2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and I 2017
DOI: 10.1109/ithings-greencom-cpscom-smartdata.2017.105
|View full text |Cite
|
Sign up to set email alerts
|

Integration of Cloud Computing with Internet of Things: Challenges and Open Issues

Abstract: Abstract-The Internet of Things (IoT) is becoming the nextInternet-related revolution. It allows billions of devices to be connected and communicate with each other to share information that improves the quality of our daily lives. On the other hand, Cloud Computing provides on-demand, convenient and scalable network access which makes it possible to share computing resources; indeed, this, in turn, enables dynamic data integration from various data sources. There are many issues standing in the way of the suc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
77
0
3

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 144 publications
(80 citation statements)
references
References 21 publications
0
77
0
3
Order By: Relevance
“…Through cheap sensors, a lot of information can be collected from the surrounding environment that results in improving our life. Protecting IoT devices and their communication channels become a mandatory task to prevent sensitive information disclosure which can lead to literally lose lives [27,31]. The access control is used to protect system resources by limiting the access only to authorized users [32,33].…”
Section: Risk-based Access Control Model For Iotmentioning
confidence: 99%
“…Through cheap sensors, a lot of information can be collected from the surrounding environment that results in improving our life. Protecting IoT devices and their communication channels become a mandatory task to prevent sensitive information disclosure which can lead to literally lose lives [27,31]. The access control is used to protect system resources by limiting the access only to authorized users [32,33].…”
Section: Risk-based Access Control Model For Iotmentioning
confidence: 99%
“…The integration of Cloud Computing and IoT was referred to as CloudIoT [1] and it is expected to be a disruptive technology as IoT able to use the vast resources provided by the Cloud. On the other hand, the Cloud can extend its scope through IoT and deliver new services A general view about the integration concept of the cloud with IoT (as means to overcome the challenges of IoT related to data storage, scalability, and energy efficiency) is presented in [5], where it is mentioned that the huge amount of resources available on the cloud can help the limited capabilities of IoT. An added advantage is the quick lowcost installation and integration for complex data processing.…”
Section: Figure 1 Interaction Of Iot With Cloud Via Internet [3]mentioning
confidence: 99%
“…Therefore, Cloud Computing has strong sources of data processing from Internet objects and large storage space. Users do not need to worry about buying storage because the storage is scaled as the data generated increases and the user pays only for the consumed storage [4,5]. It is estimated that, in the next two decades, the demand for Cloud Computing services will be further increased.…”
Section: Introductionmentioning
confidence: 99%
“…According to [34], [35] Fig.1, user/agent context, resource sensitivity, action severity and risk history. These inputs/risk factors are used to estimate the security risk associated with each access request.…”
Section: Access Control Requirements In the Iotmentioning
confidence: 99%