2016
DOI: 10.1016/j.procs.2016.06.007
|View full text |Cite
|
Sign up to set email alerts
|

Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(21 citation statements)
references
References 9 publications
0
20
0
1
Order By: Relevance
“…Minimize data storage [4] Minimize the amount of data stored either on objects or in the cloud to reduce IoT breaches by deleting any portion of data not required to achieve a certain task Deduplication in [50] and anonymisation in [51] schemes Minimize data retention [4] Minimize data retention on IoT objects or in the cloud to prevent data breaches Transient data storage in [52] Encrypt data storage [4] IoT applications should store their data in encrypted format either on the objects or in the cloud Secure storage schemes in [53] and SE in [54] Prevent data leakage [4] Although IoT data may be stared in encrypted format, it is still vulnerable to side channel attacks Monitoring and auditing, SE, anonymisation schemes, and transient data storage Ensure data availability [4] Both CSSs and IoT objects must implement efficient methods to ensure availability of their data Deduplication schemes and Recovery strategy in [55] Ensure authorized access [4] Offering solid mechanisms to control access to IoT data at rest is essential to prevent unauthorized access Physical security and access control in [56] Remove or hide sensitive data [4] IoT applications should first remove a personally identifiable information before storing it…”
Section: Purpose Implementation Techniquesmentioning
confidence: 99%
“…Minimize data storage [4] Minimize the amount of data stored either on objects or in the cloud to reduce IoT breaches by deleting any portion of data not required to achieve a certain task Deduplication in [50] and anonymisation in [51] schemes Minimize data retention [4] Minimize data retention on IoT objects or in the cloud to prevent data breaches Transient data storage in [52] Encrypt data storage [4] IoT applications should store their data in encrypted format either on the objects or in the cloud Secure storage schemes in [53] and SE in [54] Prevent data leakage [4] Although IoT data may be stared in encrypted format, it is still vulnerable to side channel attacks Monitoring and auditing, SE, anonymisation schemes, and transient data storage Ensure data availability [4] Both CSSs and IoT objects must implement efficient methods to ensure availability of their data Deduplication schemes and Recovery strategy in [55] Ensure authorized access [4] Offering solid mechanisms to control access to IoT data at rest is essential to prevent unauthorized access Physical security and access control in [56] Remove or hide sensitive data [4] IoT applications should first remove a personally identifiable information before storing it…”
Section: Purpose Implementation Techniquesmentioning
confidence: 99%
“…2. Toma de decisiones en organizaciones: Los sensores usados para percibir el entorno físico permiten recuperar información en tiempo real que al ser correctamente gestionada apoya la toma de decisiones en las organizaciones [38], la información recuperada por los dispositivos IoT debe ser tratada y almacenada de acuerdo con la clasificación de la información definida en la política de seguridad de la información de la organización, dicha información puede ser almacenada en la nube de forma segura [39]. Para tomar una decisión en la organización se deben analizar una gran cantidad de datos, lo que supone un gran número de sensores y actuadores conectados a la red, por lo que se implementa la tecnología LiFi para optimizar la velocidad en la transmisión de los datos, para su posterior procesamiento y almacenamiento tanto en la nube pública, como en la nube privada.…”
Section: Domóticaunclassified
“…In [5] authors presented a survey on secure integration of IoT and Cloud Computing, and then they proposed a model for securing this integration. A secure storage system was proposed for storing IoT data in [6], the authors applied a Role Based Access Control policy (RBAC) combined with AES/RSA encryption to manage authenticity and data security, but Role-based access controls (RBAC) may not suffice in the IoT because of the lack of flexibility.. In [7] an authentication model was described based on different access use case scenarios in IoT Clouds.…”
Section: Related Workmentioning
confidence: 99%