메뉴 건너뛰기




Volumn 78, Issue , 2018, Pages 964-975

Secure integration of IoT and Cloud Computing

Author keywords

Cloud Computing; Internet of Things; Mobile Cloud Computing; Privacy; Security

Indexed keywords

CLOUD COMPUTING; DATA HANDLING; DATA PRIVACY; DIGITAL STORAGE; INTERNET OF THINGS; MOBILE DEVICES; SURVEYS; TELECOMMUNICATION SERVICES; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 85008227599     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2016.11.031     Document Type: Article
Times cited : (906)

References (67)
  • 1
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of things: A survey
    • 28/10/
    • Atzori, Luigi, et al. The Internet of things: A survey. Comput. Netw.(54), 2010, 2787–2805 28/10/.
    • (2010) Comput. Netw. , Issue.54 , pp. 2787-2805
    • Atzori, L.1
  • 2
    • 84965033218 scopus 로고    scopus 로고
    • A fog-based DSS model for driving rule violation monitoring framework on the Internet of things
    • 01/03/
    • Roy, Sandip, et al. A fog-based DSS model for driving rule violation monitoring framework on the Internet of things. Int. J. Adv. Sci. Technol., 2015, 23–32 01/03/.
    • (2015) Int. J. Adv. Sci. Technol. , pp. 23-32
    • Roy, S.1
  • 3
    • 85043748098 scopus 로고    scopus 로고
    • Sensor Mania! The Internet of things, wearable computing, objective metrics, and the quantified self 2.0
    • 8 November
    • Swan, Melanie, Sensor Mania! The Internet of things, wearable computing, objective metrics, and the quantified self 2.0. Sensor Actuator Netw. 1:3 (2012), 217–253, 10.3390/jsan1030217 8 November.
    • (2012) Sensor Actuator Netw. , vol.1 , Issue.3 , pp. 217-253
    • Swan, M.1
  • 4
    • 85015319211 scopus 로고    scopus 로고
    • Internet of surveillance: a cloud supported large scale wireless surveillance system
    • Springer
    • Alsmirat, Mohammad A., Jararweh, Yaser, Obidat, Islam, Gupta, Brij B., Internet of surveillance: a cloud supported large scale wireless surveillance system. J. Supercomput., 2016 Springer.
    • (2016) J. Supercomput.
    • Alsmirat, M.A.1    Jararweh, Y.2    Obidat, I.3    Gupta, B.B.4
  • 5
    • 84897603290 scopus 로고    scopus 로고
    • Conception of ID layer performance at the network level for Internet of things
    • Mongay Batalla, J., Krawiec, P., Conception of ID layer performance at the network level for Internet of things. Springer J. Pers. Ubiquitous Comput. 18:2 (2014), 465–480.
    • (2014) Springer J. Pers. Ubiquitous Comput. , vol.18 , Issue.2 , pp. 465-480
    • Mongay Batalla, J.1    Krawiec, P.2
  • 7
    • 84898825587 scopus 로고    scopus 로고
    • Mobile cloud computing: A survey, state of art and future directions
    • 01/04/
    • Rahimi, M.R., et al. Mobile cloud computing: A survey, state of art and future directions. Mob. Netw. Appl. 19:2 (2014), 133–143 01/04/.
    • (2014) Mob. Netw. Appl. , vol.19 , Issue.2 , pp. 133-143
    • Rahimi, M.R.1
  • 9
    • 84875530510 scopus 로고    scopus 로고
    • Does cloud computing matter? An analysis of the cloud model software-as-a-service and its impact on operational agility
    • 01/10/2013
    • S. Fremdt, R. Beck, S. Weber, Does cloud computing matter? An analysis of the cloud model software-as-a-service and its impact on operational agility, in: 46th Hawaii International Conference on System Sciences, 01/10/2013, pp. 1025–1034.
    • 46th Hawaii International Conference on System Sciences , pp. 1025-1034
    • Fremdt, S.1    Beck, R.2    Weber, S.3
  • 10
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • 11/07/
    • Subashini, S., Kavitha, V., A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 1:34 (2010), 1–11 11/07/.
    • (2010) J. Netw. Comput. Appl. , vol.1 , Issue.34 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 11
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • 01/11/
    • Takabi, Hassan, Joshi, James B.D., Security and privacy challenges in cloud computing environments. IEEE Comput. Reliab. Soc., 2010, 24–31 01/11/.
    • (2010) IEEE Comput. Reliab. Soc. , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2
  • 13
    • 84896931467 scopus 로고    scopus 로고
    • CCIoT-CMfg: Cloud computing and Internet of things-based cloud manufacturing service system
    • 02/05/
    • Tao, Fei, et al. CCIoT-CMfg: Cloud computing and Internet of things-based cloud manufacturing service system. IEEE Trans. Ind. Inform. 2:10 (2014), 1435–1442 02/05/.
    • (2014) IEEE Trans. Ind. Inform. , vol.2 , Issue.10 , pp. 1435-1442
    • Tao, F.1
  • 14
    • 85029723206 scopus 로고    scopus 로고
    • CloudThings: a common architecture for integrating the Internet of things with cloud computing
    • Jiehan Zhou, et al. CloudThings: a common architecture for integrating the Internet of things with cloud computing, in: Huazhong University of Science and Technology, Wuhan, 2013.
    • (2013) in: Huazhong University of Science and Technology, Wuhan
    • Zhou, J.1
  • 15
    • 84971671604 scopus 로고    scopus 로고
    • Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and Internet of things technologies
    • 01/12/
    • Guerrero Ibáñez, Juan Antonio, et al. Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and Internet of things technologies. IEEE Wirel. Commun., 2015, 122–128 01/12/.
    • (2015) IEEE Wirel. Commun. , pp. 122-128
    • Guerrero Ibáñez, J.A.1
  • 17
    • 84876943063 scopus 로고    scopus 로고
    • Internet of things (IoT): A vision, architectural elements, and future directions
    • 24/02/
    • Gubbi, Jayavardhana, et al. Internet of things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst., 2013, 1645–1660 24/02/.
    • (2013) Future Gener. Comput. Syst. , pp. 1645-1660
    • Gubbi, J.1
  • 19
    • 85011110622 scopus 로고    scopus 로고
    • Cloud of Things: Integration of IoT with Cloud Computing
    • Springer International Publishing 01/01/
    • Aazam, Mohammad, et al. Cloud of Things: Integration of IoT with Cloud Computing. 2016, Springer International Publishing, 77–94 01/01/.
    • (2016) , pp. 77-94
    • Aazam, M.1
  • 20
    • 84958935292 scopus 로고    scopus 로고
    • Integration of cloud computing and Internet of things: a survey
    • 14/09/
    • Botta, Alessio, et al. Integration of cloud computing and Internet of things: a survey. J. Future Gener. Comput. Syst., 2015, 1–54 14/09/.
    • (2015) J. Future Gener. Comput. Syst. , pp. 1-54
    • Botta, A.1
  • 22
    • 84976266081 scopus 로고    scopus 로고
    • State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing
    • 25/09/
    • Díaz, Manuel, et al. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing. J. Netw. Comput. Appl., 2015, 99–117 25/09/.
    • (2015) J. Netw. Comput. Appl. , pp. 99-117
    • Díaz, M.1
  • 23
    • 85020229266 scopus 로고    scopus 로고
    • Accelerating compute intensive medical imaging segmentation algorithms using GPUs
    • Springer
    • Alsmirat, Mohammad, Jararweh, Yaser, Al-Ayyoub, Mahmoud, Shehab, Mohammed A., Gupta, B.B., Accelerating compute intensive medical imaging segmentation algorithms using GPUs. MTA, 2016, Springer.
    • (2016) MTA
    • Alsmirat, M.1    Jararweh, Y.2    Al-Ayyoub, M.3    Shehab, M.A.4    Gupta, B.B.5
  • 24
    • 84994514374 scopus 로고    scopus 로고
    • Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
    • IGI Global Publisher USA
    • Gupta, B.B., Agrawal, D.P., Yamaguchi, Shingo, Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. 2016, IGI Global Publisher, USA.
    • (2016)
    • Gupta, B.B.1    Agrawal, D.P.2    Yamaguchi, S.3
  • 25
    • 85048444894 scopus 로고    scopus 로고
    • Social media security and trustworthiness: Overview and new direction
    • Elsevier
    • Zhang, Zhiyong, Gupta, Brij B., Social media security and trustworthiness: Overview and new direction. Future Gener. Comput. Syst., 2016 Elsevier.
    • (2016) Future Gener. Comput. Syst.
    • Zhang, Z.1    Gupta, B.B.2
  • 26
    • 84961385029 scopus 로고    scopus 로고
    • Data-driven monitoring of cyber-physical systems leveraging on big data and the Internet-of-things for diagnosis and control
    • DX, 01/08/2015
    • Oliver Niggemann, Gautaman Biswas, et al. Data-driven monitoring of cyber-physical systems leveraging on big data and the Internet-of-things for diagnosis and control, in: International Workshop on the Principles of Diagnosis, DX, 01/08/2015, pp. 185–192.
    • in: International Workshop on the Principles of Diagnosis , pp. 185-192
    • Niggemann, O.1    Biswas, G.2
  • 27
    • 84945308766 scopus 로고    scopus 로고
    • Advanced multimedia service provisioning based on efficient interoperability of adaptive streaming protocol and high efficient video coding
    • 24/04/
    • Batalla, J.M., Advanced multimedia service provisioning based on efficient interoperability of adaptive streaming protocol and high efficient video coding. J. Real-Time Image Process., 2015, 1–12 24/04/.
    • (2015) J. Real-Time Image Process. , pp. 1-12
    • Batalla, J.M.1
  • 28
    • 85029722151 scopus 로고    scopus 로고
    • IoT security (Internet of Things security), IoT Agenda, 01/11/2015. [Online]. Available: (Accessed 27 July 2016).
    • M. Rouse, IoT security (Internet of Things security), IoT Agenda, 01/11/2015. [Online]. Available: http://internetofthingsagenda.techtarget.com/definition/IoT-security-Internet-of-Things-security  (Accessed 27 July 2016).
    • Rouse, M.1
  • 29
    • 84952054527 scopus 로고    scopus 로고
    • Mutual authentication scheme in secure Internet of things technology for comfortable lifestyle
    • 24 12, 2015.
    • Park, N., Kang, N., Mutual authentication scheme in secure Internet of things technology for comfortable lifestyle. Sensors 1:16 (2016), 1–20 24 12 2015.
    • (2016) Sensors , vol.1 , Issue.16 , pp. 1-20
    • Park, N.1    Kang, N.2
  • 34
    • 84904136525 scopus 로고    scopus 로고
    • A study on strategic provision of cloud computing services
    • 15/6/
    • Md Whaiduzzaman, G., et al. A study on strategic provision of cloud computing services. Sci. World J., 2014, 1–8 15/6/.
    • (2014) Sci. World J. , pp. 1-8
    • Md Whaiduzzaman, G.1
  • 35
    • 84865048353 scopus 로고    scopus 로고
    • A framework for ranking of cloud computing services
    • Garg, S.K., Versteeg, S., Buyya, R., A framework for ranking of cloud computing services. Future Gener. Comput. Syst. 29:4 (2013), 1012–1023.
    • (2013) Future Gener. Comput. Syst. , vol.29 , Issue.4 , pp. 1012-1023
    • Garg, S.K.1    Versteeg, S.2    Buyya, R.3
  • 36
    • 84981321664 scopus 로고    scopus 로고
    • An evaluation of cloud-based mobile services with limited capacity: a linear approach
    • 27/2/
    • Skourletopoulos, Georgios, et al. An evaluation of cloud-based mobile services with limited capacity: a linear approach. Soft Comput., 2016, 1–8 27/2/.
    • (2016) Soft Comput. , pp. 1-8
    • Skourletopoulos, G.1
  • 37
    • 85029420711 scopus 로고    scopus 로고
    • The critical role of the network in big data applications
    • 1/4/
    • Villars, L., et al. The critical role of the network in big data applications. IDC Anal. Future, 2012, 1–12 1/4/.
    • (2012) IDC Anal. Future , pp. 1-12
    • Villars, L.1
  • 38
    • 85029677363 scopus 로고    scopus 로고
    • Cloud Computing–Is it Really All That Beneficial?, abouttech, 07/07/2012. [Online]. Available: (Accessed 24 January 2015].
    • P. Viswanathan, Cloud Computing–Is it Really All That Beneficial?, abouttech, 07/07/2012. [Online]. Available: http://mobiledevices.about.com/od/additionalresources/a/Cloud-Computing-Is-It-Really-All-That-Beneficial.htm (Accessed 24 January 2015].
    • Viswanathan, P.1
  • 39
    • 84902266783 scopus 로고    scopus 로고
    • Cloud computing data protection–a literature review and analysis
    • 01/10/2014
    • Florian Pfarr, et al. Cloud computing data protection–a literature review and analysis, in: 47th Hawaii International Conference on System Science, 01/10/2014, pp. 5018–5027.
    • in: 47th Hawaii International Conference on System Science , pp. 5018-5027
    • Pfarr, F.1
  • 40
    • 85019322722 scopus 로고    scopus 로고
    • A Study of the Advantages & Disadvantages of Mobile Cloud Computing Versus Native Environment
    • Blekinge Institute of Technology Karlskrona
    • Andersson, S., et al. A Study of the Advantages & Disadvantages of Mobile Cloud Computing Versus Native Environment. 2013, Blekinge Institute of Technology, Karlskrona.
    • (2013)
    • Andersson, S.1
  • 41
    • 84875530510 scopus 로고    scopus 로고
    • Does cloud computing matter? An analysis of the Cloud Model software-as-a-service and its impact on operational agility
    • 01/10/2013
    • Sabine Fremdt, et al. Does cloud computing matter? An analysis of the Cloud Model software-as-a-service and its impact on operational agility, in: 46th Hawaii International Conference on System Sciences, 01/10/2013, pp. 1025–1034.
    • in: 46th Hawaii International Conference on System Sciences , pp. 1025-1034
    • Fremdt, S.1
  • 42
    • 85029699855 scopus 로고    scopus 로고
    • Blog: Follow what's happening at Get Cloud Services, “Mobile Cloud Computing–Pros and Cons”, GetCloud Services, 23/12/2014. [Online]. Available: (Accessed 24 January 2015).
    • Blog: Follow what's happening at Get Cloud Services, “Mobile Cloud Computing–Pros and Cons”, GetCloud Services, 23/12/2014. [Online]. Available: https://www.getcloudservices.com/blog/mobile-cloud-computing-pros-and-cons/  (Accessed 24 January 2015).
  • 43
    • 85037074313 scopus 로고    scopus 로고
    • Implicit authentication through learning user behavior
    • 01/01/
    • Elaine Shi, R.C., et al. Implicit authentication through learning user behavior. Inf. Secur.(6531), 2011, 99–113 01/01/.
    • (2011) Inf. Secur. , Issue.6531 , pp. 99-113
    • Elaine Shi, R.C.1
  • 44
    • 84935496015 scopus 로고    scopus 로고
    • CloudID: Trustworthy cloud-based and cross-enterprise biometric identification
    • 30/11/
    • Haghighat, Mohammad, et al. CloudID: Trustworthy cloud-based and cross-enterprise biometric identification. Expert Syst. Appl. 11:42 (2015), 7905–7916 30/11/.
    • (2015) Expert Syst. Appl. , vol.11 , Issue.42 , pp. 7905-7916
    • Haghighat, M.1
  • 46
    • 85031394346 scopus 로고    scopus 로고
    • Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment
    • Springer
    • Gupta, B.B., Badve, Omkar P., Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Computing & Applications, 2016, Springer.
    • (2016) Neural Computing & Applications
    • Gupta, B.B.1    Badve, O.P.2
  • 47
    • 85029676481 scopus 로고    scopus 로고
    • “Swamp Computing” a.k.a. Cloud Computing, WEB Security Journal, 28/12/2009. [Online]. Available: (Accessed 27 July 2016).
    • Y. Mamoon, “Swamp Computing” a.k.a. Cloud Computing, WEB Security Journal, 28/12/2009. [Online]. Available: http://security.sys-con.com/node/1231725  (Accessed 27 July 2016).
    • Mamoon, Y.1
  • 48
    • 84938583423 scopus 로고    scopus 로고
    • Data Classification for achieving Security in cloud computing
    • 1 3
    • Shaikha, Rizwana, Sasikumar, Dr.M., Data Classification for achieving Security in cloud computing. Procedia Comput. Sci.(45), 2015, 493–498 1 3.
    • (2015) Procedia Comput. Sci. , Issue.45 , pp. 493-498
    • Shaikha, R.1    Sasikumar, M.2
  • 49
    • 84896658536 scopus 로고    scopus 로고
    • Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures
    • Kumar, Yogesh, Munjal, Rajiv, Sharma, Harsh, Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. IJCSMS Int. J. Comput. Sci. Manag. Stud., 11(03), 2011.
    • (2011) IJCSMS Int. J. Comput. Sci. Manag. Stud. , vol.11 , Issue.3
    • Kumar, Y.1    Munjal, R.2    Sharma, H.3
  • 50
    • 84944409446 scopus 로고    scopus 로고
    • Analysis of security algorithms in cloud computing
    • 1 3
    • Kaur, Randeep, Kinger, Supiya, Analysis of security algorithms in cloud computing. Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 3:3 (2014), 171–176 1 3.
    • (2014) Int. J. Appl. Innov. Eng. Manag. (IJAIEM) , vol.3 , Issue.3 , pp. 171-176
    • Kaur, R.1    Kinger, S.2
  • 52
    • 84940073799 scopus 로고    scopus 로고
    • Integrating AES, DES, and 3-DES encryption algorithms for enhanced data security
    • Singh, Gurpreet, Kinger, Supriya, Integrating AES, DES, and 3-DES encryption algorithms for enhanced data security. Int. J. Sci. Eng. Res., 4(7), 2013.
    • (2013) Int. J. Sci. Eng. Res. , vol.4 , Issue.7
    • Singh, G.1    Kinger, S.2
  • 53
    • 84905752751 scopus 로고    scopus 로고
    • Enhancing cloud computing security using AES algorithm
    • 1 4
    • Sachdev, Abha, Bhansali, Mohit, Enhancing cloud computing security using AES algorithm. Int. J. Comput. Appl. 9:67 (2013), 19–23 1 4.
    • (2013) Int. J. Comput. Appl. , vol.9 , Issue.67 , pp. 19-23
    • Sachdev, A.1    Bhansali, M.2
  • 55
    • 85029722779 scopus 로고    scopus 로고
    • The NIST definition of cloud computing, National Institute of Standards and Technology (Accessed 24 July 2015).
    • The NIST definition of cloud computing, National Institute of Standards and Technology (Accessed 24 July 2015).
  • 56
    • 85024395425 scopus 로고    scopus 로고
    • Recent advances delivered by mobile cloud computing and Internet of things for big data applications: a survey
    • 11/03/
    • Stergiou, Christos, Psannis, Kostas E., Recent advances delivered by mobile cloud computing and Internet of things for big data applications: a survey. Int. J. Netw. Manag., 2016, 1–12 11/03/.
    • (2016) Int. J. Netw. Manag. , pp. 1-12
    • Stergiou, C.1    Psannis, K.E.2
  • 58
    • 84915749742 scopus 로고    scopus 로고
    • Symmetric key-based authentication and the session key agreement scheme in IoT environment
    • three hundred and thirtyth ed. Springer Berlin, Heidelberg Berlin
    • Park, N., et al. Symmetric key-based authentication and the session key agreement scheme in IoT environment. Computer Science and its Applications, three hundred and thirtyth ed., 2015, Springer Berlin, Heidelberg, Berlin, 379–384.
    • (2015) Computer Science and its Applications , pp. 379-384
    • Park, N.1
  • 61
    • 85029676749 scopus 로고    scopus 로고
    • Synapse Internet of Things Cloud, 2014. https://www.synapse-wireless.com/snap-components/iot.
    • (2014)
  • 62
    • 84893754378 scopus 로고    scopus 로고
    • Inter-cloud architectures and application brokering: taxonomy and survey
    • Grozev, N., Buyya, R., Inter-cloud architectures and application brokering: taxonomy and survey. Softw. - Pract. Exp. 44:3 (2014), 369–390.
    • (2014) Softw. - Pract. Exp. , vol.44 , Issue.3 , pp. 369-390
    • Grozev, N.1    Buyya, R.2
  • 65
    • 84900537270 scopus 로고    scopus 로고
    • Developing vehicular data cloud services in the iot environment
    • He, W., Yan, G., Xu, L.D., Developing vehicular data cloud services in the iot environment. IEEE Trans. Ind. Inf. 10:2 (2014), 1587–1595.
    • (2014) IEEE Trans. Ind. Inf. , vol.10 , Issue.2 , pp. 1587-1595
    • He, W.1    Yan, G.2    Xu, L.D.3
  • 66
    • 84901607859 scopus 로고    scopus 로고
    • Intelligent services for big data science
    • Dobre, C., Xhafa, F., Intelligent services for big data science. Future Gener. Comput. Syst. 37 (2014), 267–281.
    • (2014) Future Gener. Comput. Syst. , vol.37 , pp. 267-281
    • Dobre, C.1    Xhafa, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.