Security and privacy concerns of internet of things (IOT) in the cloud
Publication details: Chennai ICT Academy 2022Edition: Vol.13(4), DecDescription: 2830-2835pSubject(s): Online resources: In: ICTACT journal on communication technologySummary: The term Internet of Things is used to describe a wide range of web- enabled services and products, including cutting-edge gadgetry. To put it simply, cloud computing is the method of making information and software normally housed on separate local servers available to consumers through the Internet on demand. Cloud services mediate between IoT devices and the applications that control them. Because of this, essential data may be easily accessed without the need for costly infrastructure. The cloud based IoT paradigm connects the virtual and real realms. Two devices need to check their identities against each other before they can exchange data. Creating a one-of-a-kind identifier for every piece of electrical equipment; this might be a number or a name A person's right to privacy has been violated because this data can be used to harm them. Therefore, the suggested system will only store essential information about the user. If you want to keep the exam's identifiers secret, you should choose a method that leaves no paper trail. Therefore, protecting the privacy of users is so crucial. Viruses and other malicious software pose a significant risk to your network and the data it contains. Many IoT applications necessitate the construction of a distributed, scalable, and geographically dispersed datacenter network to meet the demands of their users. The providers of the desired information services are the ones responsible for automating the extensive data classification, analysis, and processing. Protective measures should ideally be handled by the security service desk. Using current approaches exposes too much data and services to risk. The goal of this completely new layout is to create a framework that can't be harmed by environmental elements in any way.| Item type | Current library | Status | Barcode | |
|---|---|---|---|---|
Articles Abstract Database
|
School of Engineering & Technology Archieval Section | Not for loan | 2023-0552 |
The term Internet of Things is used to describe a wide range of web-
enabled services and products, including cutting-edge gadgetry. To put
it simply, cloud computing is the method of making information and
software normally housed on separate local servers available to
consumers through the Internet on demand. Cloud services mediate
between IoT devices and the applications that control them. Because of
this, essential data may be easily accessed without the need for costly
infrastructure. The cloud based IoT paradigm connects the virtual and
real realms. Two devices need to check their identities against each
other before they can exchange data. Creating a one-of-a-kind
identifier for every piece of electrical equipment; this might be a
number or a name A person's right to privacy has been violated because
this data can be used to harm them. Therefore, the suggested system
will only store essential information about the user. If you want to keep
the exam's identifiers secret, you should choose a method that leaves
no paper trail. Therefore, protecting the privacy of users is so crucial.
Viruses and other malicious software pose a significant risk to your
network and the data it contains. Many IoT applications necessitate the
construction of a distributed, scalable, and geographically dispersed
datacenter network to meet the demands of their users. The providers
of the desired information services are the ones responsible for
automating the extensive data classification, analysis, and processing.
Protective measures should ideally be handled by the security service
desk. Using current approaches exposes too much data and services to
risk. The goal of this completely new layout is to create a framework
that can't be harmed by environmental elements in any way.
There are no comments on this title.