Developing a Model of Cloud Computing Protection System for the Internet of Things

被引:0
|
作者
Belej, Olexander [1 ]
Nestor, Natalia [1 ]
Polotai, Orest [2 ]
Panchak, Sofia [1 ]
机构
[1] Lviv Polytech Natl Univ, Dept Comp Aided Design, Lvov, Ukraine
[2] Lviv State Univ Life Safety, Dept Informat Secur Management, Lvov, Ukraine
来源
2020 IEEE XVITH INTERNATIONAL CONFERENCE ON THE PERSPECTIVE TECHNOLOGIES AND METHODS IN MEMS DESIGN (MEMSTECH) | 2020年
关键词
cloud protection system model; multi-agent approach; automata model; cloud computing; security agent; Internet of Things; IOT;
D O I
10.1109/memstech49584.2020.9109456
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This article proposes the use of a multi-agent approach when building a model of the cloud computing protection system of the Internet of things based on the reference architecture of cloud computing. It is proposed to build a system for monitoring user behavior in a cloud computing system using an automated model. The selection of a security agent is necessary on the one hand in connection with the increase in the number of commercial enterprises switching to the cloud computing platform, and on the other hand, with the need to protect data and resources on the Internet of things. The article also presents some scenarios for the interaction of actors based on a dedicated security agent. In this case, the security agent performs a controlling and connecting role between all the actors of the model, monitoring and recognizing unauthorized actions both by cloud users of the Internet of things networks and by actors of the cloud computing system of the Internet of things.
引用
收藏
页码:53 / 58
页数:6
相关论文
共 50 条
  • [1] Internet of Things and Cloud Computing
    Dores, Carlos
    Reis, Luis Paulo
    Lopes, Nuno Vasco
    PROCEEDINGS OF THE 2014 9TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2014), 2014,
  • [2] Internet of Things and Cloud Computing for Future Internet
    Chang, Kai-Di
    Chen, Chi-Yuan
    Chen, Jiann-Liang
    Chao, Han-Chieh
    SECURITY-ENRICHED URBAN COMPUTING AND SMART GRID, 2011, 223 : 1 - +
  • [3] Internet of Things & Cloud Computing Internet of Things as a Service Approach
    Othman, Maison M.
    El-Mousa, Ali
    2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2020, : 318 - 323
  • [4] Privacy and Security in Internet-based Computing: Cloud Computing, Internet of Things, Cloud of Things: a review
    Sahmim, Syrine
    Gharsellaoui, Hamza
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 1516 - 1522
  • [5] The Internet of Things Meets Cloud Computing
    Lumpkins, William
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2013, 2 (02) : 47 - 51
  • [6] On the Integration of Cloud Computing and Internet of Things
    Botta, Alessio
    de Donato, Walter
    Persico, Valerio
    Pescape, Antonio
    2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 23 - 30
  • [7] Opacity in Internet of Things with Cloud Computing
    Zeng, Wen
    Koutny, Maciej
    Watson, Paul
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA), 2015, : 201 - 207
  • [8] Research on privacy protection system of RFID personal consumption data based on internet of things and cloud computing
    Du N.
    Chen C.
    International Journal of Information and Computer Security, 2021, 15 (04) : 328 - 342
  • [9] Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things
    Mughaid, Ala
    Obeidat, Ibrahim
    Abualigah, Laith
    Alzubi, Shadi
    Daoud, Mohammad Sh.
    Migdady, Hazem
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 2123 - 2137
  • [10] Cloud of Things: Integrating Internet of Things and Cloud Computing and the Issues Involved
    Aazam, Mohammad
    Khan, Imran
    Alsaffar, Aymen Abdullah
    Huh, Eui-Nam
    PROCEEDINGS OF 2014 11TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES & TECHNOLOGY (IBCAST), 2014, : 414 - 419