Integration of Cloud Computing with Internet of Things

Здесь есть возможность читать онлайн «Integration of Cloud Computing with Internet of Things» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Integration of Cloud Computing with Internet of Things: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Integration of Cloud Computing with Internet of Things»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

The book aims to integrate the aspects of IoT, Cloud computing and data analytics from diversified perspectives. The book also plans to discuss the recent research trends and advanced topics in the field which will be of interest to academicians and researchers working in this area. Thus, the book intends to help its readers to understand and explore the spectrum of applications of IoT, cloud computing and data analytics.
Here, it is also worth mentioning that the book is believed to draw attention on the applications of said technology in various disciplines in order to obtain enhanced understanding of the readers. Also, this book focuses on the researches and challenges in the domain of IoT, Cloud computing and Data analytics from perspectives of various stakeholders.

Integration of Cloud Computing with Internet of Things — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Integration of Cloud Computing with Internet of Things», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Notifications help you to see what’s going on your firewall and to warn you of potential intrusion attempts on your device in different ways.

2.8 Monitoring of Firewalls and Good Management

2.8.1 Surveillance

Whatever firewall you use, it is a smart thing to obey and occasionally show firewall logs. You will improve your protection automatically through careful observance of your logs. Most hacks can theoretically be avoided if people track their logs because most hackers will check a laptop before hacking them. When a participant in the PC nursing supervisor detects these tests, they will check that their machines are sensitive to what they were checking. You’ll be shocked by the amount of people WHO tries to access your laptop, but not your results, until you start installing your firewall and reviewing logs.

The reasons behind tracking the log files are three: There are three key reasons:

Preventative Measures: You can see what harbors and services hackers are able to manipulate by tracking the firewall logs. Such knowledge will then be used to guarantee that the machine is safe against such exploits. For starters, when you see on your logs that other people are checking and investigating your machine for port 3127, you will discover that people and viruses will check for the backdoors on your machine which are left behind by the early version of the My Doom virus. You will then ensure that this new attack doesn’t damage the computers.

2.8.2 Forensics

If your machine is hit by a long distance virus, then you can check the date and time it was installed on your device by the hacker. Forensics: You will be able to search your log files for maltreatment of this data through all of this point of time, however the hacker has infiltrated your computer. This information is then used to encrypt your computer.

Officials reporting: With the data stored in the log files, you are able to supply officials with the details whether a hack or attempt is a success. The logs send you the IP address, system and time and date of the offending device.

2.8.3 Secure Firewalls for Private

A Free online armor of Emsisoft

The Firewall Outpost

Zone Free Alarm

2.8.4 Business Firewalls for Personal

The McAfee Human Firewall

The Firewall Outpost Pro

Zone Pro/Plus Alarm

2.8.5 IoT Security Weaknesses

There’s no single IoT security vendor that can provide a full end-to-end security solution. However, some organizations provide more than others and some may provide a full end-to-end IoT security solution in tandem with their partner ecosystem.

Authentication/authorization is one of the biggest issues to tackle in IoT security, followed by access control and data encryption. IoT security respondents didn’t consider firewall, passwords, server security and privacy as a major weakness.

2.9 Conclusion

This chapter uses a value-driven reasoning method to establish goals for securing IoT. Some studies [9] have used Keeney’s meaning-focused approach in order to explain the goals and their relationships dependent on people’s interest, according to Keeney [20] values of knowledge. and their relationships based on people values and learning the importance of firewalls Figure 2.9.

Figure 29Where is security in IoT needed The valuefocused thought - фото 16

Figure 2.9Where is security in IoT needed.

The value-focused thought methodology has not been used to describe the protection goals of IoT from the consumer viewpoint. Extracting IoT security relevance from consumer expectations will enable administrators and professionals optimize IoT protection based on a detailed set of objectives.

This research adds to the scope of the literature by incorporating basic goals and strategies for protecting IoT. This research explores the largely unexplored field of IoT protection. We perform a systematic analysis utilizing value-focused reasoning that has helped to identify goals and protection steps clustered into four simple and medium-sized priorities, which are important for protecting IoT from the individual perspective. We see why the device’s firewall is a must to defend the device from unethical hackers or viruses. We should be able to use the applications on the IoT with sufficient supervision and rules to further improve the protection of our device. We lock our doors to deter stolen robes when we leave our building, why not use a firewall to protect your computer?

References

1. Abbas, R., Michael, K., Michael, M.G., Using a Social-Ethical Framework to Evaluate Location-Based Services in an IoT of Things World. Int. Rev. Inf. Ethics , 22, 12, 2015.

2. Abie, H. and Balasingham, I., Risk-based adaptive security for smart IoT in eHealth, in: Proceedings of the 7th International Conference on Body Area Networks , February, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 269–275, 2012.

3. Agarwal, Y. and Dey, A.K., Toward Building a Safe, Secure, and Easy-to-Use IoT of Things Infrastructure. Computer , 49, 4, 88–91, 2016.

4. Bassi, A. and Horn, G., IoT of Things in 2020 A ROADMAP FOR THE FUTURE, European Commission: Information Society and Media , 22, 97–114, 2008.

5. Dhillon, G. and Torkzadeh, G., Value-focused assessment of information system security in organizations. Inf. Syst. J ., 16, 3, 293–314, 2006.

6. Gartner, (n.d.), IoT of Things: The Gartner Perspective, Retrieved May 2, 2020, from https://www.gartner.com/en/information-technology/insights/IoT-of-things.

7. Hunter, M.G., The use of RepGrids to gather interview data about information systems analysts. Inf. Syst. J ., 7, 1, 67–81, 1997.

8. Keeney, R.L. and McDaniels, T.L., Value-focused thinking about strategic decisions at BC Hydro. Interfaces , 22, 6, 94–109, 1992.

9. Keeney, R.L., The value of IoT commerce to the customer. Manage. Sci ., 45, 4, 533–542, 1999.

10. Kounelis, I., Baldini, G., Neisse, R., Steri, G., Tallacchini, M., Pereira, A.G., Building trust in the human? IoT of things relationship. IEEE Technol. Soc. Mag ., 33, 4, 73–80, 2014.

11. Rakic-Skokovic, M., Guidelines for Overcoming some IoT Security Issues , XVII International Scientific Conference on Industrial Systems, 1–6, 2017, Retrieved from http://www.iim.ftn.uns.ac.rs/is17.

12. OWASP Application Security – Building and Breaking Applications, OWASP, https://owasp.org/www-community/OWASP_Application_Security_FAQ

13. FTC. (2017). Privacy & Data Security Update, | Federal Trade Commission, 2016. Retrieved from https://www.ftc.gov/reports/privacy-data-security-update-2016.

1 *Corresponding author: rgoel@amity.edu

3

An Efficient Fog-Based Model for Secured Data Communication

V. Lakshman Narayana1* and R. S. M. Lakshmi Patibandla2†

1Department of IT, Vignan’s Nirula Institute of Technology & Science for Women. Peda Palakaluru, Guntur, Andhra Pradesh, India

2Department of IT, Vignan’s Foundation for Science, Technology and Research, Guntur, Andhra Pradesh, India

Abstract

Fog Computing is an effective computing model that expands Cloud Computing administrations to the edge of the system to provide security for the data. The new features offered by Fog Computing if effectively applied for time-sensitive applications that can possibly quicken the revelation of early crisis circumstances to help smart dynamic applications. While promising, how to plan and grow certifiable fog registering based information checking frameworks is as yet an open issue. As an initial step to address this issue, in the proposed work, a fog based model for Secured data communication is developed and shows the functional relevance and centrality of such a framework. In this work, a unique Fog Based elevated level programming model for sensitive applications that are geospatially circulated, enormous scope is designed. The fog registering system gives the model to oversee IoT benefits in the fog prospect by methods for a certifiable proving position. Moreover, the system encourages the communication between the gadgets, fog gadget arrangements, IoT administration and dynamic asset provisioning in a secured way. The proposed model overcomes communication issues in IoT gadgets to build up a powerful programming condition with fog computing method in performing resource handling, validations and IoT device arrangements. The proposed Fog Computing model effectively establishes communication among IoT devices and provides security to the data during communication.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Integration of Cloud Computing with Internet of Things»

Представляем Вашему вниманию похожие книги на «Integration of Cloud Computing with Internet of Things» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Integration of Cloud Computing with Internet of Things»

Обсуждение, отзывы о книге «Integration of Cloud Computing with Internet of Things» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x