Research Article
An analysis of security challenges and their perspective solutions for cloud computing and IoT
@ARTICLE{10.4108/eai.23-10-2020.166718, author={Muhammad Hassan Ghulam Muhammad and Tahir Alyas and Faraz Ahmad and Fatima Hassan Butt and Wajahat Mahmood Qazi and Shazia Saqib}, title={An analysis of security challenges and their perspective solutions for cloud computing and IoT}, journal={EAI Endorsed Transactions on Scalable Information Systems}, volume={8}, number={30}, publisher={EAI}, journal_a={SIS}, year={2020}, month={10}, keywords={Cloud Computing, Cloud Security, Internet-of-Things, Denial of service}, doi={10.4108/eai.23-10-2020.166718} }
- Muhammad Hassan Ghulam Muhammad
Tahir Alyas
Faraz Ahmad
Fatima Hassan Butt
Wajahat Mahmood Qazi
Shazia Saqib
Year: 2020
An analysis of security challenges and their perspective solutions for cloud computing and IoT
SIS
EAI
DOI: 10.4108/eai.23-10-2020.166718
Abstract
INTRODUCTION: With the on-going revolution inthe Internet of Things and Cloud Computing has made the potential of every object that is connected through the Internet, to exchange and transfer data. Various users perceive this connection and interaction very helpful and serviceable in their daily routines. OBJECTIVES: The objective of this research to identify the complex configured network system is a soft target to security threats, therefore we need a security embedded framework for IoT and cloud communication models. Another objective is to provide protection of information from unauthorized access controls in IoT-cloud integrated framework and secure data from spying. METHODS: This paper has applied an integrated IoT-cloud theoretical solution, whose activities are mainly decided by a centralized controller to provide safeguard against data attacks. Our theoretical integrated IoT-cloud theoretical solution is able to achieve unauthorized access control and data breach. RESULTS: Internet of things and cloud computing has intensively used by several real-time applications. After the thercical analysis, the different vulnerabilities explained after detail literature review to prevent unauthorized access and unauthorized data breach. CONCLUSION: Internet of things have changed the shape of communicationand centralized data controller is the main entity that is robust against eavesdroppers. In case, any eavesdropper tries to be a normal user and attempts to access a personal file then he has been entertained with a misleading file that he considers as an authentic file but in actual it is not. Desirable IoT proposed solutions need to be design and deploy, which can guarantee: anonymity, confidentiality, andintegrity in heterogeneous environments.
Copyright © 2020 Muhammad Hassan Ghulam et al., licensed to EAI. This is an open-access article distributed under the terms of the Creative Commons Attribution license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.