Risks and Challenges of Using Cloud Computing in the Internet of Things (2024)

Related papers

Cloud computing security for e-learning during COVID-19 pandemic

Indonesian Journal of Electrical Engineering and Computer Science

Indonesian Journal of Electrical Engineering and Computer Science, 2022

The demand for e-learning services increased during the developments of the COVID-19 virus and its rapid spread, and the recommendations of the World Health Organization (WHO) that social distancing should be required. The rapid transition to the e-learning environment quickly led to the neglect of some security aspects, which led to an increase in cyber attacks targeting computer accounts, which is one of the most important pillars of e-learning. In these papers, the attacks that target the cloud computer used in the most important e-learning have been studied and classified according to the victim using an inductive methodology based on global statistics related to cyber attacks and recent research. And suggest appropriate solutions to avoid its occurrence in the near future and raise the level of protection for those computer clouds.

View PDFchevron_right

HYBRID CLOUD-EDGE ARCHITECTURES FOR AI-DRIVEN APPLICATIONS: OPPORTUNITIES AND CHALLENGES

IJCSMC Journal

International Journal of Computer Science and Mobile Computing (IJCSMC), 2020

IoT has seen an exponential rise in the number of devices, and actual-time processing of data has become necessary, making AI-driven applications adopt hybrid Cloud-edge designs. These systems are able to process and analyze data in an optimal way using the advantages of edge and cloud computing ; moreover, they are able to face problems associated with a prolonged delay in delivery and limited bandwidth as well as data vulnerability. The prospects of utilizing hybrid cloud-edge are discussed in this paper for handling improved network capacity for data handling, faster response time, optimal usage of resources, and enhanced security. It also considers the challenges of implementing and deploying these designs, chiefly in terms of addressing concerns with risk, data coordination, and compliance. This report has been written with the intent of tackling the possible challenges and engaging in relevant recommendations which may help in optimizing the use of such architectures.

View PDFchevron_right

Vehicle Tracking System Approaches: A Systematic Literature Review

IJCSMC Journal

International Journal of Computer Science and Mobile Computing (IJCSMC), 2024

The efficiency, security, and privacy of vehicle tracking systems can be improved through the development of a sophisticated real-time tracking system, the implementation of security measures to safeguard vehicles and their cargo, and the proposal of innovative solutions and best practices. This research adopts a comprehensive approach, which includes an extensive review of existing literature, the design and implementation of the tracking system, and systematic evaluations of its impact on transportation and logistics. The findings of this study demonstrate that the advanced tracking system provides accurate and up-to-date information on vehicle locations and performance, while the integration of security measures enhances the protection of vehicles and cargo. Furthermore, this research identifies the current state of vehicle tracking technology, identifies areas for improvement, and offers recommendations to advance the field. Overall, this study contributes to the progress of vehicle tracking technology by offering practical solutions, promoting data privacy, and optimizing compatibility, while also providing valuable insights into the performance and significance of these systems in the realm of logistics and transportation.

View PDFchevron_right

IT Security Management Challenges of State Universities and Colleges

Cognizance Journal Multidisciplinary Studies

Cognizance Journal of Multidisciplinary Studies (CJMS), 2024

This study aimed to evaluate the cybersecurity management challenges encountered by state universities and colleges in the Zamboanga Peninsula region during the 2021-2022 academic year. The findings revealed that the key challenges included inadequate management support, budget limitations, infrastructure deficiencies, and skills gaps. The conclusions drawn from the study indicated the need for enhancing IT security management practices among state universities and colleges, underscoring the significance of addressing the identified challenges. Recommendations were provided for various stakeholders, including university officials, deans, heads of management offices, program chairs, faculty members, employees, students, and future researchers, with the aim of improving IT security practices and promoting awareness and education in this field.

View PDFchevron_right

Enhancing Data Security through Advanced Cryptographic Techniques

Mohammad Abudalou, IJCSMC Journal

International Journal of Computer Science and Mobile Computing (IJCSMC), 2024

In a time when digital technology is everywhere, it is essential to have strong data security, This study addresses data security, focusing on advanced encryption methods, A secure connection, or encryption, protects private data from tampering and unauthorized access, The research explores modern cryptographic technologies, including blockchain-based solutions, quantum-resistant algorithms, and homomorphic cryptography, These evolving approaches provide increased defense against changing cyber threats, The study examines the theoretical foundations, real-world applications, and potential impacts on data security across a range of industries. The paper will first provide a comprehensive analysis of the cryptographic techniques now in use and then highlight emerging and contemporary risks to data security, Next, you will focus on the basics of contemporary encryption technologies, emphasizing their importance and potential uses. Case studies from healthcare, finance, and the Internet of Things (IoT) demonstrate how advanced encryption is used in real-world settings and how it impacts data security, The case studies highlight the necessity of new and innovative technologies to protect data (in all scenarios) when it is in motion, at rest, and during processing. In this paper, a rigorous methodology for evaluating the security and usability of cutting-edge cryptographic algorithms will be covered, the utility of these techniques in enhancing data security is highlighted by presenting experimental results and comprehensive data analysis. This paper concludes by highlighting how important it is to implement advanced cryptographic methods to address today's data security issues, it highlights the critical role that cryptography plays in protecting confidential information and provides a solid foundation for upcoming investigations and developments in the field of data security.

View PDFchevron_right

CYBER SECURITY FOR CHEMICAL PLANT USING ARTIFICIAL INTELLIGENCE

IJCSMC Journal

International Journal of Computer Science and Mobile Computing (IJCSMC), 2024

The adding number of cyber-attacks on diligence demands immediate attention for furnishing further secure mechanisms to guard diligence and minimize pitfalls. An administrative control and data accession (SCADA) system employing the distributed networks of detectors and selectors that interact with the physical terrain is vulnerable to attacks that target the interface between the cyber and physical subsystems. These cyber-attacks are generally vicious conduct that beget uninvited results in the cyber physical world, for illustration, the Stuxnet( 2010) attack that targeted Iran's nuclear centrifuges. An attack that hijacks the detectors in an attempt to give false readings to the regulator can be used to dissemble normal system operation for the control system, while the bushwhacker can commandeer the selectors to shoot the system beyond its safety range. AI result can identify shadow data, cover for abnormalities in data access and alert cybersecurity professional about implicit pitfalls by anyone penetrating the data or sensitive information. This proposes a process- apprehensive approach with the use of steady equations grounded on the physical and chemical parcels of the process and a Multiple Security sphere Nondeducibility (MSDND) frame to descry when a detector signal is being virulently manipulated. A system without any MSDND secure information flows between the AI and cyber observers has smaller sins that can be exploited.

View PDFchevron_right

Performance, privacy, and security issues of TCP/IP at the application layer: A comprehensive survey

Tim Murkomen

GSC Advanced Research and Reviews, 2024

TCP/IP is the backbone of modern network communication, connecting devices across the world. TCP/IP at its core is a suite of protocols that enables the transmission of data between computers, facilitating the foundation of the interconnected global network. At the Application Layer of TCP/IP is where the interaction between software applications and the network occurs. The user-centric protocols such as HTTP, SMTP, FTP, POP3, IMAP and DNS facilitate various tasks at this layer such as web browsing, email communication, and file transfer. This comprehensive survey conducted an exploration of the performance, security and privacy issues at the application layer of the TCP/IP. It initiated by providing a background of TCP/IP model, it's architecture and the core characteristics, with major focus on the application layer. This paper aimed to discuss the state-of-the-art of performance, privacy and security concerns in TCP/IP application layer. It also proposed future research areas to equip researchers, practitioners, policy makers and the decision makers with tangible knowledge, offering guidance in navigating the performance, privacy and security concerns in TCP/IP Application Layer. It aimed to discuss the current performance, privacy and security research gaps at the Application Layer of the TCP/IP Model. The findings of this research sheds light on the performance, privacy and security issues while suggesting the countermeasures to strengthen and optimize the overall performance, security and privacy of TCP/IP model at the application layer. The paper finally suggests future directions and research areas at the TCP/IP application layer.

View PDFchevron_right

The Innocent Perpetrators: Reflectors and Reflection Attacks

Srinivas Arukonda

2015

In this paper we make a comparable study of the various types of Reflector Denial of Service attacks popularly known as DRDoS attacks. We discuss their cause, effects, defense mechanisms proposed so far, the effectiveness of these defense mechanisms and their future relevance. We have also shown how reflection attacks are a potential threat to the cloud which is one of the most popular and highly evolving arenas in the Internet.

View PDFchevron_right

A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security

ASMA QAISER

2024

View PDFchevron_right

Privacy Preserving Authentication of IoMT in Cloud Computing

BRAMAH HAZELA

EAI endorsed transactions on internet of things, 2024

View PDFchevron_right

Risks and Challenges of Using Cloud Computing in the Internet of Things (2024)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 6054

Rating: 4.9 / 5 (69 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.