Security Assertion of IoT Devices Using Cloud of Things Perception

Security Assertion of IoT Devices Using Cloud of Things Perception

Mamata Rath (Birla School of Management (IT), Birla Global University, Gothapatna, India) and Bibudhendu Pati (Department of Computer Science, Rama Devi Women's University, Bhubaneswar, India)
DOI: 10.4018/IJITN.2019100102
OnDemand PDF Download:
No Current Special Offers


Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current developing technology era are expected to be more and more invasive, making them important mechanism of the future Internet-based communication systems. Cloud of Things and Internet of Things (IoT) are two emerging as well as diversified advanced domains that are diversified in current technological scenario. Paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios. Due to the adoption of the Cloud and IoT paradigm a number of applications are gaining important technical attention. In the future, it is going to be more complicated a setup to handle security in technology. Information till now will severely get changed and it will be very tough to keep up with varying technology. Organisations will have to repeatedly switch over to new skill-based technology with respect to higher expenditure. Latest tools, methods and enough expertise are highly essential to control threats and vulnerability to computing systems. Keeping in view the integration of Cloud computing and IoT in the new domain of Cloud of things, the said article provides an up-to-date eminence of Cloud-based IoT applications and Cloud of Things with a focus on their security and application-oriented challenges. These challenges are then synthesized in detail to present a technical survey on various issues related to IoT security, concerns, adopted mechanisms and their positive security assurance using Cloud of Things.
Article Preview

1. Introduction

Internet of Things can be distinctly described as a networked communication of devices in a wireless medium which are always available to be used anywhere as per the concept of ubiquitous computing paradigm (Mahmoud et al., 2018). These intelligent devices are capable of processing bulk data with short period of time as well as distribute required services. Similarly, Cloud Computing is another computational technical domain which gives a novel plan of action to organizations/associations to embrace IT without vast venture (Callegati, Giallorenzo, Melis & Prandini, 2018).

Cloud computing is a model for empowering omnipresent, advantageous, on-request access to a mutual pool of configurable computing resources (Sahmim & Gharsellaoui, 2017). Cloud computing and capacity arrangements furnish clients and endeavors with different abilities to store and process their information in outsider information centers (Sahmim & Gharsellaoui, 2017). It depends on sharing of resources to accomplish intelligence and economies of scale, like a utility (like the power matrix) over a network (Sun et al., 2018) At the establishment of cloud computing is the more extensive idea of united framework and shared administrations.

Cloud computing, or in simple words “the cloud”, additionally centers around boosting the viability of the common resources. Cloud resources are typically shared by different clients as well as powerfully reallocated per request (Wu, Chen, Choo & Debiao, 2017). This can work for allocating resources to clients. For instance, a cloud PC office that serves European clients amid European business hours with a particular application (e.g., email) may reallocate similar resources to serve North American clients amid North America's business hours with an alternate application (e.g., a web server). This approach amplifies the utilization of computing power while decreasing the general cost of resources by utilizing less power, cooling, rack space, and so forth to keep up the framework. With cloud computing, numerous clients can get to a solitary server to recover and refresh their information without obtaining licenses for various applications (Farahzadi, Shams, Rezazadeh, & Farahbakhsh, 2017).

1.1. Infrastructure-as-a-Service (IAAS)

The Infrastructure as a Service is a stipulation model in which an organization outsources the apparatus used to support operations, as well as storage, hardware, servers and networking mechanism. The service supplier owns the equipment and is responsible for housing, running and maintain it. The client typically pays on a per-use basis (Choo, Bishop, Glisson & Nance, 2018). Characteristics and components of IAAS include:

  • 1.

    Utility computing service and billing model

  • 2.

    Automation of administrative tasks

  • 3.

    Dynamic scaling

  • 4.

    Desktop virtualization

  • 5.

    Policy-based services

  • 6.

    Internet connective

Infrastructure-as-a-Service (IAAS) like Amazon Web Services provides virtual server instances with unique IP addresses and blocks of storage on demand. Customers use the provider's application program interface (API) to start, stop, access and configure their virtual servers and storage (Nan et. al., 2018).

Complete Article List

Search this Journal:
Open Access Articles
Volume 14: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing