Cloud Computing and Security in the IoT Era

  • Abssi Y
  • Mishra S
  • Kumar Shukla M
N/ACitations
Citations of this article
36Readers
Mendeley users who have this article in their library.

Abstract

Advancements in information technology, and transfer of data online leading to the vulnerabilities and giving an invitation to cyber threats. Security and privacy are important issues in cloud storage and networking fields. Cloud computing created an environment that facilitates the internet of things. The cloud computing technology consisted of servers, applications, and other storage devices, relying on the virtual connection. The stored information in clouds can be manipulated without the need for extensive physical activities. The internet of things devices provide information and services through information and communication technology, these end-node IoT devices are not very intelligent and resource-constrained thus they are vulnerable to cyber threats. It posed an issue of insecurity as malicious individuals learned ways of intruding these systems and causing intellectual and physical losses. The study proposes numerous solutions for the challenges of privacy and security in the cloud and IoT. The paper provides an in-depth examination of security challenges in cloud computing and IoT. The methodology uses the interpretive technique. The results depict the importance of the machine and deep learning in cyber-attack and mitigation. Analysis of variance (ANOVA) test statistics is used to test the reliability of the study. Introduction The internet of things (IoT) ranks high as an outstanding archetype in the 21st century undoubtedly. The first impression of the term would suggest that it means connecting things through the internet. This technology developed through the cloud computing (CC) foundation; CC devices provide the platform needed to enhance and expand IoT to the world [1,2]. Nevertheless, some security concerns continue to derail the expansion of the CC-IoT systems into all parts of human life, these concerns dwell in the realm of cybersecurity with questions such as privacy intrusion rising. Irrespective of how wonderful the technology continues to become with matters of application intelligence and data analytics, the query of how to sufficiently protect information emerges most of the time [3]. Companies and even government store uses enormous amounts of data on clouds. For ease of use the servers used in the processes are invaluable to many people. These factors attract malicious parties to attack and extract information [4]. The security issues are among the biggest worries in companies that rely on cloud computing to do business; the management of the businesses state that unauthorized activities affect the flow of business. Moreover, the risk increases when the company outsources these cloud storage services through the use of a vendor [5]. Third-party vendors in cloud computing are a common practice in the corporate world, all the companies are at least if the vendor suffers from security breaches [6,7]. Many organizations shifting to the cloud, critical business applications, and massive quantities of critical data could now exist in systems available from anywhere across the globe. The system is accessible not only to customers and employees, but also to potential cybercriminals [9]. Environmental subtleties are also disrupting and changing resiliency with the speedy adoption of cloud setup and the spread of IoT gadgets. The idea of a border is vanishing, and the fight against cybercrime has drifted inside the system, with this change, organizations require to reconsider their security. This research answers these questions; a connection between access control in cloud computing and privacy in the modern world, the security measures when it comes to cloud computing, the impact of the internet of things and cloud computing connect in the digital era, what are the technical processes predominant in the cloud-based security protocols? The study proposes numerous solutions for the challenges of privacy; these include anti-malware, firewall, intrusion prevention systems, and hardware authentication. The reliability of the study was tested using ANOVA statistical method.

Cite

CITATION STYLE

APA

Abssi, Y., Mishra, S., & Kumar Shukla, M. (2020). Cloud Computing and Security in the IoT Era. HELIX, 10(4), 51–58. https://doi.org/10.29042/2020-10-4-51-58

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free