2019
DOI: 10.3390/fi11060127
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era

Abstract: The Internet of Things (IoT) is rapidly changing our society to a world where every "thing" is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every busines… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 43 publications
(17 citation statements)
references
References 154 publications
(221 reference statements)
0
14
0
1
Order By: Relevance
“…Also, we are aware that a comprehensive and thorough discussion on how Fog computing could tackle the IIoT security requirements would require a dedicated treatment that would result in an entire paper itself, which is out of the scope of this work (for instance, in [255] we focus on how Cloud requirements can impact IoT). Thus, the aim of this section is to provide food for thought on the topic and a source of inspiration for future research, rather than an exhaustive analysis.…”
Section: Opportunities Enabled By Fog Computingmentioning
confidence: 99%
“…Also, we are aware that a comprehensive and thorough discussion on how Fog computing could tackle the IIoT security requirements would require a dedicated treatment that would result in an entire paper itself, which is out of the scope of this work (for instance, in [255] we focus on how Cloud requirements can impact IoT). Thus, the aim of this section is to provide food for thought on the topic and a source of inspiration for future research, rather than an exhaustive analysis.…”
Section: Opportunities Enabled By Fog Computingmentioning
confidence: 99%
“…By exploiting Edge and Fog computing, the Digital Twin can offload time-sensitive processing from the physical object, which in turn contributes towards further optimizations of the hardware costs. Additionally, new algorithms for efficient data filtering, envisioning privacy and security improvements [9], can be applied and the data can be restricted within a trusted private infrastructure. Finally, due to the close proximity, Edge-based Digital Twins can use the available radio network information to adapt the physical objects operations or to optimize resource allocation in order to improve the Quality of Experience (QoE).…”
Section: B Computingmentioning
confidence: 99%
“…Figure 2 illustrates the design of CC that includes a start-to-finish reference design that represents the layers of the Open Systems Interconnection (OSI) Model. CC is a complicated design with multiple zones of vulnerability [37]. The components of CC are as follows:…”
Section: Design Of the Cloudmentioning
confidence: 99%