2017 IEEE 16th International Symposium on Network Computing and Applications (NCA) 2017
DOI: 10.1109/nca.2017.8171355
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing and evaluating an architecture for privacy in the integration of Internet of Things and cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“… It presents an analytical analysis regarding the costs involved in implementing security and privacy mechanisms directly at the IoT devices. It presents a new experimental evaluation of these architectures, expanding previous results [ 10 ] and considering new scenarios. The evaluation is carried out through simulations conducted in the ns-3 network simulator, considering WSNs of different sizes (ranging from 4 to 160 devices) and using a solution without security as the baseline.…”
Section: Introductionmentioning
confidence: 91%
See 1 more Smart Citation
“… It presents an analytical analysis regarding the costs involved in implementing security and privacy mechanisms directly at the IoT devices. It presents a new experimental evaluation of these architectures, expanding previous results [ 10 ] and considering new scenarios. The evaluation is carried out through simulations conducted in the ns-3 network simulator, considering WSNs of different sizes (ranging from 4 to 160 devices) and using a solution without security as the baseline.…”
Section: Introductionmentioning
confidence: 91%
“…In an earlier version of this work [ 9 ], we briefly presented an architecture that extends UPECSI by transferring the privacy enforcement tasks from the gateway to the IoT devices. The resulting architecture is called PROTeCt ( P rivacy a R quitecture for integrati O n of internet of T hings and C loud computing), and a preliminary evaluation showed its practical behavior [ 10 ]. PROTeCt adapts all communication protocols to consider the constrained nature of most IoT devices, extending the architecture protection spectrum, i.e., it decreases the attack surface since data leaves the IoT devices already protected.…”
Section: Introductionmentioning
confidence: 99%
“…The later progress within the miniaturisation of electronic components and remote communications has empowered the appearing of IoT [35]. IoT comprises of large-scale, dispersed multi-factor elements positioned in a dynamically changing environment displaying remote network [36].…”
Section: Internet Of Thingsmentioning
confidence: 99%
“…A key issue in the combination of cloud and IoT is security since user confidential information gathered by IoT devices send to the cloud. The architecture evaluated by Pacheco et al [35] is a privacy architecture for the integration of cloud computing and IoT. This architecture has presented an approach for protecting data created by IoT devices without applying a safe transference level protocol.…”
Section: Overview Of the Selected Platformsmentioning
confidence: 99%
“…Privacy: Only authorized entities should be able to use services [23]. The cryptographic mechanisms impose some overhead in terms of processing and amount of data transmitted [99]. Furthermore, lack of standards, secure authentication and authorization policies are yet to be discussed.…”
Section: Challengesmentioning
confidence: 99%