Threats to Networking Cloud and Edge Datacenters in the Internet of Things

被引:109
作者
Puthal, Deepak [1 ]
Nepal, Surya [2 ]
Ranjan, Rajiv [3 ]
Chen, Jinjun [1 ]
机构
[1] Univ Technol Sydney, Sch Comp & Commun, Sydney, NSW 2007, Australia
[2] CSIRO Data 61, Eveleigh, NSW 2015, Australia
[3] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
来源
IEEE CLOUD COMPUTING | 2016年 / 3卷 / 03期
关键词
SECURITY;
D O I
10.1109/MCC.2016.63
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several application domains are collecting data using Internet of Things sensing devices and shipping it to remote cloud datacenters for analysis (fusion, storage, and processing). Data analytics activities raise a new set of technical challenges from the perspective of ensuring end-to-end security and privacy of data as it travels from an edge datacenter (EDC) to a cloud datacenter (CDC) (or vice versa). This article discusses the security threats in EDCs and CDCs by dividing the complete network structure into three layers: perception layer, network layer, and application layer. © 2014 IEEE.
引用
收藏
页码:64 / 71
页数:8
相关论文
共 19 条
[1]  
[Anonymous], COMPUTER APPL
[2]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[3]  
Cerf Vint, 2013, FED TRAD COMM INT TH
[4]  
Gartner Inc., 2015, GARTN 2015 HYP CYCL
[5]   Internet of Things (IoT): A vision, architectural elements, and future directions [J].
Gubbi, Jayavardhana ;
Buyya, Rajkumar ;
Marusic, Slaven ;
Palaniswami, Marimuthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1645-1660
[6]  
Hailong Feng, 2010, Proceedings 2010 International Conference on Web Information Systems and Mining (WISM 2010), P91, DOI 10.1109/WISM.2010.179
[7]  
Heinzelman W. R., 1999, MobiCom'99. Proceedings of Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, P174, DOI 10.1145/313451.313529
[8]  
Jara Antonio J., 2009, 2009 International Conference on Computational Science and Engineering (CSE), P879, DOI 10.1109/CSE.2009.126
[9]   Security of the Internet of Things: perspectives and challenges [J].
Jing, Qi ;
Vasilakos, Athanasios V. ;
Wan, Jiafu ;
Lu, Jingwei ;
Qiu, Dechao .
WIRELESS NETWORKS, 2014, 20 (08) :2481-2501
[10]  
Nat'l Inst, 2013, 130208119311901 NIST