Integration of Cloud Computing with Internet of Things. Группа авторов

Читать онлайн.
Название Integration of Cloud Computing with Internet of Things
Автор произведения Группа авторов
Жанр Программы
Серия
Издательство Программы
Год выпуска 0
isbn 9781119769309



Скачать книгу

pp. 1-4, August 15, 2007, archived from the original (PDF) on 6 Mar 2009.

      23. Stojmenovic, I. and Wen, S., The FC paradigm: Scenarios and security issues, in: 2014 IEEE Federated Conference on Computer Science and Information Systems, pp. 1–8, 2014.

      24. Visalakshi, P., Paul, S., Mandal, M., Green Computing, International Journal of Modern Engineering Research (IJMER), in: Proceedings of the National Conference on Architecture, Software systems and Green computing (NCASG), Paiyanoor (India), pp. 63–69, 2013.

      25. Arshad, R., Zahoor, S., Shah, M.A., Wahid, A., Yu, H., Green IoT: An investigation on energy saving practices for 2020 and beyond. IEEE Access, 5, 667–681, 2017.

      26. Ganzha, M., Paprzycki, M., Pawłowski, W., Szmeja, P., Wasielewska, K., Alignment-based semantic translation of geospatial data, in: 3rd IEEE International Conference on Advances in Computing, Communication & Automation (ICACCA)(Fall), pp. 1–8, 2017.

      27. Gyrard, A. and Serrano, M., Connected smart cities: Interoperability with seg 3.0 for the internet of things, in: 30th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 796–802, 2016.

      28. Palo, H.K. and Mohanty, M.N., Analysis of Speech Emotions Using Dynamics of Prosodic Parameters, in: Cognitive Informatics and Soft Computing, pp. 333–340, Springer, Singapore, 2020.

      29. Palo, H.K., Behera, D., Rout, B.C., Comparison of Classifiers for Speech Emotion Recognition (SER) with Discriminative Spectral Features, in: Advances in Intelligent Computing and Communication, pp. 78–85, Springer, Singapore, 2020.

      31. Palo, H.K., Kumar, P., Mohanty, M.N., Emotional Speech Recognition using Optimized Features. Int. J. Res. Electr. Comput. Eng., 5, 4, 4–9, 2017.

      32. Mohanty, M.N. and Palo, H.K., Child emotion recognition using probabilistic neural network with effective features. Measurement, Elsevier, 152, 107369, 2020.

      1 *Corresponding author: [email protected]

      2

      Measures for Improving IoT Security

       Richa Goel1*, Seema Sahai1, Gurinder Singh1 and Saurav Lall2

       1Amity International Business School, Noida, India

       2Azure IoT, Microsoft Seattle, Seattle, Washington, USA

       Abstract

      In today’s world of Digital Transformation, IoT banking/online transaction is a major point of concern for the user. IoT security plays a vital role to develop the trust of end users for making frequent use of the same. There have been IoT security breaches in recent years. As a result, immoral hackers have ample opportunities to intercept and change or misuse the information. Through this paper we are going to discuss various issuse/problems faced in terms of IoT security along with the measure to be chosen to achieve higher security while going for online transactions.

      Keywords: IoT security, digital transformation, breach of trust

      Through the World Wide Web, we’ve entered into a brand new era of connectivity. “Things have identities and virtual personalities operating in smart places using intelligent interfaces to connect and communicate inside social, environmental and user contexts [7].” More than twenty billion devices were connected with each other in 2017. This means that the potential risk of cyber-attacks is going on increasingly, equally.

      Gartner’s special report indicates that there is a high level of risk to all the IoT devices, whether it is the platform, their operating systems or even the other devices to which they are connected [10]. The kind of risk that exists is that ranging from physical tampering to information hacking and impersonation and many more. Organizations’ functioning has completely changed with the coming in of IOT. With this change a whole range of risks have also emerged and it has become the utmost priority of organizations to manage these risks.

      1 a. Expansion of the ‘IoT’ to the ordinary network, network controls and cell network

      2 b. website that links everyone

      3 c. exchange of objects with each other

      4 d. Accessible easily.

      The code layer, information layer, physical layer and networking layer contain many technical obstacles to IoT security. To order to protect IoT, numerous reports discuss these security topics. Experiments that illustrate IoT’s human experience are rare, though. Some of the latest works on IoT defense still consider the technical aspect. In order to achieve success in technology performance or safety management, users need to understand Dhillon and Torkzadeh’s [9] expectations, values and beliefs.

      We recognize that consumer expectations and values are balanced against technology to achieve positive results for information technology and the effective management of legislation. IoT Securing Science is in its infancy as it is a very active and recent research field. Further emphasis should also be placed on the confidentiality, fairness and privacy of IoT data and their credibility. Inside this article, we perform a thorough analysis to address numerous IoT security issues/problems along with the step to use the firewall for greater protection when performing online transactions.