基于云的物联网(IoT)的隐私和安全

T. Choudhury, Ayushi Gupta, Saurabh Pradhan, Praveen Kumar, Y. Rathore
{"title":"基于云的物联网(IoT)的隐私和安全","authors":"T. Choudhury, Ayushi Gupta, Saurabh Pradhan, Praveen Kumar, Y. Rathore","doi":"10.1109/CINE.2017.28","DOIUrl":null,"url":null,"abstract":"The IoT is in need of an advanced prototype for security, which considers the security issues from a holistic perspective comprising the advanced users and their intercommunication with this technology. In this paper, it has been analyzed and compared how current approaches are ensuring fundamental and basic secu-rity requisites and securing intercommunication of IoT, along with the rolling challenges and scope for research work in this field in the coming future. Cloud Computing is today's generation advanced technology services are made available for customers per utilization basis. Servers are being utilized on cloud to out-source their highly valuable data. Though there are many benefits of cloud computing. However, it has security threads of pivotal confidential data. Users of cloud technology can't count on the cloud service sup-pliers for the safety of the pivotal confidential data. Therefore, a Third-Party Authenticator is required which authenticates the cloud data from the side of users or holders of the data. Security of sensitive data is of questionable nature due to the presence of various entities. Cloud Service Providers along with Data Users are equally in charge for putting the security of the pivotal confidential data at risk. Surveys have sug-gested that huge storage systems cannot be trusted completely; and all of them can be hacked.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"36","resultStr":"{\"title\":\"Privacy and Security of Cloud-Based Internet of Things (IoT)\",\"authors\":\"T. Choudhury, Ayushi Gupta, Saurabh Pradhan, Praveen Kumar, Y. Rathore\",\"doi\":\"10.1109/CINE.2017.28\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The IoT is in need of an advanced prototype for security, which considers the security issues from a holistic perspective comprising the advanced users and their intercommunication with this technology. In this paper, it has been analyzed and compared how current approaches are ensuring fundamental and basic secu-rity requisites and securing intercommunication of IoT, along with the rolling challenges and scope for research work in this field in the coming future. Cloud Computing is today's generation advanced technology services are made available for customers per utilization basis. Servers are being utilized on cloud to out-source their highly valuable data. Though there are many benefits of cloud computing. However, it has security threads of pivotal confidential data. Users of cloud technology can't count on the cloud service sup-pliers for the safety of the pivotal confidential data. Therefore, a Third-Party Authenticator is required which authenticates the cloud data from the side of users or holders of the data. Security of sensitive data is of questionable nature due to the presence of various entities. Cloud Service Providers along with Data Users are equally in charge for putting the security of the pivotal confidential data at risk. Surveys have sug-gested that huge storage systems cannot be trusted completely; and all of them can be hacked.\",\"PeriodicalId\":236972,\"journal\":{\"name\":\"2017 3rd International Conference on Computational Intelligence and Networks (CINE)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"36\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 3rd International Conference on Computational Intelligence and Networks (CINE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CINE.2017.28\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINE.2017.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 36

摘要

物联网需要一个先进的安全原型,从整体的角度考虑安全问题,包括高级用户及其与该技术的交互。在本文中,分析和比较了目前的方法如何确保物联网的基本和基本安全要求和确保互联互通,以及未来该领域研究工作的滚动挑战和范围。云计算是当今一代先进的技术,服务是按利用率为基础提供给客户的。服务器在云上被用来外包其非常有价值的数据。尽管云计算有很多好处。然而,它有关键机密数据的安全线程。云技术的用户不能指望云服务供应商保证关键机密数据的安全。因此,需要一个第三方认证器,从用户或数据持有者的角度对云数据进行认证。由于存在各种实体,敏感数据的安全性存在问题。云服务提供商和数据用户同样有责任将关键机密数据的安全性置于风险之中。调查表明,庞大的存储系统不能完全信任;所有这些都可以被黑掉。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Privacy and Security of Cloud-Based Internet of Things (IoT)
The IoT is in need of an advanced prototype for security, which considers the security issues from a holistic perspective comprising the advanced users and their intercommunication with this technology. In this paper, it has been analyzed and compared how current approaches are ensuring fundamental and basic secu-rity requisites and securing intercommunication of IoT, along with the rolling challenges and scope for research work in this field in the coming future. Cloud Computing is today's generation advanced technology services are made available for customers per utilization basis. Servers are being utilized on cloud to out-source their highly valuable data. Though there are many benefits of cloud computing. However, it has security threads of pivotal confidential data. Users of cloud technology can't count on the cloud service sup-pliers for the safety of the pivotal confidential data. Therefore, a Third-Party Authenticator is required which authenticates the cloud data from the side of users or holders of the data. Security of sensitive data is of questionable nature due to the presence of various entities. Cloud Service Providers along with Data Users are equally in charge for putting the security of the pivotal confidential data at risk. Surveys have sug-gested that huge storage systems cannot be trusted completely; and all of them can be hacked.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信