دانلود رایگان مقاله انگلیسی ادغام امن اینترنت اشیا و محاسبات ابری - الزویر 2018

عنوان فارسی
ادغام امن اینترنت اشیا و محاسبات ابری
عنوان انگلیسی
Secure integration of IoT and Cloud Computing
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
25
سال انتشار
2018
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
نوع مقاله
ISI
نوع نگارش
مقالات پژوهشی (تحقیقاتی)
رفرنس
دارد
پایگاه
اسکوپوس
کد محصول
E10671
رشته های مرتبط با این مقاله
مهندسی کامپیوتر، فناوری اطلاعات
گرایش های مرتبط با این مقاله
رایانش ابری، امنیت اطلاعات، اینترنت و شبکه های گسترده
مجله
نسل آینده سیستم های کامپیوتری - Future Generation Computer Systems
دانشگاه
Department of Applied Informatics - School of Information Sciences - University of Macedonia - Greece
کلمات کلیدی
اینترنت اشیا، رایانش ابری، رایانش ابری موبایل، امنیت، حریم خصوصی
doi یا شناسه دیجیتال
http://dx.doi.org/10.1016/j.future.2016.11.031
چکیده

Abstract


Mobile Cloud Computing is a new technology which refers to an infrastructure where both data storage and data processing operate outside of the mobile device. Another recent technology is Internet of Things. Internet of Things is a new technology which is growing rapidly in the field of telecommunications. More specifically, IoT related with wireless telecommunications. The main goal of the interaction and cooperation between things and objects which sent through the wireless networks is to fulfill the objective set to them as a combined entity. In addition, there is a rapid development of both technologies, Cloud Computing and Internet of Things, regard the field of wireless communications. In this paper, we present a survey of IoT and Cloud Computing with a focus on the security issues of both technologies. Specifically, we combine the two aforementioned technologies (i.e Cloud Computing and IoT) in order to examine the common features, and in order tο discover the benefits of their integration. Concluding, we present the contribution of Cloud Computing to the IoT technology. Thus, it shows how the Cloud Computing technology improves the function of the IoT. Finally, we survey the security challenges of the integration of IoT and Cloud Computing

نتیجه گیری

 CONCLUSION


The Cloud Computing technology offers many possibilities, but also places several limitations as well. Cloud Computing refers to an infrastructure where both the data storage and the data processing happen outside of the mobile device. In this paper, we present a survey of Internet of Things Technology, with an explanation of its operation and use. Moreover, we present the main features of the Cloud Computing and its trade offs. Cloud Computing refers to an infrastructure where both data storage and data processing happen outside of the mobile device. Also, the Internet of Things is a new technology which is growing rapidly in the field of telecommunications, and especially in the modern field of wireless telecommunications. The main goal of the interaction and cooperation between things and objects sent through the wireless networks is to fulfil the objective set to them as a combined entity. In addition, based on the technology of wireless networks, both the technologies of Cloud Computing and Internet of Things develop rapidly. In this paper, we present a survey of IoT and Cloud Computing with a focus on the security issues of both technologies. Specifically, we combine the two aforementioned technologies (i.e Cloud Computing and IoT) in order to examine the common features, and in order tο discover the benefits of their integration. Concluding, the contribution of Cloud Computing to the technology IoT, and it shows how the Cloud Computing technology improves the function of the IoT was presented. At the end, the security challenges of the integration of IoT and Cloud Computing were surveyed through the proposed algorithm model, and also there is a presentation of how the two encryption algorithms which were used contributes in the integration of IoT and Cloud Computing. This can be the field of future research on the integration of those two technologies. Regarding the rapid development of both technologies the security issue must be solved or reduced to a minimum in order to have a better integration model. These security challenges that surveyed in this paper could be the sector for further research as a case study, with the goal of minimizing them.


بدون دیدگاه