Abstract

The IoT is in need of an advanced prototype for security, which considers the security issues from a holistic perspective comprising the advanced users and their intercommunication with this technology. In this paper, it has been analyzed and compared how current approaches are ensuring fundamental and basic secu-rity requisites and securing intercommunication of IoT, along with the rolling challenges and scope for research work in this field in the coming future. Cloud Computing is today's generation advanced technology services are made available for customers per utilization basis. Servers are being utilized on cloud to out-source their highly valuable data. Though there are many benefits of cloud computing. However, it has security threads of pivotal confidential data. Users of cloud technology can't count on the cloud service sup-pliers for the safety of the pivotal confidential data. Therefore, a Third-Party Authenticator is required which authenticates the cloud data from the side of users or holders of the data. Security of sensitive data is of questionable nature due to the presence of various entities. Cloud Service Providers along with Data Users are equally in charge for putting the security of the pivotal confidential data at risk. Surveys have sug-gested that huge storage systems cannot be trusted completely; and all of them can be hacked.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call