Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era

by   Michele De Donno, et al.

The Internet of Things (IoT) is rapidly changing our society to a world where every "thing" is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of Cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds.


The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective

In recent years, the existence of a significant cross-impact between Clo...

On the Cost of Cyber Security in Smart Business

In a world, as complex and constantly changing as ours cloud computing i...

Internet of Cloud: Security and Privacy issues

The synergy between the cloud and the IoT has emerged largely due to the...

Hybrid Serverless Computing: Opportunities and Challenges

In recent years, there has been a surge in the adoption of serverless co...

Cloud-aided collaborative estimation by ADMM-RLS algorithms for connected vehicle prognostics

As the connectivity of consumer devices is rapidly growing and cloud com...

Allocating Duplicate Copies for IoT Data in Cloud Computing Based on Harmony Search Algorithm

The Internet of things (IoT) generates a plethora of data nowadays, and ...

On the Management of Type 1 Diabetes Mellitus with IoT Devices and ML Techniques

The purpose of this Conference is to present the main lines of base proj...

Please sign up or login with your details

Forgot password? Click here to reset