Research Article
Security and IoT Cloud Federation: Design of Authentication Schemes
336 downloads
@INPROCEEDINGS{10.1007/978-3-319-47063-4_35, author={Luciano Barreto and Antonio Celesti and Massimo Villari and Maria Fazio and Antonio Puliafito}, title={Security and IoT Cloud Federation: Design of Authentication Schemes}, proceedings={Internet of Things. IoT Infrastructures. Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I}, proceedings_a={IOT360}, year={2017}, month={1}, keywords={Cloud federation IoT Authentication scheme}, doi={10.1007/978-3-319-47063-4_35} }
- Luciano Barreto
Antonio Celesti
Massimo Villari
Maria Fazio
Antonio Puliafito
Year: 2017
Security and IoT Cloud Federation: Design of Authentication Schemes
IOT360
Springer
DOI: 10.1007/978-3-319-47063-4_35
Abstract
The advent of both Cloud computing and Internet of Things (IoT) is changing the way of conceiving information and communication systems. Generally, we talk about IoT Cloud to indicate a new type of distributed system consisting of a set of smart devices interconnected with a remote Cloud infrastructure, platform, or software through the Internet and able to provide IoT as a Service (IoTaaS). In this paper, we address such a challenging paradigm focusing on security in IoT Cloud Federation. In particular, we discuss several authentication schemes fitting different types of scenarios.
Copyright © 2015–2024 ICST