Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2808797.2809361acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
short-paper

An Authentication Model for IoT Clouds

Published: 25 August 2015 Publication History

Abstract

Nowadays, the combination between Cloud computing and Internet of Things (IoT) is pursuing new levels of efficiency in delivering services, representing a tempting business opportunity for IT operators of increasing their revenues. However, security is considered as one of the major factors that slows down the rapid and large scale adoption and deployment of both IoT and Cloud computing. In this paper, considering such an IoT Cloud scenario, we present an architectural model and several use cases that allow different types of users to access IoT devices.

References

[1]
Unleashing potential of Future Internet and Cloud computing, http://ec.europa.eu/digital-agenda/en/news/unleashing-potential-futureinternet-and-cloud-computing, November 2013.
[2]
M. Villari, A. Celesti, M. Fazio, and A. Puliafito, "Alljoyn lambda: An architecture for the management of smart environments in iot," in 2014 International Conference on Smart Computing Workshops (SMARTCOMP Workshops), Nov 2014, pp. 9--14.
[3]
M. Fazio, A. Celesti, M. Villari, and A. Puliafito, "The need of a hybrid storage approach for iot in paas cloud federation," in 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA), May 2014, pp. 779--784.
[4]
M. Fazio, A. Celesti, A. Puliafito, and M. Villari, "An integrated system for advanced multi-risk management based on cloud for iot," in Advances onto the Internet of Things, ser. Advances in Intelligent Systems and Computing, S. Gaglio and G. Lo Re, Eds. Springer International Publishing, 2014, vol. 260, pp. 253--269.
[5]
Z.-K. Zhang, M. C. Y. Cho, and S. Shieh, "Emerging security threats and countermeasures in iot," in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ser. ASIA CCS '15. New York, NY, USA: ACM, 2015, pp. 1--6.
[6]
L. Grieco, A. Rizzo, S. Colucci, S. Sicari, G. Piro, D. D. Paola, and G. Boggia, "Iot-aided robotics applications: Technological implications, target domains and open issues," Computer Communications, vol. 54, no. 0, pp. 32 -- 47, 2014.
[7]
G. Suciu, A. Vulpe, S. Halunga, O. Fratu, G. Todoran, and V. Suciu, "Smart cities built on resilient cloud computing and secure internet of things," in Control Systems and Computer Science (CSCS), 2013 19th International Conference on, May 2013, pp. 513--518.
[8]
"Security issues and challenges for the iot-based smart grid," Procedia Computer Science, vol. 34, no. 0, pp. 532 -- 537, 2014.
[9]
M. Villari, A. Celesti, M. Fazio, and A. Puliafito, "A secure self-identification mechanism for enabling iot devices to join cloud computing," in Internet of Things. IoT Infrastructures, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2015, vol. 151, pp. 306--311.
[10]
Y. H. Hwang, "Iot security & privacy: Threats and challenges," in Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, ser. IoTPTS '15. New York, NY, USA: ACM, 2015, pp. 1--1.
[11]
Trusted Computing Group (TCG), http://www.trustedcomputinggroup.org.
[12]
P. England and T. Tariq, "Towards a programmable tpm," Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5471 LNCS, pp. 1--13, 2009.

Cited By

View all
  • (2023)A Comparative Analysis of Blockchain-Based Authentication Models for IoT NetworksSecure Edge and Fog Computing Enabled AI for IoT and Smart Cities10.1007/978-3-031-51097-7_18(227-240)Online publication date: 14-Dec-2023
  • (2022)A Mutual Authentication Method for Internet of ThingsSignal and Data Processing10.52547/jsdp.19.2.7319:2(73-86)Online publication date: 1-Sep-2022
  • (2022)A Review of Security and Privacy Concerns in the Internet of Things (IoT)Journal of Sensors10.1155/2022/57241682022(1-20)Online publication date: 29-Sep-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASONAM '15: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015
August 2015
835 pages
ISBN:9781450338547
DOI:10.1145/2808797
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 August 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cloud computing
  2. authentication
  3. internet of things
  4. security

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

ASONAM '15
Sponsor:

Acceptance Rates

Overall Acceptance Rate 116 of 549 submissions, 21%

Upcoming Conference

KDD '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)A Comparative Analysis of Blockchain-Based Authentication Models for IoT NetworksSecure Edge and Fog Computing Enabled AI for IoT and Smart Cities10.1007/978-3-031-51097-7_18(227-240)Online publication date: 14-Dec-2023
  • (2022)A Mutual Authentication Method for Internet of ThingsSignal and Data Processing10.52547/jsdp.19.2.7319:2(73-86)Online publication date: 1-Sep-2022
  • (2022)A Review of Security and Privacy Concerns in the Internet of Things (IoT)Journal of Sensors10.1155/2022/57241682022(1-20)Online publication date: 29-Sep-2022
  • (2022)Access Control and Authentication in IoTInternet of Things10.1007/978-981-19-1585-7_3(37-54)Online publication date: 27-May-2022
  • (2021)Internet of Things (IoT) Implementation in Learning Institutions: A Systematic Literature ReviewPertanika Journal of Science and Technology10.47836/pjst.29.1.2629:1Online publication date: 2021
  • (2021)Secured smart mobile app for smart home environmentMaterials Today: Proceedings10.1016/j.matpr.2020.07.53637(2109-2113)Online publication date: 2021
  • (2021)Lightweight capability-token for consent-based authentication protocol for smart sensor nodesJournal of Information Security and Applications10.1016/j.jisa.2021.10302463:COnline publication date: 1-Dec-2021
  • (2021)Data Security in the Internet of ThingsBig Data Analytics for Internet of Things10.1002/9781119740780.ch12(265-284)Online publication date: 2-Apr-2021
  • (2020)An Efficient Key Management Technique for the Internet of ThingsSensors10.3390/s2007204920:7(2049)Online publication date: 6-Apr-2020
  • (2020)Developing a Model of Cloud Computing Protection System for the Internet of Things2020 IEEE XVIth International Conference on the Perspective Technologies and Methods in MEMS Design (MEMSTECH)10.1109/MEMSTECH49584.2020.9109456(53-58)Online publication date: Apr-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media