Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges

被引:28
作者
Ari, Ado Adamou Abba [1 ,2 ]
Ngangmo, Olga Kengni [2 ]
Titouna, Chafiq [3 ]
Thiare, Ousmane [4 ]
Kolyang [2 ]
Mohamadou, Alidou [2 ]
Gueroui, Abdelhak Mourad [1 ]
机构
[1] Univ Versailles St Quentin En Yvelines, Univ Paris Saclay, LI PaRAD Lab, Paris, France
[2] Univ Maroua, LaRI Lab, Maroua, Cameroon
[3] Univ Paris 05, LIPADE Lab, Paris, France
[4] Gaston Berger Univ St Louis, Dept Comp Sci, St Louis, Senegal
关键词
Cloud of Things; Cloud Computing; Internet of Things; Privacy; Security; BIG DATA; MANAGEMENT-SYSTEM; INTERNET; ISSUES; IOT; TECHNOLOGIES; INTEGRATION; NETWORKS; SERVICES; TRUST;
D O I
10.1016/j.aci.2019.11.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.
引用
收藏
页码:119 / 141
页数:23
相关论文
共 94 条
[1]  
Aazam M, 2014, INT BHURBAN C APPL S, P414, DOI 10.1109/IBCAST.2014.6778179
[2]   Security in Internet of Things: issues, challenges, taxonomy, and architecture [J].
Adat, Vipindev ;
Gupta, B. B. .
TELECOMMUNICATION SYSTEMS, 2018, 67 (03) :423-441
[3]   On Enabling 5G Automotive Systems Using Follow Me Edge-Cloud Concept [J].
Aissioui, Abdelkader ;
Ksentini, Adlen ;
Gueroui, Abdelhak Mourad ;
Taleb, Tarik .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (06) :5302-5316
[4]   Secure and dependable software defined networks [J].
Akhunzada, Adnan ;
Gani, Abdullah ;
Anuar, Nor Badrul ;
Abdelaziz, Ahmed ;
Khan, Muhammad Khurram ;
Hayat, Amir ;
Khan, Samee U. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :199-221
[5]   A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges [J].
Akpakwu, Godfrey Anuga ;
Silva, Bruno J. ;
Hancke, Gerhard P. ;
Abu-MAhfouz, Adnan M. .
IEEE ACCESS, 2018, 6 :3619-3647
[6]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[7]  
Alohali Bashar, 2014, 2014 6th Computer Science and Electronic Engineering Conference (CEEC). Proceedings, P115, DOI 10.1109/CEEC.2014.6958565
[8]  
Alohali B., 2019, Cloud Security: Concepts, Methodologies, Tools, and Applications, P1188
[9]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[10]  
[Anonymous], 2012, Proceedings of the 21st international conference companion on World Wide Web