the data of the IoT devices.
The main objective of this article is bridging the basic gap among the physical devices
as well as the embedded software of IoT. This particular issue has been resolved in this
article along with the difficulty in the IoT security in the implementation of both the device
functions as well as the IoT functions on any similar physical device. It has been argued in
this article that the IoT security has been considered as the sector of the protection of data
with the connected devices as well as the network linked in the Internet of Things (Stergiou et
al. 2018). The Internet of Things includes the swift acknowledge of the entities as well as the
objects offered with the distinctive identifiers as well as ability of the repeatedly transferring
the data over any particular network. The significant escalation in the IoT communication
initiates from the computing equipment as well as the embedded sensor systems that are
being used in the machine to machine communications in the industrial sector, the smart
energy grids, the vehicle to vehicle communication as well as the adjustable computing
devices.
It has also been argued that the cloud computing provides the computation, the
services, the storage as well as the application over internet. Commonly for restoring the
energy of the smartphones efficient and the computationally efficient, the major revolution to
hardware as well as the software ranges are needed. This particular aspect linked with the
cooperation of the manufacturers and the developers (Stergiou et al. 2018). The mobile
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
computing in the cloud environment has been well defined as the combination of technology
of the cloud computing devices for sorting the mobile devices reserve complete in the terms
of the computation power, the memory, the energy, the storage, as well as the context
consciousness. The popular technology of the mobile cloud computing has been considered
to the effective consequence of the process for the combination of the mobile computing with
the cloud computing. Therefore this particular disciplinary domain has also been denoted as
the mobile cloud computing. The presently developing cloud computing technology has
various features that concludes to the various functions. And these characteristics are the
storage through internet, the service through internet, the applications through internet,
energy efficient plus the ability of executing the computations.
It has been considered in this article that the cloud security is the advanced sub-
domain of the computer security, the network security and vastly the aspect of the
information security. It effectively allocates the vast set of the various policies, the
technologies as well as the controls that are deployed for securing the data, the applications,
as well as any kind of associated infrastructure of the cloud computing (Stergiou et al. 2018).
The storage solutions and the cloud computing provides the users as well as the enterprises
with the various potentiality of storing as well as processing the data in any particular data
centers of the third party. The organisations are presently using the cloud storage for variety
of the several service models and the deployment models. There are various safeguarding
aspects that are associated with the cloud computing. These kinds of the consequences mainly
falls into the two vast ranging categories, which are the security concerns that are faced by
the cloud providers and the security outcomes that are presently being faced by the
customers.
The article claims that the cloud computing is able to developed its significant
presence in the recent years along with the main intention of offering the most appropriate
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
computing in the cloud environment has been well defined as the combination of technology
of the cloud computing devices for sorting the mobile devices reserve complete in the terms
of the computation power, the memory, the energy, the storage, as well as the context
consciousness. The popular technology of the mobile cloud computing has been considered
to the effective consequence of the process for the combination of the mobile computing with
the cloud computing. Therefore this particular disciplinary domain has also been denoted as
the mobile cloud computing. The presently developing cloud computing technology has
various features that concludes to the various functions. And these characteristics are the
storage through internet, the service through internet, the applications through internet,
energy efficient plus the ability of executing the computations.
It has been considered in this article that the cloud security is the advanced sub-
domain of the computer security, the network security and vastly the aspect of the
information security. It effectively allocates the vast set of the various policies, the
technologies as well as the controls that are deployed for securing the data, the applications,
as well as any kind of associated infrastructure of the cloud computing (Stergiou et al. 2018).
The storage solutions and the cloud computing provides the users as well as the enterprises
with the various potentiality of storing as well as processing the data in any particular data
centers of the third party. The organisations are presently using the cloud storage for variety
of the several service models and the deployment models. There are various safeguarding
aspects that are associated with the cloud computing. These kinds of the consequences mainly
falls into the two vast ranging categories, which are the security concerns that are faced by
the cloud providers and the security outcomes that are presently being faced by the
customers.
The article claims that the cloud computing is able to developed its significant
presence in the recent years along with the main intention of offering the most appropriate

5
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
approach to information as well as the data from particular place at any particular time, and
therefore limiting or even eradicating the requirement of any kind of hardware tools. The
cloud computation term has been defined as the utilisation of the computing of the logistical
assets and the software level using the proper use fo the services that are being transferred
over internet.
This article suggests the IoT Agent Platform placed on the cloud environment where
the virtual clones would be present for the physical devices where the separation of the IoT
functions is done from the physical devices and then executed the solitary IoT functions on
the cloud environment. For effectively executing this particular objective, the hypothesis that
has been presented in this article for the communication model of the IoT devices (Stergiou et
al. 2018). The prevailing IoT devices are the physical devices combined with the embedded
software of IoT. Therefore the IoT devices have the both the device functions as well as the
IoT functions in the similar physical devices as well as the communicate with the IoT service
systems or the users. The IoT service systems mainly executes on the cloud for providing the
IoT application services. The users are provided with the functionality of synchronising and
then communicating with the various IoT devices.
The main aspect where the researchers have placed their emphasis is the benefits of
the IoT agent platform. It has been argued in this article that within the model of the IoT
Agent Platform, any particular third party operator has been assumed who would help in
delivering the cloud service as well as monitor or even sustain the IoT software for the virtual
clones. The model helps with the separation of the IoT functions from the physical devices
along with the operations and the management roles from the vendors of the device. This
particular separation of the device functions as well as the IoT functions have various benefits
such as the separated scope, the separated identification, the separated lifecycle, the separated
monitoring and the separated consciousness.
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
approach to information as well as the data from particular place at any particular time, and
therefore limiting or even eradicating the requirement of any kind of hardware tools. The
cloud computation term has been defined as the utilisation of the computing of the logistical
assets and the software level using the proper use fo the services that are being transferred
over internet.
This article suggests the IoT Agent Platform placed on the cloud environment where
the virtual clones would be present for the physical devices where the separation of the IoT
functions is done from the physical devices and then executed the solitary IoT functions on
the cloud environment. For effectively executing this particular objective, the hypothesis that
has been presented in this article for the communication model of the IoT devices (Stergiou et
al. 2018). The prevailing IoT devices are the physical devices combined with the embedded
software of IoT. Therefore the IoT devices have the both the device functions as well as the
IoT functions in the similar physical devices as well as the communicate with the IoT service
systems or the users. The IoT service systems mainly executes on the cloud for providing the
IoT application services. The users are provided with the functionality of synchronising and
then communicating with the various IoT devices.
The main aspect where the researchers have placed their emphasis is the benefits of
the IoT agent platform. It has been argued in this article that within the model of the IoT
Agent Platform, any particular third party operator has been assumed who would help in
delivering the cloud service as well as monitor or even sustain the IoT software for the virtual
clones. The model helps with the separation of the IoT functions from the physical devices
along with the operations and the management roles from the vendors of the device. This
particular separation of the device functions as well as the IoT functions have various benefits
such as the separated scope, the separated identification, the separated lifecycle, the separated
monitoring and the separated consciousness.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
Conclusion
Therefore, it could be concluded from the above discussion that the integration of the
IoT agent platform in the cloud storage of the service providers would be significantly
beneficial for ensuring the data transmission among the various IoT devices is executed in the
secured environment. Internet of Things could be considered as the objects or the things that
interacts and then exchanges the increasingly large scale information. cloud storage is being
considered to be the most effective storage space where the data generated from the IoT
devices could be stored. Cloud computing provides the computation, the services, the storage
as well as the application over internet. It has been argued in this article that the storage of the
data in the cloud is significantly cost effective than storage of data in the on-premise data
storages. IoT security has been considered as the sector of the protection of data with the
connected devices as well as the network linked in the Internet of Things.
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
Conclusion
Therefore, it could be concluded from the above discussion that the integration of the
IoT agent platform in the cloud storage of the service providers would be significantly
beneficial for ensuring the data transmission among the various IoT devices is executed in the
secured environment. Internet of Things could be considered as the objects or the things that
interacts and then exchanges the increasingly large scale information. cloud storage is being
considered to be the most effective storage space where the data generated from the IoT
devices could be stored. Cloud computing provides the computation, the services, the storage
as well as the application over internet. It has been argued in this article that the storage of the
data in the cloud is significantly cost effective than storage of data in the on-premise data
storages. IoT security has been considered as the sector of the protection of data with the
connected devices as well as the network linked in the Internet of Things.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
References
Stergiou, C., Psannis, K.E., Kim, B.G. and Gupta, B., 2018. Secure integration of IoT and
cloud computing. Future Generation Computer Systems, 78, pp.964-975.
SECURE INTEGRATION OF IOT AND CLOUD COMPUTING
References
Stergiou, C., Psannis, K.E., Kim, B.G. and Gupta, B., 2018. Secure integration of IoT and
cloud computing. Future Generation Computer Systems, 78, pp.964-975.
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.