Security and Privacy for Cloud-Based IoT: Challenges, Countermeasures, and Future Directions

被引:346
作者
Zhou, Jun [1 ]
Cao, Zhenfu [1 ]
Dong, Xiaolei [1 ]
Vasilakos, Athanasios V. [2 ]
机构
[1] East China Normal Univ, Shanghai, Peoples R China
[2] Natl Tech Univ Athens, GR-10682 Athens, Greece
基金
中国国家自然科学基金; 上海市自然科学基金;
关键词
INTERNET; PROTOCOL;
D O I
10.1109/MCOM.2017.1600363CM
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things is increasingly becoming a ubiquitous computing service, requiring huge volumes of data storage and processing. Unfortunately, due to the unique characteristics of resource constraints, self-organization, and short-range communication in IoT, it always resorts to the cloud for outsourced storage and computation, which has brought about a series of new challenging security and privacy threats. In this article, we introduce the architecture and unique security and privacy requirements for the next generation mobile technologies on cloud-based IoT, identify the inappropriateness of most existing work, and address the challenging issues of secure packet forwarding and efficient privacy preserving authentication by proposing new efficient privacy preserving data aggregation without public key homomorphic encryption. Finally, several interesting open problems are suggested with promising ideas to trigger more research efforts in this emerging area.
引用
收藏
页码:26 / 33
页数:8
相关论文
共 15 条
  • [1] Groth J, 2008, LECT NOTES COMPUT SC, V4965, P415
  • [2] Smart Community: An Internet of Things Application
    Li, Xu
    Lu, Rongxing
    Liang, Xiaohui
    Shen, Xuemin
    Chen, Jiming
    Lin, Xiaodong
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (11) : 68 - 75
  • [3] Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks
    Lin, Xiaodong
    Li, Xu
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2013, 62 (07) : 3339 - 3348
  • [4] TSVC: Timed Efficient and Secure Vehicular Communications with Privacy Preserving
    Lin, Xiaodong
    Sun, Xiaoting
    Wang, Xiayu
    Zhang, Chenxi
    Ho, Pin-Han
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (12) : 4987 - 4998
  • [5] Pi: A Practical Incentive Protocol for Delay Tolerant Networks
    Lu, Rongxing
    Lin, Xiaodong
    Zhu, Haojin
    Shen, Xuemin
    Preiss, Bruno
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (04) : 1483 - 1493
  • [6] PAILLIER P, EUROCRYPT 99, P223
  • [7] Securing the Internet of Things
    Roman, Rodrigo
    Najera, Pablo
    Lopez, Javier
    [J]. COMPUTER, 2011, 44 (09) : 51 - 58
  • [8] Key management systems for sensor networks in the context of the Internet of Things
    Roman, Rodrigo
    Alcaraz, Cristina
    Lopez, Javier
    Sklavos, Nicolas
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 147 - 159
  • [9] Saleem Y, 2014, COMPUTING RESOURCE M, V3, P439, DOI DOI 10.1007/978-3-319-06704-9_20
  • [10] Sen J., 2011, PROC INTL C EMERGING