Abstract

The internet of things (IoT) is rapidly changing our society to a world where every “thing” is connected to the internet, making computing pervasive like never before. It is increasingly becoming a ubiquitous computing service, requiring huge volumes of data storage and processing. Unfortunately, due to the lack of resource constraints, it tends to adopt a cloud-based architecture to store the voluminous data generated from IoT application. From a security perspective, the technological revolution introduced by IoT and cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. This chapter focus on security considerations for IoT from the perspectives of cloud tenants, end-users, and cloud providers in the context of wide-scale IoT proliferation, working across the range of IoT technologies. Also, this chapter includes how the organization can store the IoT data on the cloud securely by applying different Access control policies and the cryptography techniques.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call