Open Access Open Access  Restricted Access Subscription Access

Elevating Security in IoT Cloud Fusion: Challenges and Remedies

Ushaa Eswaran, Vivek Eswaran, Keerthna Murali, Vishal Eswaran

Abstract


The integration of internet of things (IoT) devices and cloud computing platforms, known as IoT cloud fusion, enables powerful new applications but also poses significant security risks. This paper provides a comprehensive analysis of the security challenges in IoT cloud fusion and emerging remedies to elevate protection. We assess key threats around data privacy, authentication, integrity, scalability, and interoperability through a systematic literature review methodology. Encryption, access controls, blockchain, and other technologies are examined as existing safeguards, along with intelligent security enhancements on the horizon leveraging machine learning and decentralized computing. Best practices for threat modeling, user awareness, and coordinated response are also highlighted. Case studies of real-world implementations shed light on considerations for balanced innovation and proactive security across sectors like healthcare, smart cities, and Industry 4.0. As IoT cloud deployments accelerate, purposeful cross-layer system designs incorporating multilayered controls from the edge to the cloud alongside user-centric privacy customization provide paths to elevate integrity, resiliency, and trust in these profoundly transformative platforms.


Keywords


Internet of things (IoT), cloud computing, IoT cloud fusion, cloud-centric IoT, security, privacy, blockchain, access control

Full Text:

PDF

References


Alaba FA, Othman M, Hashem IAT, Alotaibi F. Internet of things security: a survey. J Network Computer Appl. 2017; 88: 10–28. doi: 10.1016/j.jnca.2017.04.002.

Tiwari P, Suneja MK. Blue Eyes—III. Int J Computer Sci Mobile Comput. 2014; 4 (5): 672–677.

Botta A, De Donato W, Persico V, Pescapé A. Integration of cloud computing and internet of things: a survey. Future Generation Computer Syst. 2016; 56: 684–700. doi: 10.1016/j.future.2015.09.021.

MarketsandMarkets Research Private Ltd. IoT Cloud Platform Market. [Online]. 2019. Available at https://www.marketsandmarkets.com/Market-Reports/iot-cloud-platform-market-55553543.html

Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A. Security, privacy and trust in internet of things: the road ahead. Computer Netw. 2015; 76: 146–164. doi: 10.1016/j.comnet.2014.11.008.

Chang V, Ramachandran M. Towards achieving data security with the cloud computing adoption framework. IEEE Trans Serv Comput. 2016; 9 (1): 138–151. doi: 10.1109/TSC.2015.2439673.

Kumar JS, Patel DR, Rajalakshmi N. Cloud-centric internet of things communication framework for time critical IoT application. Handbook on Data Centers. pp. 567–581. doi: 10.1007/978-1-4939-2092-4_52

Thibaud M, Chi H, Zhou W, Piramuthu S. Internet of things (IoT) in high-risk environment, health and safety (EHS) industries: a comprehensive review. Decis Support Syst. 2018; 108: 79–95. doi: 10.1016/j.dss.2018.02.005.

Netskope. Cloud Threat Report Top 10 Cloud Findings. [Online]. 2021. Available at https://pages.

netskope.com/rs/248-SID-859/images/ct-reprint-q3.pdf

Qi J, Yang P, Newby M, Peng J, Han X, Cheng Z, Wan H. Fog orchestration for internet of things services. IEEE Commun Mag. 2019; 57 (2): 33–39. doi: 10.1109/MCOM.2019.1800242.

Rathore S, Ahmad A, Paul A, Rho S, Jeon G. Urban planning and building smart cities based on the internet of things using big data analytics. Computer Netw. 2017; 101: 63–80. doi: 10.1016/j.

comnet.2016.12.023.

Mahmoud R, Yousuf T, Aloul F, Zualkernan I. Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK, December 14–16, 2015. pp. 336–341. doi: 10.1109/ICITST.2015.7412116.

Padhy RP, Patra MR, Satapathy SC. Cloud computing: security issues and research challenges. International Journal of Computer Science and Information Technology & Security (IJCSITS). Dec 2011; 1(2): 136–146.

Newman S. Building Microservices: Designing Fine-Grained Systems. 1st edition. Sebastopol, CA, USA: O’Reilly; 2015.

Qi J, Yang P, Hanneghan M, Tang J, Fan K. Enabling technologies for the internet of health things. IEEE Commun Mag. 2020; 58 (4): 96–101. doi: 10.1109/MCOM.001.1900501.

Conti M, Dehghantanha A, Franke K, Watson S. Internet of things security and forensics: challenges and opportunities. Future Generation Computer Syst. 2018; 78: 544–546. doi: 10.1016/j.future.

07.060.

Khan MA, Sakamura K. Security in internet of things: opportunities and challenges. In: 2015 IEEE 4th International Conference on Networking and Distributed Computing (ICNDC). pp. 16–20. doi: 10.1109/ICNDC.2015.7583062.

Darwish A, Hassanien AE, Elhoseny M, Sangaiah AK, Muhammad K. The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Humanized Comput. 2021; 12 (3): 3151–3166. doi: 10.1007/s12652-019-01543-1.

Mohamed N, Al-Jaroodi J, Lazarova-Molnar S, Jawhar I. SmartCityWare: a cloud-based middleware for smart city services. IEEE Access. 2019; 8: 5467–5477. doi: 10.1109/access.2019.

Xiao L, Wan X, Lu X, Zhang Y, Wu D. IoT security techniques based on machine learning: How do IoT devices use AI to enhance security? IEEE Signal Process Mag. 2015; 32 (5): 41–49. doi: 10.1109/MSP.2015.2431497.

Alkadi I, Ren J. Cloud forensic readiness as a service for IaaS cloud. Electronics. 2019; 8 (5): 497. doi: 10.3390/electronics8050497.

Aloqaily M, Kantarci B, Mouftah H. Fairness-aware cloud resource management for sustainable smart city applications. Computer Netw. 2021; 196: 108137. doi: 10.1016/j.comnet.2021.108137.

Sookhak M, Tang H, He Y, Yu FR. Security and privacy of smart cities: a survey, research issues and challenges. IEEE Commun Surveys Tutorials. 2019; 21 (2): 1718–1743. doi: 10.1109/COMST.

2899707.

Ding W, Yan Z, Yang R. A survey on data storage and security in cloud computing. Knowledge-Based Syst. 2019; 171: 46–57. doi: 10.1016/j.knosys.2018.10.023.

Aldawood H, Skinner G. Reviewing cyber security social engineering training and awareness programs—pitfalls and ongoing issues. Future Internet. 2019; 11 (3): 73. doi: 10.3390/fi11030073.

Ingesoll JC, Alsaid A, Festag AW. A personal IoT security architecture. In: 2017 IEEE International Conference on Computer and Information Technology (CIT), Helsinki, Finland, August 21–23, 2017. pp. 63–68. doi: 10.1109/CIT.2017.66.

Celesti A, Fazio M, Villari M, Puliafito A. Adding long-term availability, obfuscation, and encryption to multi-Cloud storage systems. J Netw Computer Appl. 2020; 154: 102538. doi: 10.1016/j.jnca.2020.102538.

Geneiatakis D, Kounelis I, Neisse R, Nai-Fovino I, Steri G, Baldini G. Security and privacy issues for an IoT based smart home. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, May 22–26, 2017. pp. 1292–1297. doi: 10.23919/MIPRO.2017.7973622.

Verma P, Sood SK. Cloud-centric IoT based disease diagnosis healthcare framework. J Parallel Distrib Comput. 2018; 116: 27–38. doi: 10.1016/j.jpdc.2017.06.006.

Khan S, Parkinson S, Qin Y. Fog computing security: a review of current applications and security solutions. J Cloud Comput. 2019; 8 (1): 1–22. doi: 10.1186/s13677-019-0119-6.

Novak PK, Li Q, Zhao X, Li S. A survey of security and privacy for the internet of things. IEEE Access. 2020; 8: 24127–24144. doi: 10.1109/ACCESS.2020.2973325.

Leiding B, Memarmoshrefi P, Hogrefe D. Self-managed and blockchain-based vehicular ad-hoc networks. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, Heidelberg, Germany, September 12–16, 2016. pp. 137–140. doi: 10.1145/2968219.2971409.

Kaur H, Alam MA, Jameel R, Mourya AK, Chang V. A proposed healthcare system using blockchain technology. Healthcare. 2020; 8 (4): 461. doi: 10.3390/healthcare8040461.

Kshetri N. Will blockchain emerge as a tool to break the poverty chain in the global South? Third World Q. 2017; 38 (8): 1710–1732. doi: 10.1080/01436597.2017.1298438.

Sinha RS, Wei Y, Hwang SH. A survey on LPWA technology: LoRa and NB-IoT. ICT Express. 2015; 3 (1): 14–21. doi: 10.1016/j.icte.2017.03.004.

De Feo L, Galbraith SD. Towards a unified framework for isogeny based cryptosystems. In: Proceedings of International Conference on Cryptology and Information Security in Latin America. Heidelberg, Germany: Springer. pp. 372–385. doi: 10.1007/978-3-642-27375-9_22.

Fernandes E, Rahmati A, Eykholt K, Prakash A. Internet of things security research: a rehash of old ideas or new intellectual challenges? IEEE Security Privacy. 2019; 18 (4): 79–84. doi: 10.1109/MSEC.2019.2943262.

Raj H, Sarro F, Jana S. Moving towards a secure internet of health things: considerations, current issues and future directions. J Supercomputing. 2020; 76 (5): 3079–3106. doi: 10.1007/s11227-019-03029-y.

Evans A, Eyers D. Efficient data tagging for managing privacy in the internet of things. IEEE Internet Things J. 2019; 7 (5): 4686–4699. doi: 10.1109/JIOT.2019.2958185.

Papa F, Carvalho Silva M, De Gloria A, Silvestri C. Designing serious games for IoT exploit experimentation. J Netw Computer Appl. 2018; 113: 61–73. doi: 10.1016/j.jnca.2018.04.006.

Zhou Z, Cao Z, Dong X, Lin X. Security and privacy in cloud-assisted wireless wearable communications: challenges, solutions, and future directions. IEEE Wireless Commun. 2018; 25 (2): 146–152. doi: 10.1109/MWC.2017.1700024.

Verma P, Sood SK, Kalra S. Cloud-centric IoT based student healthcare monitoring framework. Journal of Ambient Intelligence and Humanized Computing. Oct 2018; 9: 1293–1309.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Journal of Computer Technology & Applications