In the real world cloud robotics network are highly structured. The network security and IOT devices ability to cope with complex problem in such cloud environment crucially depend on exploiting this network security structured.C2M (Cloud to Machine) is the core network technology to implement cloud robotics. This paper firstly introduce the concept of C2M with Cloud Heritage Technique and the cloud network architecture of C2MHT (Cloud to Machine Heritage Technique) .Then it analyses the cloud security threats of C2M , moving the C2M robotics devices to unauthorized location and note.
CITATION STYLE
Sharma*, Dr. R. K., Kapoor, Dr. R. K., & Sharma, Mr. P. K. (2020). Probabilistic Security Interface for IOT Devices in the Cloud Network. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 3454–3457. https://doi.org/10.35940/ijrte.d4615.018520
Mendeley helps you to discover research relevant for your work.