An analysis of security challenges and their perspective solutions for cloud computing and IoT

INTRODUCTION: With the on-going revolution inthe Internet of Things and Cloud Computing has made the potential of every object that is connected through the Internet, to exchange and transfer data. Various users perceive this connection and interaction very helpful and serviceable in their daily rou...

Full description

Bibliographic Details
Main Authors: Muhammad Muhammad, Tahir Alyas, Faraz Ahmad, Fatima Butt, Wajahat Qazi, Shazia Saqib
Format: Article
Language:English
Published: European Alliance for Innovation (EAI) 2021-04-01
Series:EAI Endorsed Transactions on Scalable Information Systems
Subjects:
Online Access:https://eudl.eu/pdf/10.4108/eai.23-10-2020.166718
_version_ 1831587633571037184
author Muhammad Muhammad
Tahir Alyas
Faraz Ahmad
Fatima Butt
Wajahat Qazi
Shazia Saqib
author_facet Muhammad Muhammad
Tahir Alyas
Faraz Ahmad
Fatima Butt
Wajahat Qazi
Shazia Saqib
author_sort Muhammad Muhammad
collection DOAJ
description INTRODUCTION: With the on-going revolution inthe Internet of Things and Cloud Computing has made the potential of every object that is connected through the Internet, to exchange and transfer data. Various users perceive this connection and interaction very helpful and serviceable in their daily routines. OBJECTIVES: The objective of this research to identify the complex configured network system is a soft target to security threats, therefore we need a security embedded framework for IoT and cloud communication models. Another objective is to provide protection of information from unauthorized access controls in IoT-cloud integrated framework and secure data from spying. METHODS: This paper has applied an integrated IoT-cloud theoretical solution, whose activities are mainly decided by a centralized controller to provide safeguard against data attacks. Our theoretical integrated IoT-cloud theoretical solution is able to achieve unauthorized access control and data breach. RESULTS: Internet of things and cloud computing has intensively used by several real-time applications. After the thercical analysis, the different vulnerabilities explained after detail literature review to prevent unauthorized access and unauthorized data breach. CONCLUSION: Internet of things have changed the shape of communicationand centralized data controller is the main entity that is robust against eavesdroppers. In case, any eavesdropper tries to be a normal user and attempts to access a personal file then he has been entertained with a misleading file that he considers as an authentic file but in actual it is not. Desirable IoT proposed solutions need to be design and deploy, which can guarantee: anonymity, confidentiality, andintegrity in heterogeneous environments.
first_indexed 2024-12-17T21:58:25Z
format Article
id doaj.art-7d80f078d08d4f4b91c12e2c50679925
institution Directory Open Access Journal
issn 2032-9407
language English
last_indexed 2024-12-17T21:58:25Z
publishDate 2021-04-01
publisher European Alliance for Innovation (EAI)
record_format Article
series EAI Endorsed Transactions on Scalable Information Systems
spelling doaj.art-7d80f078d08d4f4b91c12e2c506799252022-12-21T21:31:03ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Scalable Information Systems2032-94072021-04-0183010.4108/eai.23-10-2020.166718An analysis of security challenges and their perspective solutions for cloud computing and IoTMuhammad Muhammad0Tahir Alyas1Faraz Ahmad2Fatima Butt3Wajahat Qazi4Shazia Saqib5Department of Computer Science, Lahore Garrison University, Lahore, PakistanDepartment of Computer Science, Lahore Garrison University, Lahore, PakistanDepartment of Computer Science, Lahore Garrison University, Lahore, PakistanDepartment of Computer Science and Engineering, University of Engineering and Technology, Lahore, PakistanDepartment of Computer Science Comsats University Islamabad, Lahore Campus, PakistanDepartment of Computer Science, Lahore Garrison University, Lahore, PakistanINTRODUCTION: With the on-going revolution inthe Internet of Things and Cloud Computing has made the potential of every object that is connected through the Internet, to exchange and transfer data. Various users perceive this connection and interaction very helpful and serviceable in their daily routines. OBJECTIVES: The objective of this research to identify the complex configured network system is a soft target to security threats, therefore we need a security embedded framework for IoT and cloud communication models. Another objective is to provide protection of information from unauthorized access controls in IoT-cloud integrated framework and secure data from spying. METHODS: This paper has applied an integrated IoT-cloud theoretical solution, whose activities are mainly decided by a centralized controller to provide safeguard against data attacks. Our theoretical integrated IoT-cloud theoretical solution is able to achieve unauthorized access control and data breach. RESULTS: Internet of things and cloud computing has intensively used by several real-time applications. After the thercical analysis, the different vulnerabilities explained after detail literature review to prevent unauthorized access and unauthorized data breach. CONCLUSION: Internet of things have changed the shape of communicationand centralized data controller is the main entity that is robust against eavesdroppers. In case, any eavesdropper tries to be a normal user and attempts to access a personal file then he has been entertained with a misleading file that he considers as an authentic file but in actual it is not. Desirable IoT proposed solutions need to be design and deploy, which can guarantee: anonymity, confidentiality, andintegrity in heterogeneous environments.https://eudl.eu/pdf/10.4108/eai.23-10-2020.166718cloud computingcloud securityinternet-of-thingsdenial of service
spellingShingle Muhammad Muhammad
Tahir Alyas
Faraz Ahmad
Fatima Butt
Wajahat Qazi
Shazia Saqib
An analysis of security challenges and their perspective solutions for cloud computing and IoT
EAI Endorsed Transactions on Scalable Information Systems
cloud computing
cloud security
internet-of-things
denial of service
title An analysis of security challenges and their perspective solutions for cloud computing and IoT
title_full An analysis of security challenges and their perspective solutions for cloud computing and IoT
title_fullStr An analysis of security challenges and their perspective solutions for cloud computing and IoT
title_full_unstemmed An analysis of security challenges and their perspective solutions for cloud computing and IoT
title_short An analysis of security challenges and their perspective solutions for cloud computing and IoT
title_sort analysis of security challenges and their perspective solutions for cloud computing and iot
topic cloud computing
cloud security
internet-of-things
denial of service
url https://eudl.eu/pdf/10.4108/eai.23-10-2020.166718
work_keys_str_mv AT muhammadmuhammad ananalysisofsecuritychallengesandtheirperspectivesolutionsforcloudcomputingandiot
AT tahiralyas ananalysisofsecuritychallengesandtheirperspectivesolutionsforcloudcomputingandiot
AT farazahmad ananalysisofsecuritychallengesandtheirperspectivesolutionsforcloudcomputingandiot
AT fatimabutt ananalysisofsecuritychallengesandtheirperspectivesolutionsforcloudcomputingandiot
AT wajahatqazi ananalysisofsecuritychallengesandtheirperspectivesolutionsforcloudcomputingandiot
AT shaziasaqib ananalysisofsecuritychallengesandtheirperspectivesolutionsforcloudcomputingandiot
AT muhammadmuhammad analysisofsecuritychallengesandtheirperspectivesolutionsforcloudcomputingandiot
AT tahiralyas analysisofsecuritychallengesandtheirperspectivesolutionsforcloudcomputingandiot
AT farazahmad analysisofsecuritychallengesandtheirperspectivesolutionsforcloudcomputingandiot
AT fatimabutt analysisofsecuritychallengesandtheirperspectivesolutionsforcloudcomputingandiot
AT wajahatqazi analysisofsecuritychallengesandtheirperspectivesolutionsforcloudcomputingandiot
AT shaziasaqib analysisofsecuritychallengesandtheirperspectivesolutionsforcloudcomputingandiot