Anchitaalagammai J. V., K. S, M. S., Padmadevi S., Shanthalakshmi Revathy J.
{"title":"最佳实践","authors":"Anchitaalagammai J. V., K. S, M. S., Padmadevi S., Shanthalakshmi Revathy J.","doi":"10.4018/978-1-7998-3111-2.ch006","DOIUrl":null,"url":null,"abstract":"The internet of things (IoT) is rapidly changing our society to a world where every “thing” is connected to the internet, making computing pervasive like never before. It is increasingly becoming a ubiquitous computing service, requiring huge volumes of data storage and processing. Unfortunately, due to the lack of resource constraints, it tends to adopt a cloud-based architecture to store the voluminous data generated from IoT application. From a security perspective, the technological revolution introduced by IoT and cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. This chapter focus on security considerations for IoT from the perspectives of cloud tenants, end-users, and cloud providers in the context of wide-scale IoT proliferation, working across the range of IoT technologies. Also, this chapter includes how the organization can store the IoT data on the cloud securely by applying different Access control policies and the cryptography techniques.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Best Practices\",\"authors\":\"Anchitaalagammai J. V., K. S, M. S., Padmadevi S., Shanthalakshmi Revathy J.\",\"doi\":\"10.4018/978-1-7998-3111-2.ch006\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The internet of things (IoT) is rapidly changing our society to a world where every “thing” is connected to the internet, making computing pervasive like never before. It is increasingly becoming a ubiquitous computing service, requiring huge volumes of data storage and processing. Unfortunately, due to the lack of resource constraints, it tends to adopt a cloud-based architecture to store the voluminous data generated from IoT application. From a security perspective, the technological revolution introduced by IoT and cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. This chapter focus on security considerations for IoT from the perspectives of cloud tenants, end-users, and cloud providers in the context of wide-scale IoT proliferation, working across the range of IoT technologies. Also, this chapter includes how the organization can store the IoT data on the cloud securely by applying different Access control policies and the cryptography techniques.\",\"PeriodicalId\":372297,\"journal\":{\"name\":\"Advances in Web Technologies and Engineering\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Advances in Web Technologies and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/978-1-7998-3111-2.ch006\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Web Technologies and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-7998-3111-2.ch006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The internet of things (IoT) is rapidly changing our society to a world where every “thing” is connected to the internet, making computing pervasive like never before. It is increasingly becoming a ubiquitous computing service, requiring huge volumes of data storage and processing. Unfortunately, due to the lack of resource constraints, it tends to adopt a cloud-based architecture to store the voluminous data generated from IoT application. From a security perspective, the technological revolution introduced by IoT and cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. This chapter focus on security considerations for IoT from the perspectives of cloud tenants, end-users, and cloud providers in the context of wide-scale IoT proliferation, working across the range of IoT technologies. Also, this chapter includes how the organization can store the IoT data on the cloud securely by applying different Access control policies and the cryptography techniques.