A cloud based conceptual identity management model for secured Internet of Things operation

被引:0
作者
Bello A. [1 ]
Mahadevan V. [2 ]
机构
[1] Western Sydney University, Penrith, 2751, NSW
[2] Melbourne Institute of Technology, Melbourne, 3000, VIC
来源
Journal of Cyber Security and Mobility | 2019年 / 8卷 / 01期
关键词
Cloud IoT; Identity Management; Identity of Things; Internet of Things; IoT Security;
D O I
10.13052/jcsm2245-1439.813
中图分类号
学科分类号
摘要
An era ago, projecting artificial intelligence as the pillar of next-generation technology would have been technically difficult. Today, machines are getting smarter, sparking a new wave of technology that resulted to Internet of Things (IoT). With IoT in play, individuals are able to connect more electronic devices other than smartphones and computers to the Internet. The vision is to create the possibility to manage electronic appliances via the Internet with the most minimal human intervention. IoT promises the application of computing to anything anywhere, and anyone at any time. Thus, it has been estimated that over 100 billion devices will be running the IoT model - drawing the power of cloud processing to create a massive network of devices that are bound to change the essential facets of life in various dimensions. However, several obstacles remain to fulfill this vision, among them is security concerns from an Identity of Things (IDoT) management perspective. IoT devices and users are already under cyber attacks, and any lapse in identity management will propagate these attacks. This paper examined how identity management for IoT is likely to play out in a world where the Internet and cloud technologies are expected to take center stage in the running of day-to-day activities. The paper analyses the identity of things challenges in IoT, followed by a proposal of cloud identity management model for IoT. © 2018 the Author(s).
引用
收藏
页码:53 / 74
页数:21
相关论文
共 62 条
[61]  
Celesti A., Tusa F., Villari M., Puliafito A., Security and cloud computing: Intercloud identity management infrastructure, 2010 19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), pp. 263-265, (2010)
[62]  
Naik N., Jenkins P., Asecure mobile cloud identity: Criteria for effective identity and access management standards, In 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 89-90, (2016)