Security Perspective of Cloud and Internet of Things With 5G Networks

Security Perspective of Cloud and Internet of Things With 5G Networks

Neetu Faujdar
DOI: 10.4018/978-1-7998-4685-7.ch002
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Pervasive computing has been greatly supported by the internet of things. The use of internet of things has created the environment that helps in the management of the different modules that are the part of the complete system, which can work effectively without the interference with the other components of the system. The cloud environment with the internet of things can help in getting the greater extend of data sharing. Little attention has been provided to the security of the various stakeholders that are the part of the system. IoT cloud integration involved privacy, security, and personal safety risk of the stakeholders. Not only are these types of security attacks possible, but there is also the possibility of attack on the IoT components like hardware manipulation to disrupt the services. As we are on the network, all the communication attacks of network are also possible. This chapter will cover common aspects of regarding the cloud and internet of things (IOT) with 5G networks.
Chapter Preview
Top

Introduction

Cloud computing technology, seen as the staggering framework overcome, might convey us to the “cloud society” after the PCs and the Internet conveyed people to the “compose society” (D Singh 2015, Atzori 2010). In the arrangement of Cloud Computing, all the ordinary utilization of PCs will be moved into the fogs (virtualized mass computational servers which organize on the Internet), all we need is a passageway to the Internet and after that we can play out any work on the cloud (R Khan 2012, J Gubbi 2013). Disseminated processing is the latest headway in the movement of figuring power. It cuts down the reason for segment, enabling access to enlisting power effectively only available to the greatest affiliations. It furthermore enables tinier relationship to utilize totally directed enlisting structures, decreasing the essentials for extraordinarily capable IT staff. Dispersed figuring insinuates applications passed on as organizations over the Internet and besides the hardware and structures programming in the server cultivates that give those organizations. At the point when all is said in done, Cloud Computing is internet dealing with, whereby shared resources, programming, and information are given on enthusiasm to PCs, mobile phones, and other practically identical contraptions (M Nia 2015, H Salmani 2016). Disseminated figuring is also another style of preparing in which dynamically adaptable resources are given as virtualized organizations. This licenses pro associations and customers to change their preparing limit dependent upon what sum is required at a given time, or for a given task. Circulated figuring is sifted through on stages like Google, Salesforce, Zoho, Axios Systems, Microsoft, Yahoo, Amazon (M Tehranipoor 2010, G Lafuente 2015).

Cloud Computing Security Issues

Cloud Development Models

Cloud model fix, fixes, stage, amassing, and programming establishment is surrendered as organizations measure or down depend on the web. It has three standards delivery models (J Mineraud 2015, S Abdelwahab 2014):

  • 1.

    Private Cloud: Private cloud is another name utilized by customers nowadays to delineate consumed copies appropriated enlisting in the private structure. These are arranged up in the inward server ranch exercises of an affiliation. In private mists, the data, for example, virtual assets and versatile applications that are given by different customers are gathered together and are made accessible for cloud client for purchasing and selling.

  • 2.

    Open Cloud: Open spread disseminated processing infers that customary standard definition, when the advantages are watchfully given a fine-grained, self relationship towards reason on the web, from an external supplier who is off-website and he gives property and bills on nitty gitty utilize comprehension of the explanation.

  • 3.

    Half and half cloud: Cross breed cloud is a subtype of private cloud which is associated with various cloud affiliations, half regulated given as a specific unit. It changes virtual IT into a blend of both private and open fogs. Cream cloud gives increasingly secure control of data and applications and licenses, a gathering of programming to get the information on the Internet.

Complete Chapter List

Search this Book:
Reset