Advertisement

Towards Integration of Cloud Computing with Internet of Things

  • Junaid Latief ShahEmail author
  • Heena Farooq Bhat
Chapter
Part of the Intelligent Systems Reference Library book series (ISRL, volume 174)

Abstract

The “Internet of Things” refers to a novel technological innovation that enables pervasive communication of things with “physical or virtual world” via internet. As sensor devices and RFID communication have seen an exponential surge in recent years, humongous amounts of data gets generated, which becomes difficult to handle with limited processing and storage available in these sensor nodes. To overcome this, Cloud and IoT amalgamation also known as CloudIoT provides an efficient solution for bridging communication between heterogeneous devices and handling ever increasing data demands. CloudIoT framework permits seamless application deployment and service rendering using Cloud service based models. In this chapter, we review the available CloudIoT literature and present a holistic vision on the CloudIoT integration components. The chapter also presents seamless applications dispensed by CloudIoT platform and contemplates discussion on factors driving CloudIoT integration. The work in this chapter also highlights security issues affecting IoT layered architecture including vulnerabilities inherent in the Cloud. Also a brief discussion on some potential mitigation measures will be provided. The chapter also elaborates discussion on various CloudIoT platforms that aim at solving heterogeneity issue between the Cloud and Things. Finally, the chapter concludes by identifying some open research issues and challenges hampering Cloud and IoT integration.

Keywords

Cloud Things Sensor IoT RFID 

References

  1. 1.
    Aazam, M., Huh, E.N.: Fog computing and smart gateway based communication for cloud of things. In: International Conference on Future Internet of Things and Cloud (FiCloud), pp. 464–470. IEEE, 2014 AugGoogle Scholar
  2. 2.
    Aazam, M., Huh, E.N., St-Hilaire, M., Lung, C.H., Lambadaris, I.: Cloud of things: integration of IoT with cloud computing. In: Robots and Sensor Clouds, pp. 77–94. Springer, Cham (2016)Google Scholar
  3. 3.
    Aazam, M., Hung, P.P., Huh, E.N.: Smart gateway based communication for cloud of things. In: 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1–6. IEEE, April 2014Google Scholar
  4. 4.
    Abomhara, M., Køien, G.M.: Security and privacy in the internet of things: current status and open issues. In: 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1–8. IEEE, May 2014Google Scholar
  5. 5.
    Aguzzi, S., Bradshaw, D., Canning, M., Cansfield, M., Carter, P., Cattaneo, G., Stevens, R.: Definition of a research and innovation policy leveraging cloud computing and IoT combination. Final report, European Commission, SMART, 37 (2013)Google Scholar
  6. 6.
    Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of things: security vulnerabilities and challenges. In: IEEE Symposium on Computers and Communication (ISCC), pp. 180–187. IEEE, July 2015Google Scholar
  7. 7.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Zaharia, M.: Above the clouds: a berkeley view of cloud computing, vol. 4, pp. 506–522. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley (2009)Google Scholar
  8. 8.
    Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16. ACM, Aug 2012Google Scholar
  9. 9.
    Botta, A., De Donato, W., Persico, V., Pescapé, A.: On the integration of cloud computing and internet of things. In: 2014 International Conference on Future Internet of Things and Cloud (FiCloud), pp. 23–30. IEEE, Aug 2014Google Scholar
  10. 10.
    Botta, A., De Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)CrossRefGoogle Scholar
  11. 11.
    Buyya, R., Ranjan, R., Calheiros, R.N.: Intercloud: utility-oriented federation of cloud computing environments for scaling of application services. In: International Conference on Algorithms and Architectures for Parallel Processing, pp. 13–31. Springer, Berlin, May 2010CrossRefGoogle Scholar
  12. 12.
    Capkun, S., Buttyán, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mob. Comput. 2(1), 52–64 (2003)CrossRefGoogle Scholar
  13. 13.
    Chen, S., Xu, H., Liu, D., Hu, B., Wang, H.: A vision of IoT: applications, challenges, and opportunities with china perspective. IEEE Internet Things J. 1(4), 349–359 (2014)CrossRefGoogle Scholar
  14. 14.
    Cook, A., Robinson, M., Ferrag, M.A., Maglaras, L.A., He, Y., Jones, K., Janicke, H.: Internet of cloud: security and privacy issues. In: Cloud Computing for Optimization: Foundations, Applications, and Challenges, pp. 271–301. Springer, Cham (2018)Google Scholar
  15. 15.
    Devipriya, S.: Contribution of internet of things: a survey. J. Web Develop. Web Design. 1(1–3) (2017)Google Scholar
  16. 16.
    Díaz, M., Martín, C., Rubio, B.: State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing. J. Netw. Comput. Appl. 67, 99–117 (2016)CrossRefGoogle Scholar
  17. 17.
    Distefano, S., Merlino, G., Puliafito, A.: Enabling the cloud of things. In: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 858–863. IEEE, July 2012Google Scholar
  18. 18.
    Evans, D.: The internet of things: how the next evolution of the internet is changing everything. CISCO White Paper 1(2011), 1–11 (2011)Google Scholar
  19. 19.
    Fox, G.C., Kamburugamuve, S., Hartman, R.D.: Architecture and measured characteristics of a cloud based internet of things. In: 2012 International Conference on Collaboration Technologies and Systems (CTS), pp. 6–12. IEEE, May 2012Google Scholar
  20. 20.
    Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50–57 (2011)CrossRefGoogle Scholar
  21. 21.
    Grozev, N., Buyya, R.: Inter-cloud architectures and application brokering: taxonomy and survey. Software Practice Exper. 44(3), 369–390Google Scholar
  22. 22.
    Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRefGoogle Scholar
  23. 23.
    Hassan, M.M., Song, B., Huh, E.N.: A framework of sensor-cloud integration opportunities and challenges. In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, pp. 618–626. ACM, Feb 2009Google Scholar
  24. 24.
    Jeffery, K.: Keynote: CLOUDs: a large virtualisation of small things. In: The 2nd International Conference on Future Internet of Things and Cloud (FiCloud-2014) (2014)Google Scholar
  25. 25.
    Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)CrossRefGoogle Scholar
  26. 26.
    Khodkari, H., Maghrebi, S.G., Branch, R.: Necessity of the integration Internet of Things and cloud services with quality of service assurance approach. Bulletin de la Société Royale des Sciences de Liège 85(1), 434–445 (2016)Google Scholar
  27. 27.
    Khorshed, M.T., Ali, A.S., Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28(6), 833–851 (2012)CrossRefGoogle Scholar
  28. 28.
    Kovatsch, M., Mayer, S., Ostermaier, B.: Moving application logic from the firmware to the cloud: towards the thin server architecture for the internet of things. In: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 751–756. IEEE, July 2012Google Scholar
  29. 29.
    Lee, J.Y., Lin, W.C., Huang, Y.H.: A lightweight authentication protocol for internet of things. In: 2014 International Symposium on Next-Generation Electronics (ISNE), pp. 1–2. IEEE, May 2014Google Scholar
  30. 30.
    Lee, K., Murray, D., Hughes, D., Joosen, W.: Extending sensor networks into the cloud using amazon web services. In: 2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications (NESEA), pp. 1–7. IEEE, Nov 2010Google Scholar
  31. 31.
    Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017)CrossRefGoogle Scholar
  32. 32.
    Liu, W., Zhao, X., Xiao, J., Wu, Y.: Automatic vehicle classification instrument based on multiple sensor information fusion. In: Third International Conference on Information Technology and Applications (ICITA 2005), vol. 1, pp. 379–382. IEEE, July 2005Google Scholar
  33. 33.
    Machine-to-Machine connections to hit 12 billion in 2020, generating EUR714 billion revenue. https://machinaresearch.com/static/media/uploads/machina_research_press_release_m2m_global_forecast_analysis_2010_20.pdf
  34. 34.
    Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R.: Identity authentication and capability based access control (iacac) for the internet of things. J. Cyber Secur. Mobility 1(4), 309–348 (2013)Google Scholar
  35. 35.
    Meingast, M., King, J., Mulligan, D.K.: Embedded RFID and everyday things: a case study of the security and privacy risks of the US e-passport. In: IEEE International Conference on RFID 2007, pp. 7–14. IEEE, Mar 2007Google Scholar
  36. 36.
    Mell, P., Grance, T.: The NIST definition of cloud computing (2011)Google Scholar
  37. 37.
    Mo, Y., Sinopoli, B.: Secure control against replay attacks. In: 47th Annual Allerton Conference on Communication, Control, and Computing. Allerton 2009, pp. 911–918. IEEE, Sept 2009Google Scholar
  38. 38.
    Nordrum, A.: Popular internet of things forecast of 50 billion devices by 2020 is outdated. IEEE Spectrum 18 (2016)Google Scholar
  39. 39.
    Parwekar, P.: From internet of things towards cloud of things. In: 2011 2nd International Conference on Computer and Communication Technology (ICCCT), pp. 329–333. IEEE, Sept 2011Google Scholar
  40. 40.
    Rao, B.P., Saluia, P., Sharma, N., Mittal, A., Sharma, S.V.: Cloud computing for Internet of things & sensing based applications. In: 2012 Sixth International Conference on Sensing Technology (ICST), pp. 374–380. IEEE, Dec 2012Google Scholar
  41. 41.
    Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Computer 44(9), 51–58 (2011)CrossRefGoogle Scholar
  42. 42.
    Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)CrossRefGoogle Scholar
  43. 43.
    Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRefGoogle Scholar
  44. 44.
    Soldatos, J., Kefalakis, N., Hauswirth, M., Serrano, M., Calbimonte, J. P., Riahi, M., Aberer, K., Jayaraman, P.P., Zaslavsky, A., Žarko, I.P., Herzog, R.: Openiot: Open source internet-of-things in the cloud. In: Interoperability and Open-Source Solutions for the Internet of Things, pp. 13–25. Springer, Cham (2015)CrossRefGoogle Scholar
  45. 45.
    Soliman, M., Abiodun, T., Hamouda, T., Zhou, J., Lung, C.H.: Smart home: integrating internet of things with web services and cloud computing. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), vol. 2, pp. 317–320. IEEE, Dec 2013Google Scholar
  46. 46.
    Suciu, G., Vulpe, A., Halunga, S., Fratu, O., Todoran, G., Suciu, V.: Smart cities built on resilient cloud computing and secure internet of things. In: 2013 19th International Conference on Control Systems and Computer Science (CSCS), pp. 513–518. IEEE, May 2013Google Scholar
  47. 47.
    Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 3, pp. 648–651. IEEE, Mar 2012Google Scholar
  48. 48.
    Thepparat, T., Harnprasarnkit, A., Thippayawong, D., Boonjing, V., Chanvarasuth, P.: A virtualization approach to auto-scaling problem. In: 2011 Eighth International Conference on Information Technology: New Generations (ITNG), pp. 169–173. IEEE, April 2011Google Scholar
  49. 49.
    Velte, A.T., Velte, T.J., Elsenpeter, R.C., Elsenpeter, R.C.: Cloud Computing: A Practical Approach, p. 44. McGraw-Hill, New York (2010)Google Scholar
  50. 50.
    Villegas, D., Bobroff, N., Rodero, I., Delgado, J., Liu, Y., Devarakonda, A., Fong, L., Masoud Sadjadi, S., Parashar, M.: Cloud federation in a layered service model. J. Comput. Syst. Sci. 78(5), 1330–1344 (2012)CrossRefGoogle Scholar
  51. 51.
    Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)MathSciNetCrossRefGoogle Scholar
  52. 52.
    Wen, Q., Dong, X., Zhang, R.: Application of dynamic variable cipher security certificate in internet of things. In: 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS), vol. 3, pp. 1062–1066. IEEE, Oct 2012Google Scholar
  53. 53.
    Wu, M., Lu, T.J., Ling, F.Y., Sun, J., Du, H.Y.: Research on the architecture of Internet of things. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 5, p. V5-484. IEEE, Aug 2010Google Scholar
  54. 54.
    Yuriyama, M., Kushida, T.: Sensor-cloud infrastructure-physical sensor management with virtualized sensors on cloud computing. In: 2010 13th International Conference on Network-Based Information Systems (NBiS), pp. 1–8. IEEE, Sept 2010Google Scholar
  55. 55.
    Zaslavsky, A., Perera, C., Georgakopoulos, D.: Sensing as a service and big data (2013). arXiv preprint arXiv:1301.0159
  56. 56.
    Zhao, G., Si, X., Wang, J., Long, X., Hu, T.: A novel mutual authentication scheme for internet of things. In: Proceedings of 2011 International Conference on Modelling, Identification and Control (ICMIC), pp. 563–566. IEEE, June 2011Google Scholar
  57. 57.
    Zhao, K., Ge, L.: A survey on the internet of things security. In: 2013 9th International Conference onComputational Intelligence and Security (CIS), pp. 663–667. IEEE, Dec 2013Google Scholar
  58. 58.
    Zhou, J., Leppanen, T., Harjula, E., Ylianttila, M., Ojala, T., Yu, C., Yang, L.T.: Cloudthings: A common architecture for integrating the internet of things with cloud computing. In: IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 651–657. IEEE, June 2013Google Scholar
  59. 59.
    Zhu, W., Luo, C., Wang, J., Li, S.: Multimedia cloud computing. IEEE Signal Process. Mag. 28(3), 59–69 (2011)CrossRefGoogle Scholar
  60. 60.
    Zikopoulos, P., Eaton, C.: Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data. McGraw-Hill Osborne Media, New YorkGoogle Scholar
  61. 61.
    Zorzi, M., Gluhak, A., Lange, S., Bassi, A.: From today’s intranet of things to a future internet of things: a wireless-and mobility-related view. IEEE Wirel. Commun. 17(6) (2010)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Information Technology, Sri Pratap CollegeCluster University SrinagarSrinagarIndia
  2. 2.Department of Computer ScienceUniversity of KashmirSrinagarIndia

Personalised recommendations