메뉴 건너뛰기




Volumn 3, Issue 3, 2016, Pages 269-284

Twenty Security Considerations for Cloud-Supported Internet of Things

Author keywords

Cloud; Data; Internet of Things; Privacy; Security

Indexed keywords

CLOUDS; DATA PRIVACY; INTERNET; UBIQUITOUS COMPUTING;

EID: 84969847954     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2015.2460333     Document Type: Article
Times cited : (272)

References (95)
  • 1
    • 84942211371 scopus 로고
    • Ubiquitous computing
    • M. Weiser, "Ubiquitous computing," Computer, vol. 26, no. 10, pp. 71-72, 1993.
    • (1993) Computer , vol.26 , Issue.10 , pp. 71-72
    • Weiser, M.1
  • 4
    • 84908397157 scopus 로고    scopus 로고
    • Internet of Things for smart cities
    • Feb
    • A. Zanella, "Internet of Things for smart cities," IEEE Internet Things J., vol. 1, no. 1, pp. 22-32, Feb. 2014.
    • (2014) IEEE Internet Things J , vol.1 , Issue.1 , pp. 22-32
    • Zanella, A.1
  • 9
    • 77957594024 scopus 로고    scopus 로고
    • Broken promises of privacy: Responding to the surprising failure of anonymization
    • Aug
    • P. Ohm, "Broken promises of privacy: Responding to the surprising failure of anonymization," UCLA Law Rev., vol. 57, no. 6, pp. 1701-1777, Aug. 2010.
    • (2010) UCLA Law Rev , vol.57 , Issue.6 , pp. 1701-1777
    • Ohm, P.1
  • 10
    • 84937155256 scopus 로고    scopus 로고
    • Regional clouds: Technical considerations
    • accessed on Jul. 21
    • J. Singh et al., "Regional clouds: Technical considerations," Univ. Cambridge, Cambridge, U.K., Tech. Rep. UCAM-CL-TR-863, 2014 [Online]. Available: http://www.cl.cam.ac.uk/techreports/UCAM-CLTR-863.pdf, accessed on Jul. 21, 2015.
    • (2015) Univ. Cambridge, Cambridge, U.K., Tech. Rep. UCAM-CL-TR-863, 2014
    • Singh, J.1
  • 11
    • 84885043855 scopus 로고    scopus 로고
    • ITU Telecommun. Standard. Sector, Tech. Rep. Y.2060, Jun
    • "Overview of the Internet of Things," ITU Telecommun. Standard. Sector, Tech. Rep. Y.2060, Jun. 2012.
    • (2012) Overview of the Internet of Things
  • 13
    • 84924367178 scopus 로고    scopus 로고
    • Enabling smart cloud services through remote sensing: An Internet of Everything enabler
    • S. Abdelwahab, B. Hamdaoui, M. Guizani, and A. Rayes, "Enabling smart cloud services through remote sensing: An Internet of Everything enabler," IEEE Internet Things J., vol. 1, no. 3, pp. 276-288, 2014.
    • (2014) IEEE Internet Things J , vol.1 , Issue.3 , pp. 276-288
    • Abdelwahab, S.1    Hamdaoui, B.2    Guizani, M.3    Rayes, A.4
  • 14
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of Things: A survey
    • L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey," Comput. Netw., vol. 54, no. 15, pp. 2787-2805, 2010.
    • (2010) Comput. Netw , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 17
    • 0004035649 scopus 로고    scopus 로고
    • IETF, Tech. Rep., RFC 5246
    • T. Dierks and C. Allen, "The TLS protocol version 1.0," IETF, Tech. Rep., RFC 5246, 1999 [Online]. Available: https://tools.ietf.org/html/rfc5246
    • (1999) The TLS Protocol Version 1.0
    • Dierks, T.1    Allen, C.2
  • 18
    • 55849126555 scopus 로고    scopus 로고
    • Datagram transport layer security (DTLS) extension to establish keys for the secure real-time transport protocol (SRTP)
    • D. McGrew and E. Rescorla, "Datagram transport layer security (DTLS) extension to establish keys for the secure real-time transport protocol (SRTP)," Internet Engineering Task Force (IETF), RFC 5764, 2010 [Online]. Available: http://datatracker.ietf.org/doc/rfc5764
    • (2010) Internet Engineering Task Force (IETF), RFC 5764
    • McGrew, D.1    Rescorla, E.2
  • 19
    • 84919978090 scopus 로고    scopus 로고
    • Securing the Internet of Things: A standardization perspective
    • S. L. Keoh, S. Kumar, and H. Tschofenig, "Securing the Internet of Things: A standardization perspective," IEEE Internet Things J., vol. 1, no. 3, pp. 265-275, 2014.
    • (2014) IEEE Internet Things J , vol.1 , Issue.3 , pp. 265-275
    • Keoh, S.L.1    Kumar, S.2    Tschofenig, H.3
  • 20
    • 84876000333 scopus 로고    scopus 로고
    • LLCPS: A new security framework based on TLS for NFC P2P applications in the Internet of Things
    • P. Urien, "LLCPS: A new security framework based on TLS for NFC P2P applications in the Internet of Things," in Proc. IEEE Consum. Commun. Netw. Conf. (CCNC), 2013, pp. 845-846.
    • (2013) Proc. IEEE Consum. Commun. Netw. Conf. (CCNC) , pp. 845-846
    • Urien, P.1
  • 23
    • 84922992001 scopus 로고    scopus 로고
    • Trusted platform module
    • New York, NY, USA: Springer
    • T. Morris, "Trusted platform module," in Encyclopedia of Cryptography and Security. New York, NY, USA: Springer, 2011, pp. 1332-1335.
    • (2011) Encyclopedia of Cryptography and Security , pp. 1332-1335
    • Morris, T.1
  • 26
    • 84903144750 scopus 로고    scopus 로고
    • On middleware for emerging health services
    • J. Singh and J. Bacon, "On middleware for emerging health services," J. Internet Serv. Appl., vol. 5, no. 6, pp. 1-34, 2014.
    • (2014) J. Internet Serv. Appl , vol.5 , Issue.6 , pp. 1-34
    • Singh, J.1    Bacon, J.2
  • 28
    • 85152504598 scopus 로고    scopus 로고
    • Metrics-driven security objective decomposition for an e-health application with adaptive security management
    • R. M. Savola and H. Abie, "Metrics-driven security objective decomposition for an e-health application with adaptive security management," in Proc. Int. Workshop Adapt. Secur., 2013, p. 6.
    • (2013) Proc. Int. Workshop Adapt. Secur , pp. 6
    • Savola, R.M.1    Abie, H.2
  • 29
    • 84910095773 scopus 로고    scopus 로고
    • London, U.K.: Oxford Univ. Press
    • C. J. Millard, Ed., Cloud Computing Law. London, U.K.: Oxford Univ. Press, 2013.
    • (2013) Cloud Computing Law
    • Millard, C.J.1
  • 30
    • 84921471718 scopus 로고    scopus 로고
    • accessed on Jul. 21, 2015
    • N. Dhanjani. (2013). Reconsidering the perimeter security argument [Online]. Available: http://www.dhanjani.com/docs/Reconsidering%20 the%20Perimeter%20Security%20Argument.pdf, accessed on Jul. 21, 2015.
    • (2013) Reconsidering the Perimeter Security Argument
    • Dhanjani, N.1
  • 31
    • 84969800654 scopus 로고    scopus 로고
    • Intel IT Centre
    • Intel IT Centre, What's Holding Back the Cloud?, Intel Corporation, 2012 [Online]. Available: http://www.intel.co.uk/content/dam/www/public/ us/en/documents/ reports/whats-holding-back-The-cloud-peer-researchreport2. pdf
    • (2012) What's Holding Back the Cloud?, Intel Corporation
  • 32
    • 84969857531 scopus 로고    scopus 로고
    • Information flow control for a medical web portal
    • Lisbon, Portugal
    • T. Pasquier, B. Shand, and J. Bacon, "Information flow control for a medical web portal," in Proc. IADIS Int. Conf. e-Society, IADIS, Lisbon, Portugal, 2013, pp. 123-130 [Online]. Available: http://www.iadisportal.org/e-society-2013-proceedings
    • (2013) Proc. IADIS Int. Conf. E-Society, IADIS , pp. 123-130
    • Pasquier, T.1    Shand, B.2    Bacon, J.3
  • 33
    • 34548029519 scopus 로고    scopus 로고
    • Container-based operating system virtualization: A scalable, highperformance alternative to hypervisors
    • New York, NY, USA: ACM
    • S. Soltesz, H. Pötzl, M. E. Fiuczynski, A. Bavier, and L. Peterson, "Container-based operating system virtualization: A scalable, highperformance alternative to hypervisors," in ACMSIGOPS Operating Syst. Rev. New York, NY, USA: ACM, 2007, vol. 41, no. 3, pp. 275-287.
    • (2007) ACMSIGOPS Operating Syst. Rev , vol.41 , Issue.3 , pp. 275-287
    • Soltesz, S.1    Pötzl, H.2    Fiuczynski, M.E.3    Bavier, A.4    Peterson, L.5
  • 34
    • 21644433634 scopus 로고    scopus 로고
    • Xen and the art of virtualization
    • P. Barham et al., "Xen and the art of virtualization," in SIGOPS Operating Syst. Rev., 2003, vol. 37, no. 5, pp. 164-177.
    • (2003) SIGOPS Operating Syst. Rev , vol.37 , Issue.5 , pp. 164-177
    • Barham, P.1
  • 35
    • 84958066223 scopus 로고    scopus 로고
    • Innovative technology for CPU based attestation and sealing
    • I. Anati, S. Gueron, S. P. Johnson, and V. R. Scarlata, "Innovative technology for CPU based attestation and sealing," Intel Corporation, 2013 [Online]. Available: https://software.intel.com/sites/default/files/ article /413939/hasp-2013-innovative-technology-for-attestation-andsealing. pdf.
    • (2013) Intel Corporation
    • Anati, I.1    Gueron, S.2    Johnson, S.P.3    Scarlata, V.R.4
  • 42
    • 77953213147 scopus 로고    scopus 로고
    • Myths and fallacies of personally identifiable information
    • A. Narayanan and V. Shmatikov, "Myths and fallacies of personally identifiable information," Comm. ACM, vol. 53, pp. 24-26, 2010.
    • (2010) Comm. ACM , vol.53 , pp. 24-26
    • Narayanan, A.1    Shmatikov, V.2
  • 43
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • New York, NY, USA: Springer
    • C. Dwork, "Differential privacy: A survey of results," in Theory and Applications of Models of Computation. New York, NY, USA: Springer, 2008, pp. 1-19.
    • (2008) Theory and Applications of Models of Computation , pp. 1-19
    • Dwork, C.1
  • 45
    • 84885971632 scopus 로고    scopus 로고
    • Challenges of privacy protection in big data analytics
    • M. Jensen, "Challenges of privacy protection in big data analytics," in Proc. IEEE Int. Congr. Big Data, 2013, pp. 235-238.
    • (2013) Proc. IEEE Int. Congr. Big Data , pp. 235-238
    • Jensen, M.1
  • 49
    • 85002424663 scopus 로고    scopus 로고
    • Identity authentication and capability based access control (IACAC) for the Internet of Things
    • P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad, "Identity authentication and capability based access control (IACAC) for the Internet of Things," J. Cyber Secur. Mobility, vol. 1, no. 4, pp. 309-348, 2013.
    • (2013) J. Cyber Secur. Mobility , vol.1 , Issue.4 , pp. 309-348
    • Mahalle, P.N.1    Anggorojati, B.2    Prasad, N.R.3    Prasad, R.4
  • 52
    • 84969789271 scopus 로고    scopus 로고
    • A right to identity to face the Internet of Things
    • P. De Hert, "A right to identity to face the Internet of Things?," UNESCO 2008 [Online]. Available: http://portal.unesco.org/ci/en/files/ 25857/12021328273de-Hert-Paul.pdf/de%2BHert-Paul.pdf
    • (2008) UNESCO
    • De Hert, P.1
  • 53
    • 67650337204 scopus 로고    scopus 로고
    • Legal safeguards for privacy and data protection in ambient intelligence
    • P. De Hert, S. Gutwirth, A. Moscibroda, D. Wright, and G. G. Fuster, "Legal safeguards for privacy and data protection in ambient intelligence," Pers. Ubiq. Comput., vol. 13, no. 6, pp. 435-444, 2009.
    • (2009) Pers. Ubiq. Comput , vol.13 , Issue.6 , pp. 435-444
    • De Hert, P.1    Gutwirth, S.2    Moscibroda, A.3    Wright, D.4    Fuster, G.G.5
  • 55
    • 84969869132 scopus 로고    scopus 로고
    • 3D data management: Controlling data volume, velocity and variety
    • L. Douglas, "3D data management: Controlling data volume, velocity and variety," Gartner Inc. [Online]. Available: http://blogs.gartner.com/ doug-laney/files /2012/01/ad949-3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety.pdf
    • Gartner Inc
    • Douglas, L.1
  • 56
    • 84969758283 scopus 로고    scopus 로고
    • DDoS attack and defence in cloud
    • New York, NY, USA: Springer
    • S. Yu, "DDoS attack and defence in cloud," in Distributed Denial of Service Attack and Defense. New York, NY, USA: Springer, 2014, pp. 77-93.
    • (2014) Distributed Denial of Service Attack and Defense , pp. 77-93
    • Yu, S.1
  • 57
    • 80053414801 scopus 로고    scopus 로고
    • TrustCloud: A framework for accountability and trust in cloud computing
    • R. K. Ko et al., "TrustCloud: A framework for accountability and trust in cloud computing," in Proc. IEEE World Congr. Serv. (SERVICES), 2011, pp. 584-588.
    • (2011) Proc. IEEE World Congr. Serv. (SERVICES) , pp. 584-588
    • Ko, R.K.1
  • 58
    • 80053628507 scopus 로고    scopus 로고
    • From system-centric to datacentric logging-accountability, trust &security in cloud computing
    • R. K. Ko, M. Kirchberg, and B. S. Lee, "From system-centric to datacentric logging-accountability, trust &security in cloud computing," in Proc. Defense Sci. Res. Conf. Expo. (DSR), 2011, pp. 1-4.
    • (2011) Proc. Defense Sci. Res. Conf. Expo. (DSR) , pp. 1-4
    • Ko, R.K.1    Kirchberg, M.2    Lee, B.S.3
  • 60
  • 61
    • 84863395085 scopus 로고    scopus 로고
    • Advances and challenges in log analysis
    • A. Oliner, A. Ganapathi, and W. Xu, "Advances and challenges in log analysis," Comm. ACM, vol. 55, no. 2, pp. 55-61, 2012.
    • (2012) Comm. ACM , vol.55 , Issue.2 , pp. 55-61
    • Oliner, A.1    Ganapathi, A.2    Xu, W.3
  • 63
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1-11, 2011.
    • (2011) J. Netw. Comput. Appl , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 68
    • 84873696561 scopus 로고    scopus 로고
    • Cloud services certification
    • A. Sunyaev and S. Schneider, "Cloud services certification," Commun. ACM, vol. 56, no. 2, pp. 33-36, 2013.
    • (2013) Commun. ACM , vol.56 , Issue.2 , pp. 33-36
    • Sunyaev, A.1    Schneider, S.2
  • 69
    • 84856273290 scopus 로고    scopus 로고
    • Automated certification for compliant cloud-based business processes
    • New York, NY, USA: Springer
    • R. Accorsi, D.-I. L. Lowis, and Y. Sato, "Automated certification for compliant cloud-based business processes," in Business &Information Systems Engineering. New York, NY, USA: Springer, 2011, vol. 3, no. 3, pp. 145-154.
    • (2011) Business &Information Systems Engineering , vol.3 , Issue.3 , pp. 145-154
    • Accorsi, R.1    Lowis, D.-I.L.2    Sato, Y.3
  • 70
    • 84888019509 scopus 로고    scopus 로고
    • Bridging the GAP between software certification and trusted computing for securing cloud computing
    • A. Muñoz and A. Mana, "Bridging the GAP between software certification and trusted computing for securing cloud computing," in Proc. 9th World Congr. Serv. (SERVICES), 2013, pp. 103-110.
    • (2013) Proc. 9th World Congr. Serv. (SERVICES) , pp. 103-110
    • Muñoz, A.1    Mana, A.2
  • 71
    • 84948085734 scopus 로고    scopus 로고
    • Automatic data protection certificates for cloud-services based on secure logging
    • New York, NY, USA: Springer
    • T. Kunz, A. Selzer, and U. Waldmann, "Automatic data protection certificates for cloud-services based on secure logging," in Trusted Cloud Computing. New York, NY, USA: Springer, 2014, pp. 59-75.
    • (2014) Trusted Cloud Computing , pp. 59-75
    • Kunz, T.1    Selzer, A.2    Waldmann, U.3
  • 74
    • 84964358331 scopus 로고    scopus 로고
    • Tech. Rep. 329298-001US, 2013 accessed on Jul. 21
    • Intel, Software guard extensions programming reference, Tech. Rep. 329298-001US, 2013 [Online]. Available: https://software.intel.com/ sites/default/files/329298-001.pdf, accessed on Jul. 21, 2015.
    • (2015) Software Guard Extensions Programming Reference
  • 80
    • 85076289299 scopus 로고    scopus 로고
    • XBook: Redesigning privacy control in social networking platforms
    • K. Singh, S. Bhola, and W. Lee, "xBook: Redesigning privacy control in social networking platforms," in Proc. USENIX Secur. Symp., 2009, pp. 249-266.
    • (2009) Proc. USENIX Secur. Symp , pp. 249-266
    • Singh, K.1    Bhola, S.2    Lee, W.3
  • 82
    • 77955961955 scopus 로고    scopus 로고
    • A case for the accountable cloud
    • A. Haeberlen, "A case for the accountable cloud," SIGOPS Oper. Syst. Rev., vol. 44, no. 2, pp. 52-57, 2010.
    • (2010) SIGOPS Oper. Syst. Rev , vol.44 , Issue.2 , pp. 52-57
    • Haeberlen, A.1
  • 93
    • 84891784232 scopus 로고    scopus 로고
    • Unikernels: The rise of the virtual library operating system
    • A. Madhavapeddy and D. J. Scott, "Unikernels: The rise of the virtual library operating system," Commun. ACM, vol. 57, no. 1, pp. 61-69, 2014.
    • (2014) Commun. ACM , vol.57 , Issue.1 , pp. 61-69
    • Madhavapeddy, A.1    Scott, D.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.