Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era

被引:29
作者
De Donno, Michele [1 ]
Giaretta, Alberto [2 ]
Dragoni, Nicola [1 ,2 ]
Bucchiarone, Antonio [3 ]
Mazzara, Manuel [4 ]
机构
[1] Tech Univ Denmark, DTU Compute, DK-2800 Lyngby, Denmark
[2] Orebro Univ, Ctr Appl Autonomous Sensor Syst, S-70182 Orebro, Sweden
[3] Fdn Bruno Kessler, Via Sommar 18, I-38123 Trento, Italy
[4] Innopolis Univ, Inst Software Dev & Engn, Univ Skaya St 1, Innopolis 420500, Russia
关键词
security; Internet of Things; Cloud computing; VIRTUAL MACHINE MIGRATION; OF-THE-ART; DDOS ATTACKS; ISSUES; CHALLENGES; INTERNET; PRIVACY; THINGS; INTEGRATION; SERVICES;
D O I
10.3390/fi11060127
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is rapidly changing our society to a world where every thing is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds.
引用
收藏
页数:30
相关论文
共 146 条
[1]  
Ahuja S.P., 2012, NETWORK COMMUNICATIO, V1, P66
[2]   Secure Live Virtual Machines Migration: Issues and Solutions [J].
Aiash, Mahdi ;
Mapp, Glenford ;
Gemikonakli, Orhan .
2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, :160-165
[3]   Rethinking Security in the Era of Cloud Computing [J].
Aikat, Jay ;
Akella, Aditya ;
Chase, Jeffrey S. ;
Juels, Ari ;
Reiter, Michael K. ;
Ristenpart, Thomas ;
Sekar, Vyas ;
Swift, Michael .
IEEE SECURITY & PRIVACY, 2017, 15 (03) :60-69
[4]   Robust Coordination of Cloud-Internal Denial of Service Attacks [J].
Alarifi, Suaad ;
Wolthusen, Stephen D. .
2013 IEEE THIRD INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING (CGC 2013), 2013, :135-142
[5]  
Almorsy M., 2010, P 2010 AS PAC SOFTW
[6]  
[Anonymous], 2012, P 2012 ACM C COMP CO, DOI [DOI 10.1145/2382196.2382228, 10.1145/2382196.2382228]
[7]  
[Anonymous], 2012, PROC ND
[8]  
[Anonymous], 2017, 11 USENIX WORKSH OFF
[9]  
[Anonymous], P 14 USENIX SEC S BA
[10]   From Security to Assurance in the Cloud: A Survey [J].
Ardagna, Claudio A. ;
Asal, Rasool ;
Damiani, Ernesto ;
Quang Hieu Vu .
ACM COMPUTING SURVEYS, 2015, 48 (01)