Security and IoT cloud federation: Design of authentication schemes

5Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The advent of both Cloud computing and Internet of Things (IoT) is changing the way of conceiving information and communication systems. Generally, we talk about IoT Cloud to indicate a new type of distributed system consisting of a set of smart devices interconnected with a remote Cloud infrastructure, platform, or software through the Internet and able to provide IoT as a Service (IoTaaS). In this paper, we address such a challenging paradigm focusing on security in IoT Cloud Federation. In particular, we discuss several authentication schemes fitting different types of scenarios.

Cite

CITATION STYLE

APA

Barreto, L., Celesti, A., Villari, M., Fazio, M., & Puliafito, A. (2016). Security and IoT cloud federation: Design of authentication schemes. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 169, pp. 337–346). Springer Verlag. https://doi.org/10.1007/978-3-319-47063-4_35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free