IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Best Practices: Adopting Security Into the Cloud-Based Internet of Things

Best Practices: Adopting Security Into the Cloud-Based Internet of Things
View Sample PDF
Author(s): Anchitaalagammai J. V. (Velammal College of Engineering and Technology, India), Kavitha S. (Velammal College of Engineering and Technology, India), Murali S. (Velammal College of Engineering and Technology, India), Padmadevi S. (Velammal College of Engineering and Technology, India)and Shanthalakshmi Revathy J. (Velammal College of Engineering and Technology, India)
Copyright: 2021
Pages: 14
Source title: Challenges and Opportunities for the Convergence of IoT, Big Data, and Cloud Computing
Source Author(s)/Editor(s): Sathiyamoorthi Velayutham (Sona College of Technology, India)
DOI: 10.4018/978-1-7998-3111-2.ch006

Purchase

View Best Practices: Adopting Security Into the Cloud-Based Internet of Things on the publisher's website for pricing and purchasing information.

Abstract

The internet of things (IoT) is rapidly changing our society to a world where every “thing” is connected to the internet, making computing pervasive like never before. It is increasingly becoming a ubiquitous computing service, requiring huge volumes of data storage and processing. Unfortunately, due to the lack of resource constraints, it tends to adopt a cloud-based architecture to store the voluminous data generated from IoT application. From a security perspective, the technological revolution introduced by IoT and cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. This chapter focus on security considerations for IoT from the perspectives of cloud tenants, end-users, and cloud providers in the context of wide-scale IoT proliferation, working across the range of IoT technologies. Also, this chapter includes how the organization can store the IoT data on the cloud securely by applying different Access control policies and the cryptography techniques.

Related Content

Dina Darwish. © 2024. 43 pages.
Kassim Kalinaki, Musau Abdullatif, Sempala Abdul-Karim Nasser, Ronald Nsubuga, Julius Kugonza. © 2024. 23 pages.
Yogita Yashveer Raghav, Ramesh Kait. © 2024. 17 pages.
Renuka Devi Saravanan, Shyamala Loganathan, Saraswathi Shunmuganathan. © 2024. 21 pages.
Veera Talukdar, Ardhariksa Zukhruf Kurniullah, Palak Keshwani, Huma Khan, Sabyasachi Pramanik, Ankur Gupta, Digvijay Pandey. © 2024. 30 pages.
Dharmesh Dhabliya, Sukhvinder Singh Dari, Nitin N. Sakhare, Anish Kumar Dhablia, Digvijay Pandey, Balakumar Muniandi, A. Shaji George, A. Shahul Hameed, Pankaj Dadheech. © 2024. 9 pages.
Avtar Singh, Shobhana Kashyap. © 2024. 11 pages.
Body Bottom