A cloud based conceptual identity management model for secured Internet of Things operation

被引:0
作者
Bello A. [1 ]
Mahadevan V. [2 ]
机构
[1] Western Sydney University, Penrith, 2751, NSW
[2] Melbourne Institute of Technology, Melbourne, 3000, VIC
来源
Journal of Cyber Security and Mobility | 2019年 / 8卷 / 01期
关键词
Cloud IoT; Identity Management; Identity of Things; Internet of Things; IoT Security;
D O I
10.13052/jcsm2245-1439.813
中图分类号
学科分类号
摘要
An era ago, projecting artificial intelligence as the pillar of next-generation technology would have been technically difficult. Today, machines are getting smarter, sparking a new wave of technology that resulted to Internet of Things (IoT). With IoT in play, individuals are able to connect more electronic devices other than smartphones and computers to the Internet. The vision is to create the possibility to manage electronic appliances via the Internet with the most minimal human intervention. IoT promises the application of computing to anything anywhere, and anyone at any time. Thus, it has been estimated that over 100 billion devices will be running the IoT model - drawing the power of cloud processing to create a massive network of devices that are bound to change the essential facets of life in various dimensions. However, several obstacles remain to fulfill this vision, among them is security concerns from an Identity of Things (IDoT) management perspective. IoT devices and users are already under cyber attacks, and any lapse in identity management will propagate these attacks. This paper examined how identity management for IoT is likely to play out in a world where the Internet and cloud technologies are expected to take center stage in the running of day-to-day activities. The paper analyses the identity of things challenges in IoT, followed by a proposal of cloud identity management model for IoT. © 2018 the Author(s).
引用
收藏
页码:53 / 74
页数:21
相关论文
共 62 条
[41]  
Ding D., Li M., Zhu Z., Object Naming Service Supporting Heterogeneous Object Code Identification for IoT System, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), pp. 545-554, (2018)
[42]  
Zhang H., Zhu L., Internet of Things: Key technology, architecture and challenging problems, In 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE). IEEE, 4, pp. 507-512, (2011)
[43]  
Khoo B., RFID as an Enabler of the Internet of Things: Issues of Security and Privacy, Internet of Things (iThings/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing, pp. 709-712, (2011)
[44]  
Liu C.H., Yang B., Liu T., Efficient naming, addressing and profile services in Internet-of-Things sensory environments, Ad Hoc Networks, 18, pp. 85-101, (2014)
[45]  
Roman R., Najera P., Lopez J., Securing the internet of things, Computer, 44, 9, pp. 51-58, (2011)
[46]  
Lopez T.S., Brintrup A., Isenberg M.A., Mansfeld J., Resource management in the Internet of Things: Clustering, synchronisation and software agents, Architecting the Internet of Things, pp. 159-193, (2011)
[47]  
Hong S., Kim D., Ha M., Bae S., Park S.J., Jung W., Kim J.E., SNAIL: an IP-based wireless sensor network approach to the internet of things, IEEE Wireless Communications, 17, 6, (2010)
[48]  
Lee J.J., Hong Y.S., Lee K.Y., An authentication scheme based on elliptic curve cryptosystem and openID in the internet of things, Proceedings of the International Conference on Security and Management (SAM), (2015)
[49]  
Mahalle P.N., Railkar P.N., Identity management for internet of things, (2015)
[50]  
Beltran M., Identifying, authenticating and authorizing smart objects and end users to cloud services in Internet of Things, (2018)