CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES
In this era of communication and networking technology, Internet of Things adds to the existing technological era and brings revolution to the Information Technology world. Internet of Things consists of interconnected devices which may be digital, physical or mechanical devices equipped with unique...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT)
2020-12-01
|
Series: | Jordanian Journal of Computers and Information Technology |
Subjects: | |
Online Access: | https://jjcit.org/paper/116 |
id |
doaj-d2385fdb77a84844b694a12ffeaec979 |
---|---|
record_format |
Article |
spelling |
doaj-d2385fdb77a84844b694a12ffeaec9792020-12-01T06:21:04ZengScientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT)Jordanian Journal of Computers and Information Technology 2413-93512415-10762020-12-016441543310.5455/jjcit.71-1592021856CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGESShamsul Haq0Adil Bashir1Sahil Sholla2Department of Computer Science and Engineering, IUST, Awantipora, J&K, IndiaDepartment of Computer Science and Engineering, IUST, Awantipora, J&K, IndiaDepartment of Computer Science and Engineering, IUST, Awantipora, J&K, IndiaIn this era of communication and networking technology, Internet of Things adds to the existing technological era and brings revolution to the Information Technology world. Internet of Things consists of interconnected devices which may be digital, physical or mechanical devices equipped with unique identifiers and having the capability to transmit the sensed information to other devices autonomously. Internet of Things is recognized as being composed of resource constraint devices in terms of processing competency, storage capacity and power resources. To cope up these constraints, existing computing technology known as cloud computing can be used to facilitate the Internet of Things system by offloading its processing and storage requirements. In this paper, we have provided the necessity and benefits of Cloud and IoT integration. Further, the paper has identified several research issues that arise due to Cloud-IoT integration. Among the several research issues, it was observed that security and privacy concerns are pivotal in Cloud-IoT integration and need to be addressed to make the integration successful. The core security and privacy threats have been identified and the existing security mechanisms have also been researched in this paper. The paper also highlights open security and privacy research issues in the Cloud-IoT paradigm. This paper can act as a baseline for the research that is needed in the area of security and privacy issues in the Cloud-IoT or Cloud of Things paradigm.https://jjcit.org/paper/116internet of thingscloud computingcloud of thingssecurityprivacyencryption algorithms |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Shamsul Haq Adil Bashir Sahil Sholla |
spellingShingle |
Shamsul Haq Adil Bashir Sahil Sholla CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES Jordanian Journal of Computers and Information Technology internet of things cloud computing cloud of things security privacy encryption algorithms |
author_facet |
Shamsul Haq Adil Bashir Sahil Sholla |
author_sort |
Shamsul Haq |
title |
CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES |
title_short |
CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES |
title_full |
CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES |
title_fullStr |
CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES |
title_full_unstemmed |
CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES |
title_sort |
cloud of things: architecture, research challenges, security threats, mechanisms and open challenges |
publisher |
Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT) |
series |
Jordanian Journal of Computers and Information Technology |
issn |
2413-9351 2415-1076 |
publishDate |
2020-12-01 |
description |
In this era of communication and networking technology, Internet of Things adds to the existing technological era and brings revolution to the Information Technology world. Internet of Things consists of interconnected devices which may be digital, physical or mechanical devices equipped with unique identifiers and having the capability to transmit the sensed information to other devices autonomously. Internet of Things is recognized as being composed of resource constraint devices in terms of processing competency, storage capacity and power resources. To cope up these constraints, existing computing technology known as cloud computing can be used to facilitate the Internet of Things system by offloading its processing and storage requirements. In this paper, we have provided the necessity and benefits of Cloud and IoT integration. Further, the paper has identified several research issues that arise due to Cloud-IoT integration. Among the several research issues, it was observed that security and privacy concerns are pivotal in Cloud-IoT integration and need to be addressed to make the integration successful. The core security and privacy threats have been identified and the existing security mechanisms have also been researched in this paper. The paper also highlights open security and privacy research issues in the Cloud-IoT paradigm. This paper can act as a baseline for the research that is needed in the area of security and privacy issues in the Cloud-IoT or Cloud of Things paradigm. |
topic |
internet of things cloud computing cloud of things security privacy encryption algorithms |
url |
https://jjcit.org/paper/116 |
work_keys_str_mv |
AT shamsulhaq cloudofthingsarchitectureresearchchallengessecuritythreatsmechanismsandopenchallenges AT adilbashir cloudofthingsarchitectureresearchchallengessecuritythreatsmechanismsandopenchallenges AT sahilsholla cloudofthingsarchitectureresearchchallengessecuritythreatsmechanismsandopenchallenges |
_version_ |
1724411119244673024 |