메뉴 건너뛰기




Volumn 7, Issue 1, 2016, Pages 37-58

Applying security to a big stream cloud architecture for the internet of things

Author keywords

Big stream; Cloud computing; Internet of things; OAuth; Open source applications; Real time applications; Security; Smart X applications

Indexed keywords

BIG DATA; CLOUD COMPUTING; COMPUTER ARCHITECTURE; GRAPHIC METHODS; INFORMATION MANAGEMENT; INTERNET; NETWORK SECURITY; OPEN SYSTEMS;

EID: 84955475573     PISSN: 19473532     EISSN: 19473540     Source Type: Journal    
DOI: 10.4018/IJDST.2016010103     Document Type: Article
Times cited : (16)

References (31)
  • 1
    • 0029368501 scopus 로고
    • Different roles and mutual dependencies of data, information, and knowledge an AI perspective on their integration
    • Aamodt, A., & Nygard, M. (1995). Different roles and mutual dependencies of data, information, and knowledge an AI perspective on their integration. Data & Knowledge Engineering, 16(3), 191-222. doi:10.1016/0169-023X(95)00017-M
    • (1995) Data & Knowledge Engineering , vol.16 , Issue.3 , pp. 191-222
    • Aamodt, A.1    Nygard, M.2
  • 2
    • 79956318862 scopus 로고    scopus 로고
    • Enforcing end-to-end application security in the cloud
    • Springer Berlin Heidelberg
    • Bacon, J., Evans, D., Eyers, D. M., Migliavacca, M., Pietzuch, P., & Shand, B. (2010). Enforcing End-to-End Application Security in the Cloud. In Middleware 2010 (pp. 293-312). Springer Berlin Heidelberg. doi:10.1007/978-3-642-16955-7-15
    • (2010) Middleware 2010 , pp. 293-312
    • Bacon, J.1    Evans, D.2    Eyers, D.M.3    Migliavacca, M.4    Pietzuch, P.5    Shand, B.6
  • 4
    • 84942924995 scopus 로고    scopus 로고
    • Design and deployment of an IoT application-oriented testbed
    • September
    • Belli, L., Cirani, S., Davoli, L., Gorrieri, A., Mancin, M., Picone, M., & Ferrari, G. (2015, September). Design and Deployment of an IoT Application-Oriented Testbed. IEEE Computer, 48(9), 32-40. doi:10.1109/MC.2015.253
    • (2015) IEEE Computer , vol.48 , Issue.9 , pp. 32-40
    • Belli, L.1    Cirani, S.2    Davoli, L.3    Gorrieri, A.4    Mancin, M.5    Picone, M.6    Ferrari, G.7
  • 5
    • 84930447062 scopus 로고    scopus 로고
    • An open-source cloud architecture for big stream iot applications
    • I. Podnar Žarko, K. Pripužić, & M. Serrano (Eds.), Springer International Publishing
    • Belli, L., Cirani, S., Davoli, L., Melegari, L., Monton, M., & Picone, M. (2015). An Open-Source Cloud Architecture for Big Stream IoT Applications. In I. Podnar Žarko, K. Pripužić, & M. Serrano (Eds.), Interoperability and Open-Source Solutions for the Internet of Things (Vol. 9001, pp. 73-88). Springer International Publishing; doi:10.1007/978-3-319-16546-2-7
    • (2015) Interoperability and Open-Source Solutions for the Internet of Things , vol.9001 , pp. 73-88
    • Belli, L.1    Cirani, S.2    Davoli, L.3    Melegari, L.4    Monton, M.5    Picone, M.6
  • 6
    • 84924154078 scopus 로고    scopus 로고
    • A graph-based cloud architecture for big stream real-time applications in the internet of things
    • Springer International Publishing
    • Belli, L., Cirani, S., Ferrari, G., Melegari, L., & Picone, M. (2014). A Graph-Based Cloud Architecture for Big Stream Real-Time Applications in the Internet of Things. In Advances in Service-Oriented and Cloud Computing (Vol. 508, pp. 91-105). Springer International Publishing; doi:10.1007/978-3-319-14886-1-10
    • (2014) Advances in Service-Oriented and Cloud Computing , vol.508 , pp. 91-105
    • Belli, L.1    Cirani, S.2    Ferrari, G.3    Melegari, L.4    Picone, M.5
  • 9
    • 84916934620 scopus 로고    scopus 로고
    • IoT-OAS: An OAuth-based authorization service architecture for secure services in IoT scenarios
    • February
    • Cirani, S., Picone, M., Gonizzi, P., Veltri, L., & Ferrari, G. (2015, February). IoT-OAS: An OAuth-based Authorization Service Architecture for Secure Services in IoT Scenarios. IEEE Sensors Journal, 15(2), 1224-1234. doi:10.1109/JSEN.2014.2361406
    • (2015) IEEE Sensors Journal , vol.15 , Issue.2 , pp. 1224-1234
    • Cirani, S.1    Picone, M.2    Gonizzi, P.3    Veltri, L.4    Ferrari, G.5
  • 10
    • 84904704703 scopus 로고    scopus 로고
    • CoSIP: A constrained session initiation protocol for the internet of things
    • Springer Berlin Heidelberg
    • Cirani, S., Picone, M., & Veltri, L. (2013). CoSIP: A Constrained Session Initiation Protocol for the Internet of Things. In Advances in Service-Oriented and Cloud Computing (Vol. 393, pp. 13-24). Springer Berlin Heidelberg; doi:10.1007/978-3-642-45364-9-2
    • (2013) Advances in Service-Oriented and Cloud Computing , vol.393 , pp. 13-24
    • Cirani, S.1    Picone, M.2    Veltri, L.3
  • 11
    • 84930428983 scopus 로고    scopus 로고
    • MjCoAP: An open-source lightweight Java coap library for internet of things applications
    • DOI: Springer International Publishing Switzerland
    • Cirani, S., Picone, M., & Veltri, L. (2015). mjCoAP: An Open-Source Lightweight Java CoAP Library for Internet of Things Applications. In Interoperability and Open-Source Solutions for the Internet of Things. LNCS (Vol. 9001). DOI: Springer International Publishing Switzerland. doi:10.1007/978-3-319-16546-2-10
    • (2015) Interoperability and Open-Source Solutions for the Internet of Things. LNCS , vol.9001
    • Cirani, S.1    Picone, M.2    Veltri, L.3
  • 15
    • 77649261628 scopus 로고    scopus 로고
    • (Unpublished doctoral dissertation). Stanford University. Retrieved from
    • Gentry, C. (2009). A fully Homomorphic encryption scheme (Unpublished doctoral dissertation). Stanford University. Retrieved from http://crypto.stanford.edu/craig
    • (2009) A Fully Homomorphic Encryption Scheme
    • Gentry, C.1
  • 21
    • 84907379367 scopus 로고    scopus 로고
    • Storage challenge: Where will all that Big Data go?
    • Leavitt, N. (2013). Storage challenge: Where will all that Big Data go? Computer, 46(9), 22-25. doi:10.1109/ MC.2013.326
    • (2013) Computer , vol.46 , Issue.9 , pp. 22-25
    • Leavitt, N.1
  • 25
    • 84871762843 scopus 로고    scopus 로고
    • IaaS cloud architecture: From virtualized datacenters to federated cloud infrastructures
    • Moreno-Vozmediano, R., Montero, R. S., & Llorente, I. M. (2012). IaaS Cloud Architecture: From Virtualized Datacenters to Federated Cloud Infrastructures. Computer, 45(12), 65-72. http://doi.ieeecomputersociety. org/10.1109/MC.2012.76 doi:10.1109/MC.2012.76
    • (2012) Computer , vol.45 , Issue.12 , pp. 65-72
    • Moreno-Vozmediano, R.1    Montero, R.S.2    Llorente, I.M.3
  • 27
    • 50049089599 scopus 로고    scopus 로고
    • Enabling confidentiality in content-based publish/subscribe infrastructures
    • Raiciu, C., & Rosenblum, D. S. (2006). Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures (pp. 1-11). Securecomm and Workshops; doi:10.1109/SECCOMW.2006.359552
    • (2006) Securecomm and Workshops , pp. 1-11
    • Raiciu, C.1    Rosenblum, D.S.2
  • 28
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and publickey cryptosystems
    • Retrieved from February
    • Rivest, R., Shamir, A., & Adleman, L. (1978, February). A Method for Obtaining Digital Signatures and Publickey Cryptosystems. Comm. ACM, 21 (2), 120-126. Retrieved from http://doi.acm.org/10.1145/359340.359342
    • (1978) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.