Reference Hub2
Integration of the Internet of Things and Cloud: Security Challenges and Solutions – A Review

Integration of the Internet of Things and Cloud: Security Challenges and Solutions – A Review

Chellammal Surianarayanan, Pethuru Raj Chelliah
Copyright: © 2023 |Volume: 13 |Issue: 1 |Pages: 30
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781668479810|DOI: 10.4018/IJCAC.325624
Cite Article Cite Article

MLA

Surianarayanan, Chellammal, and Pethuru Raj Chelliah. "Integration of the Internet of Things and Cloud: Security Challenges and Solutions – A Review." IJCAC vol.13, no.1 2023: pp.1-30. http://doi.org/10.4018/IJCAC.325624

APA

Surianarayanan, C. & Chelliah, P. R. (2023). Integration of the Internet of Things and Cloud: Security Challenges and Solutions – A Review. International Journal of Cloud Applications and Computing (IJCAC), 13(1), 1-30. http://doi.org/10.4018/IJCAC.325624

Chicago

Surianarayanan, Chellammal, and Pethuru Raj Chelliah. "Integration of the Internet of Things and Cloud: Security Challenges and Solutions – A Review," International Journal of Cloud Applications and Computing (IJCAC) 13, no.1: 1-30. http://doi.org/10.4018/IJCAC.325624

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The integration of IoT and cloud poses increased security challenges. Implementing security mechanisms in IoT systems is challenging due to the availability of limited resources, large number of devices, heterogeneity of devices, generation of bulk data, etc. Likewise, cloud resources are also vulnerable to security issues due to virtualization, insider threats, data loss, data breaches, insecure APIs, etc. Security is of major concern with the integration of IoT and cloud. The primary objective of this review is to highlight the security issues associated with an IoT system and cloud system and with the integration of the two, as well as to highlight solutions in each case. The secondary objective is to describe popular IoT-cloud platforms and also to highlight how such platforms facilitate secure integration. Ultimately a highlight on a shared responsibility model of implementing security is emphasized as both IoT users and cloud service providers have to cooperatively share the responsibility to deploy secure cloud-based IoT applications.