2016
DOI: 10.1109/jiot.2015.2460333
|View full text |Cite
|
Sign up to set email alerts
|

Twenty Security Considerations for Cloud-Supported Internet of Things

Abstract: To realise the broad vision of pervasive computing, underpinned by the "Internet of Things" (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends towards the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy and personal safety risks that arise beyond … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
167
0
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 270 publications
(169 citation statements)
references
References 67 publications
0
167
0
2
Order By: Relevance
“…INTRODUCTION Unikernels are generating significant interest as a potential breakthrough in virtualisation technology, due to their improved security, small footprint, fast boot time and wholesystem optimisation (see § II). These benefits align very well with service-oriented architectures [1], microservice architectures [2], the needs of the Internet of Things (IoT) [3], and edge/fog computing [4].…”
mentioning
confidence: 63%
“…INTRODUCTION Unikernels are generating significant interest as a potential breakthrough in virtualisation technology, due to their improved security, small footprint, fast boot time and wholesystem optimisation (see § II). These benefits align very well with service-oriented architectures [1], microservice architectures [2], the needs of the Internet of Things (IoT) [3], and edge/fog computing [4].…”
mentioning
confidence: 63%
“…Jatinder Singh et al, [6] deals with on security considerations for IoT from the perspectives of Cloud tenants, end-users, and Cloud providers, in the context of wide-scale IoT proliferation, working across the range of IoT technologies. It analyses the current state of IoT-Cloud offerings to make explicit the security considerations that require further work.…”
Section: E Twenty Security Considerations For Cloud-supported Internmentioning
confidence: 99%
“…Efforts in summarizing challenges of security in IoT can be found in [40] [45]. Detail taxonomy of security challenges can be found in [41].On the other hand, comprehensive identification of security challenges and requirements in IoT architecture is also carried out by various researchers most notable of them can be found in [43] [44] [45] [40].…”
Section: Security Threats and Attacks In Iotmentioning
confidence: 99%