2023
DOI: 10.4018/ijcac.325624
|View full text |Cite
|
Sign up to set email alerts
|

Integration of the Internet of Things and Cloud

Abstract: The integration of IoT and cloud poses increased security challenges. Implementing security mechanisms in IoT systems is challenging due to the availability of limited resources, large number of devices, heterogeneity of devices, generation of bulk data, etc. Likewise, cloud resources are also vulnerable to security issues due to virtualization, insider threats, data loss, data breaches, insecure APIs, etc. Security is of major concern with the integration of IoT and cloud. The primary objective of this review… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 108 publications
(90 reference statements)
0
3
0
Order By: Relevance
“…The report emphasizes that data loss is a serious security risk in cloud computing [24]. In order to avoid breaches and guarantee data integrity, cloud computing security concerns related to data loss are handled by encryption techniques and fine-grained authorization [25]. The study discusses data loss security challenges, especially in light of insider attacks and cloud vulnerabilities.…”
Section: Data Lossmentioning
confidence: 99%
See 1 more Smart Citation
“…The report emphasizes that data loss is a serious security risk in cloud computing [24]. In order to avoid breaches and guarantee data integrity, cloud computing security concerns related to data loss are handled by encryption techniques and fine-grained authorization [25]. The study discusses data loss security challenges, especially in light of insider attacks and cloud vulnerabilities.…”
Section: Data Lossmentioning
confidence: 99%
“…There is no mention of account hijacking security vulnerabilities in the material that is provided. Weak authentication procedures, unsecured API interfaces, data loss, and leakage are some of the security challenges [25] [27]. Data theft results from the compromise of confidentiality and integrity caused by account or service traffic hijacking.…”
Section: Account Hijackingmentioning
confidence: 99%
“…Devices produced by different manufacturers may use different communication protocols and data formats, leading to ineffective interaction and integration between devices. Additionally, IoT devices typically have lower computing and storage capabilities, making them vulnerable to security attacks [10], which could result in issues such as data breaches [11] and device tampering [12]. Furthermore, privacy protection and data security are also significant challenges faced by the IoT.…”
mentioning
confidence: 99%