Skip to main content
Erschienen in: Wireless Personal Communications 2/2020

04.04.2020

Cloud Integrated IoT Enabled Sensor Network Security: Research Issues and Solutions

verfasst von: R. Geetha, A. K. Suntheya, G. Umarani Srikanth

Erschienen in: Wireless Personal Communications | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security of cloud computing and Internet of things (IoT) enabled sensor networks are two significant areas of research that have a great impact in developing numerous societal applications such as smart healthcare, smart city, smart agriculture etc. in a secure manner. The devices involved in these technologies are exposed to vulnerabilities since they are distributed in nature and moreover they try to fetch real-time information and forward it to cloud for processing. Cloud computing offers a platform for storing and processing the data sensed and sent by the sensor devices. In the previous literature, many researchers have studied the security issues and challenges of IoT and Cloud separately. Still, there is a gap in the literature and it is required to explore the integrated security issues in the Cloud integrated IoT environment. Analyzing the integrated security issues of the existing technologies is of much importance and novel idea for their successful implementation. In this paper we focused on exploring the vulnerabilities of the integrated environment. In addition, we had presented the security issues and challenges in the cloud and IoT enabled sensor environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
13.
Zurück zum Zitat Di Martino, B., Pascarella, J., Nacchia, S., Maisto, S. A., Iannucci, P., & Cerri, F. (2018). Cloud services categories identification from requirements specifications. In 32nd international conference on advanced information networking and applications workshops (WAINA), Krakow (pp. 436–441). https://doi.org/10.1109/WAINA.2018.00125. Di Martino, B., Pascarella, J., Nacchia, S., Maisto, S. A., Iannucci, P., & Cerri, F. (2018). Cloud services categories identification from requirements specifications. In 32nd international conference on advanced information networking and applications workshops (WAINA), Krakow (pp. 436–441). https://​doi.​org/​10.​1109/​WAINA.​2018.​00125.
15.
Zurück zum Zitat Evans, K., Jones, A., Preece, A., Quevedo, F., Rogers, D., Spasić, I., Taylor, I., Stankovski, V. Taherizadeh, S., Trnkoczy, J., Suciu, G., Suciu, V., Martin, P. N., Wang, J., & Zhao, Z. (2015). Dynamically reconfigurable workflows for time-critical applications. In WORKS '15: proceedings of the 10th workshop on workflows in support of large-scale science (pp. 1–10). https://doi.org/10.1145/2822332.2822339. Evans, K., Jones, A., Preece, A., Quevedo, F., Rogers, D., Spasić, I., Taylor, I., Stankovski, V. Taherizadeh, S., Trnkoczy, J., Suciu, G., Suciu, V., Martin, P. N., Wang, J., & Zhao, Z. (2015). Dynamically reconfigurable workflows for time-critical applications. In WORKS '15: proceedings of the 10th workshop on workflows in support of large-scale science (pp. 1–10). https://​doi.​org/​10.​1145/​2822332.​2822339.
29.
30.
Zurück zum Zitat Singh, R., et al. (2016). Attacks on wireless sensor network: A survey. International Journal of Computer Science and Mobile Computing,5(5), 10–16. Singh, R., et al. (2016). Attacks on wireless sensor network: A survey. International Journal of Computer Science and Mobile Computing,5(5), 10–16.
32.
Zurück zum Zitat Gaware, A., & Dhonde, S. B. (2016). A survey on security attacks in wireless sensor networks. In 3rd international conference on computing for sustainable global development (INDIACom), New Delhi (pp. 536–539). Gaware, A., & Dhonde, S. B. (2016). A survey on security attacks in wireless sensor networks. In 3rd international conference on computing for sustainable global development (INDIACom), New Delhi (pp. 536–539).
46.
Zurück zum Zitat Juliadotter, N. V., & Choo, K. K. R. (2015). Cloud attack and risk assessment taxonomy. IEEE Cloud Computing Society,2, 14–20.CrossRef Juliadotter, N. V., & Choo, K. K. R. (2015). Cloud attack and risk assessment taxonomy. IEEE Cloud Computing Society,2, 14–20.CrossRef
47.
Zurück zum Zitat Shaik, A. A., & Mandal, M. M. (2016). Attacks on cloud computing and its countermeasures. In International conference on signal processing, communication, power and embedded system (SCOPES). Shaik, A. A., & Mandal, M. M. (2016). Attacks on cloud computing and its countermeasures. In International conference on signal processing, communication, power and embedded system (SCOPES).
48.
Zurück zum Zitat Vacca, J. R. (2013). Computer and information security handbook (2nd ed.). Amsterdam: Elsevier. Vacca, J. R. (2013). Computer and information security handbook (2nd ed.). Amsterdam: Elsevier.
52.
Zurück zum Zitat Khail, N., Abid, M. R., Benhaddu, D., & Gerndt, M. (2014). Wireless sensors networks for internet of things (pp. 21–24). Singapore: ISSNIP. Khail, N., Abid, M. R., Benhaddu, D., & Gerndt, M. (2014). Wireless sensors networks for internet of things (pp. 21–24). Singapore: ISSNIP.
58.
Zurück zum Zitat Smith, R. E. (2016). Elementary information security (2nd ed.). Burlington: Jones and Bartlett Learning. Smith, R. E. (2016). Elementary information security (2nd ed.). Burlington: Jones and Bartlett Learning.
Metadaten
Titel
Cloud Integrated IoT Enabled Sensor Network Security: Research Issues and Solutions
verfasst von
R. Geetha
A. K. Suntheya
G. Umarani Srikanth
Publikationsdatum
04.04.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07251-z

Weitere Artikel der Ausgabe 2/2020

Wireless Personal Communications 2/2020 Zur Ausgabe

Neuer Inhalt