ISSN : 2583-2646

Securing the Cloud of Things: A Comprehensive Analytics of Architecture, Use Cases, and Privacy Risks

ESP Journal of Engineering & Technology Advancements
© 2023 by ESP JETA
Volume 3  Issue 4
Year of Publication : 2023
Authors : Vaidehi Shah
:10.56472/25832646/JETA-V3I8P118

Citation:

Vaidehi Shah, 2023. "Securing the Cloud of Things: A Comprehensive Analytics of Architecture, Use Cases, and Privacy Risks", ESP Journal of Engineering & Technology Advancements  3(4): 158-165.

Abstract:

Combining cloud computing with the Internet of Things (IoT), the Cloud of Things (CoT) is a robust paradigm for intelligent, scalable, and adaptable services across domains. This integration brings up privacy and security challenges because of the scattered nature, limited resources, and heterogeneous design of CoT environments. This study delves into the architectural aspects of CoT, its real-world uses, and the significant privacy and security concerns it encounters. Cover important dangers like data leaks, social engineering, ransomware, and zero-day vulnerabilities. The research also details multi-tiered security measures, such as encryption, strong authentication, AI-based anomaly detection, and data protection rule compliance. Recent research advances and key shortcomings in current frameworks are highlighted in a comprehensive literature review. The study finishes by stressing the importance of security measures that are lightweight, scalable, and context-aware in order to guarantee the safe and dependable deployment of CoT systems in actual settings.

References:

[1] M. Ansari, S. A. Ali, and M. Alam, “Internet of things (IoT) fusion with cloud computing: current research and future direction,” International Journal of Advanced Technology and Engineering Exploration. 2022. doi: 10.19101/IJATEE.2021.876002.

[2] J. Lee, A. Abid, F. Le Gall, and J. S. Song, “Recent Trends on Artificial Intelligence-Enabled Internet of Things Platform and Standard Technologies,” in 2022 IEEE 8th World Forum on Internet of Things, WF-IoT 2022, 2022. doi: 10.1109/WF-IoT54382.2022.10152226.

[3] A. Botta, W. De Donato, V. Persico, and A. Pescapé, “Integration of Cloud computing and Internet of Things: A survey,” Futur. Gener. Comput. Syst., 2016, doi: 10.1016/j.future.2015.09.021.

[4] V. K. Sanjeevi, “An integrated secured architecture for Cloud of things,” 2019.

[5] S. Haq, A. Bashir, and S. Sholla, “Cloud of things: Architecture, research challenges, security threats, mechanisms and open challenges,” Jordanian Journal of Computers and Information Technology. 2020. doi: 10.5455/jjcit.71-1592021856.

[6] P. Sethi and S. R. Sarangi, “Internet of Things: Architectures, Protocols, and Applications,” Journal of Electrical and Computer Engineering. 2017. doi: 10.1155/2017/9324035.

[7] S. Garg, “Next-Gen Smart City Operations with AIOps & IoT : A Comprehensive look at Optimizing Urban Infrastructure,” J. Adv. Dev. Res., vol. 12, no. 1, 2021.

[8] K. M. R. Seetharaman, “Internet of Things (IoT) Applications in SAP: A Survey of Trends, Challenges, and Opportunities,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 3, no. 2, pp. 499–508, Mar. 2021, doi: 10.48175/IJARSCT-6268B.

[9] M. M. Sadeeq, N. M. Abdulkareem, S. R. M. Zeebaree, D. M. Ahmed, A. Saifullah Sami, and R. R. Zebari, “IoT and Cloud Computing Issues, Challenges and Opportunities: A Review,” Qubahan Acad. J., vol. 1, no. 2, pp. 1–7, Mar. 2021, doi: 10.48161/qaj.v1n2a36.

[10] S. S. Gill et al., “Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges,” Internet of Things (Netherlands). 2019. doi: 10.1016/j.iot.2019.100118.

[11] L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, “IoT privacy and security: Challenges and solutions,” Appl. Sci., 2020, doi: 10.3390/APP10124102.

[12] V. Singh, “Lessons Learned from Large-Scale Oracle Fusion Cloud Data Migrations,” Int. J. Sci. Res., vol. 10, no. 10, pp. 1662–1666, 2021.

[13] K. Haseeb, N. Islam, A. Almogren, I. Ud Din, H. N. Almajed, and N. Guizani, “Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs,” IEEE Access, vol. 7, pp. 79980–79988, 2019, doi: 10.1109/ACCESS.2019.2922971.

[14] S. S. S. Neeli, “Ensuring Data Quality: A Critical Aspect of Business Intelligence Success,” Int. J. Lead. Res. Publ., vol. 2, no. 9, 2021.

[15] L. Gattobigio, S. Thielemans, P. Benedetti, G. Reali, A. Braeken, and K. Steenhaut, “A multi-cloud service mesh approach applied to Internet of Things,” in IECON Proceedings (Industrial Electronics Conference), 2022. doi: 10.1109/IECON49645.2022.9968384.

[16] N. Kashyap, A. Rana, V. Kansal, and H. Walia, “Improve Cloud Based IoT Architecture Layer Security - A Literature Review,” in Proceedings - IEEE 2021 International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2021, 2021. doi: 10.1109/ICCCIS51004.2021.9397146.

[17] D. C. Nguyen, P. N. Pathirana, M. Ding, and A. Seneviratne, “Integration of Blockchain and Cloud of Things: Architecture, Applications and Challenges,” IEEE Commun. Surv. Tutorials, 2020, doi: 10.1109/COMST.2020.3020092.

[18] K. Suresh and G. V. Kumar, “Integrated Cloud Internet of Things for Realtime Applications,” in 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), IEEE, Oct. 2020, pp. 631–635. doi: 10.1109/I-SMAC49090.2020.9243454.

[19] P. Eugster, S. Kumar, S. Savvides, and J. J. Stephen, “Ensuring Confidentiality in the Cloud of Things,” IEEE Pervasive Comput., vol. 18, no. 1, pp. 10–18, Jan. 2019, doi: 10.1109/MPRV.2018.2877286.

[20] H. Y. Lin, M.-Y. Hsieh, and K.-C. Li, “Researches on secure data transmission mechanisms in cloud Internet of Things architectures,” in 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), IEEE, Aug. 2017, pp. 1–4. doi: 10.1109/UIC-ATC.2017.8397645.

Keywords:

Cloud of Things (CoT), Internet of Things (IoT), Cloud Computing, Security Architecture, Privacy Preservation, Data Protection, Edge Computing etc.