IoT and Big Data: An Architecture with Data Flow and Security Issues

被引:10
|
作者
Puthal, Deepak [1 ]
Ranjan, Rajiv [2 ]
Nepal, Surya [3 ]
Chen, Jinjun [4 ]
机构
[1] Univ Technol Sydney, Sch Comp & Commun, Ultimo, Australia
[2] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne, Tyne & Wear, England
[3] CSIRO Data61, Canberra, ACT, Australia
[4] Swinburne Univ Technol, Swinburne Data Sci Res Inst, Melbourne, Vic, Australia
来源
CLOUD INFRASTRUCTURES, SERVICES, AND IOT SYSTEMS FOR SMART CITIES | 2018年 / 189卷
关键词
Internet of Things; Big data; Security; Security threats; Quality of Service; INTERNET; THINGS;
D O I
10.1007/978-3-319-67636-4_25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) introduces a future vision where users, computer, computing devices and daily objects possessing sensing and actuating capabilities cooperate with unprecedented convenience and benefits. We are moving towards IoT trend, where the number of smart sensing devices deployed around the world is growing at a rapid speed. With considering the number of sources and types of data from smart sources, the sensed data tends to new trend of research i.e. big data. Security will be a fundamental enabling factor of most IoT applications and big data, mechanisms must also be designed to protect communications enabled by such technologies. This paper analyses existing protocols and mechanisms to secure the IoT and big data, as well as security threats in the domain. We have broadly divided the IoT architecture into several layers to define properties, security issues and related works to solve the security concerns.
引用
收藏
页码:243 / 252
页数:10
相关论文
共 50 条
  • [21] Managing Heterogeneous Sensor Data on a Big Data Platform: IoT Services for Data-intensive Science
    Sowe, Sulayman K.
    Kimata, Takashi
    Dong, Mianxiong
    Zettsu, Koji
    2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 295 - 300
  • [22] Research on Data Sharing Architecture for Ecological Monitoring Using Iot Streaming Data
    Wu, Adan
    Guo, Jianwen
    Yang, Pengfei
    IEEE ACCESS, 2020, 8 : 195385 - 195397
  • [23] Data Conformity Evaluation: A Novel Approach for IoT Security
    Verzegnassi, Enrico Giulio Maria
    Tountas, Konstantinos
    Pados, Dimitris A.
    Cuomo, Francesca
    2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2019, : 842 - 846
  • [24] Big Data: Hadoop framework vulnerabilities, security issues and attacks
    Bhathal, Gurjit Singh
    Singh, Amardeep
    ARRAY, 2019, 1-2
  • [25] Big Data Analytics Architecture for Security Intelligence
    Dauda, Ahmed
    Mclean, Scott
    Almehmadi, Abdulaziz
    El-Khatib, Khalil
    11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [26] Big Data Security and Privacy Issues - A Survey
    Joshi, Nikunj
    Kadhiwala, Bintu
    2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2017,
  • [27] Big Data Privacy and Security Using Abundant Data Recovery Techniques and Data Obliviousness Methodologies
    Funde, Snehalata
    Swain, Gandharba
    IEEE ACCESS, 2022, 10 : 105458 - 105484
  • [28] Data Governance for Security in IoT & Cloud Converged Environments
    Al-Ruithe, Majid
    Mthunzi, Siyakha
    Benkhelifa, Elhadj
    2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [29] Big Data Major Security Issues: Challenges and Defense Strategies
    Al-Zahrani, Adel
    Al-Hebbi, Mohammed
    TEHNICKI GLASNIK-TECHNICAL JOURNAL, 2022, 16 (02): : 197 - 204
  • [30] IoT Big Data Security and Privacy Versus Innovation
    Sollins, Karen R.
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 1628 - 1635