CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES

In this era of communication and networking technology, Internet of Things adds to the existing technological era and brings revolution to the Information Technology world. Internet of Things consists of interconnected devices which may be digital, physical or mechanical devices equipped with unique...

Full description

Bibliographic Details
Main Authors: Shamsul Haq, Adil Bashir, Sahil Sholla
Format: Article
Language:English
Published: Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT) 2020-12-01
Series:Jordanian Journal of Computers and Information Technology
Subjects:
Online Access:https://jjcit.org/paper/116
id doaj-d2385fdb77a84844b694a12ffeaec979
record_format Article
spelling doaj-d2385fdb77a84844b694a12ffeaec9792020-12-01T06:21:04ZengScientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT)Jordanian Journal of Computers and Information Technology 2413-93512415-10762020-12-016441543310.5455/jjcit.71-1592021856CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGESShamsul Haq0Adil Bashir1Sahil Sholla2Department of Computer Science and Engineering, IUST, Awantipora, J&K, IndiaDepartment of Computer Science and Engineering, IUST, Awantipora, J&K, IndiaDepartment of Computer Science and Engineering, IUST, Awantipora, J&K, IndiaIn this era of communication and networking technology, Internet of Things adds to the existing technological era and brings revolution to the Information Technology world. Internet of Things consists of interconnected devices which may be digital, physical or mechanical devices equipped with unique identifiers and having the capability to transmit the sensed information to other devices autonomously. Internet of Things is recognized as being composed of resource constraint devices in terms of processing competency, storage capacity and power resources. To cope up these constraints, existing computing technology known as cloud computing can be used to facilitate the Internet of Things system by offloading its processing and storage requirements. In this paper, we have provided the necessity and benefits of Cloud and IoT integration. Further, the paper has identified several research issues that arise due to Cloud-IoT integration. Among the several research issues, it was observed that security and privacy concerns are pivotal in Cloud-IoT integration and need to be addressed to make the integration successful. The core security and privacy threats have been identified and the existing security mechanisms have also been researched in this paper. The paper also highlights open security and privacy research issues in the Cloud-IoT paradigm. This paper can act as a baseline for the research that is needed in the area of security and privacy issues in the Cloud-IoT or Cloud of Things paradigm.https://jjcit.org/paper/116internet of thingscloud computingcloud of thingssecurityprivacyencryption algorithms
collection DOAJ
language English
format Article
sources DOAJ
author Shamsul Haq
Adil Bashir
Sahil Sholla
spellingShingle Shamsul Haq
Adil Bashir
Sahil Sholla
CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES
Jordanian Journal of Computers and Information Technology
internet of things
cloud computing
cloud of things
security
privacy
encryption algorithms
author_facet Shamsul Haq
Adil Bashir
Sahil Sholla
author_sort Shamsul Haq
title CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES
title_short CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES
title_full CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES
title_fullStr CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES
title_full_unstemmed CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES
title_sort cloud of things: architecture, research challenges, security threats, mechanisms and open challenges
publisher Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT)
series Jordanian Journal of Computers and Information Technology
issn 2413-9351
2415-1076
publishDate 2020-12-01
description In this era of communication and networking technology, Internet of Things adds to the existing technological era and brings revolution to the Information Technology world. Internet of Things consists of interconnected devices which may be digital, physical or mechanical devices equipped with unique identifiers and having the capability to transmit the sensed information to other devices autonomously. Internet of Things is recognized as being composed of resource constraint devices in terms of processing competency, storage capacity and power resources. To cope up these constraints, existing computing technology known as cloud computing can be used to facilitate the Internet of Things system by offloading its processing and storage requirements. In this paper, we have provided the necessity and benefits of Cloud and IoT integration. Further, the paper has identified several research issues that arise due to Cloud-IoT integration. Among the several research issues, it was observed that security and privacy concerns are pivotal in Cloud-IoT integration and need to be addressed to make the integration successful. The core security and privacy threats have been identified and the existing security mechanisms have also been researched in this paper. The paper also highlights open security and privacy research issues in the Cloud-IoT paradigm. This paper can act as a baseline for the research that is needed in the area of security and privacy issues in the Cloud-IoT or Cloud of Things paradigm.
topic internet of things
cloud computing
cloud of things
security
privacy
encryption algorithms
url https://jjcit.org/paper/116
work_keys_str_mv AT shamsulhaq cloudofthingsarchitectureresearchchallengessecuritythreatsmechanismsandopenchallenges
AT adilbashir cloudofthingsarchitectureresearchchallengessecuritythreatsmechanismsandopenchallenges
AT sahilsholla cloudofthingsarchitectureresearchchallengessecuritythreatsmechanismsandopenchallenges
_version_ 1724411119244673024