Local cover image
Local cover image
Image from Google Jackets

Security and privacy concerns of internet of things (IOT) in the cloud

By: Contributor(s): Publication details: Chennai ICT Academy 2022Edition: Vol.13(4), DecDescription: 2830-2835pSubject(s): Online resources: In: ICTACT journal on communication technologySummary: The term Internet of Things is used to describe a wide range of web- enabled services and products, including cutting-edge gadgetry. To put it simply, cloud computing is the method of making information and software normally housed on separate local servers available to consumers through the Internet on demand. Cloud services mediate between IoT devices and the applications that control them. Because of this, essential data may be easily accessed without the need for costly infrastructure. The cloud based IoT paradigm connects the virtual and real realms. Two devices need to check their identities against each other before they can exchange data. Creating a one-of-a-kind identifier for every piece of electrical equipment; this might be a number or a name A person's right to privacy has been violated because this data can be used to harm them. Therefore, the suggested system will only store essential information about the user. If you want to keep the exam's identifiers secret, you should choose a method that leaves no paper trail. Therefore, protecting the privacy of users is so crucial. Viruses and other malicious software pose a significant risk to your network and the data it contains. Many IoT applications necessitate the construction of a distributed, scalable, and geographically dispersed datacenter network to meet the demands of their users. The providers of the desired information services are the ones responsible for automating the extensive data classification, analysis, and processing. Protective measures should ideally be handled by the security service desk. Using current approaches exposes too much data and services to risk. The goal of this completely new layout is to create a framework that can't be harmed by environmental elements in any way.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Status Barcode
Articles Abstract Database Articles Abstract Database School of Engineering & Technology Archieval Section Not for loan 2023-0552
Total holds: 0

The term Internet of Things is used to describe a wide range of web-
enabled services and products, including cutting-edge gadgetry. To put
it simply, cloud computing is the method of making information and
software normally housed on separate local servers available to
consumers through the Internet on demand. Cloud services mediate
between IoT devices and the applications that control them. Because of
this, essential data may be easily accessed without the need for costly
infrastructure. The cloud based IoT paradigm connects the virtual and
real realms. Two devices need to check their identities against each
other before they can exchange data. Creating a one-of-a-kind
identifier for every piece of electrical equipment; this might be a
number or a name A person's right to privacy has been violated because
this data can be used to harm them. Therefore, the suggested system
will only store essential information about the user. If you want to keep
the exam's identifiers secret, you should choose a method that leaves
no paper trail. Therefore, protecting the privacy of users is so crucial.
Viruses and other malicious software pose a significant risk to your
network and the data it contains. Many IoT applications necessitate the
construction of a distributed, scalable, and geographically dispersed
datacenter network to meet the demands of their users. The providers
of the desired information services are the ones responsible for
automating the extensive data classification, analysis, and processing.
Protective measures should ideally be handled by the security service
desk. Using current approaches exposes too much data and services to
risk. The goal of this completely new layout is to create a framework
that can't be harmed by environmental elements in any way.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image
Share
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.