Cloud Infrastructures, Services, and IoT Systems for Smart Cities. Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, April 20–21, 2017, Proceedings

Research Article

IoT and Big Data: An Architecture with Data Flow and Security Issues

  • @INPROCEEDINGS{10.1007/978-3-319-67636-4_25,
        author={Deepak Puthal and Rajiv Ranjan and Surya Nepal and Jinjun Chen},
        title={IoT and Big Data: An Architecture with Data Flow and Security Issues},
        proceedings={Cloud Infrastructures, Services, and IoT Systems for Smart Cities. Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, April 20--21, 2017, Proceedings},
        proceedings_a={IISSC \& CN4IOT},
        year={2017},
        month={11},
        keywords={Internet of Things Big data Security Security threats Quality of Service},
        doi={10.1007/978-3-319-67636-4_25}
    }
    
  • Deepak Puthal
    Rajiv Ranjan
    Surya Nepal
    Jinjun Chen
    Year: 2017
    IoT and Big Data: An Architecture with Data Flow and Security Issues
    IISSC & CN4IOT
    Springer
    DOI: 10.1007/978-3-319-67636-4_25
Deepak Puthal1,*, Rajiv Ranjan2,*, Surya Nepal3,*, Jinjun Chen4,*
  • 1: University of Technology Sydney
  • 2: Newcastle University
  • 3: CSIRO Data61
  • 4: Swinburne University of Technology
*Contact email: deepak.puthal@gmail.com, rranjans@gmail.com, Surya.Nepal@data61.csiro.au, jinjun.chen@gmail.com

Abstract

The Internet of Things (IoT) introduces a future vision where users, computer, computing devices and daily objects possessing sensing and actuating capabilities cooperate with unprecedented convenience and benefits. We are moving towards IoT trend, where the number of smart sensing devices deployed around the world is growing at a rapid speed. With considering the number of sources and types of data from smart sources, the sensed data tends to new trend of research i.e. big data. Security will be a fundamental enabling factor of most IoT applications and big data, mechanisms must also be designed to protect communications enabled by such technologies. This paper analyses existing protocols and mechanisms to secure the IoT and big data, as well as security threats in the domain. We have broadly divided the IoT architecture into several layers to define properties, security issues and related works to solve the security concerns.