Skip to main content

Performance and Security Issues of Integrating Cloud Computing with IoT

  • Conference paper
  • First Online:
Emergent Converging Technologies and Biomedical Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 841))

Abstract

Internet of things (IoT) empowers different gadgets to interface with one another by means of web. This guarantees the gadgets to be brilliant and send the data to an incorporated framework, which will at that point screen and take activities as per the undertaking given to it. IoT can be utilized in numerous areas such human services, transportation, amusement, power lattices, and keen structures. IoT is required to go about as a motivation for the future developments, and its utilization is relied upon to rise exponentially over the coming years. As indicated by security point of view, the IoT will be challenged with more extreme difficulties. Subsequently, the new security and protection issues will emerge.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: MCC’12, August 17, 2012, ACM 978-1-4503-1519-7/12/08

    Google Scholar 

  2. Kutzias D, Falkner J, Kett H (2019) On the complexity of cloud and IoT integration: architectures, challenges and solution approaches. In: Proceedings of the 4th international conference on internet of things, big data and security, pp 376–384

    Google Scholar 

  3. Fotouhi H, Moreira D, Alves M, Yomsi PM (2017) mRPL+: a mobility management framework in RPL/6LoWPAN. Comput Commun 104(2017):34–54

    Article  Google Scholar 

  4. Dillon T, Wu C, Chang E (2010) Cloud computing: issues and challenges. In: 24th IEEE international conference on advanced information networking and applications

    Google Scholar 

  5. Nie T, Zhang T (2009) A study of DES and blowfish encryption algorithm. In: IEEE Reg. 10 Annu. Int. Conf. Proceedings/TENCON, pp 1–4. https://doi.org/10.1109/TENCON.2009.5396115

  6. Zhu L, Wang R, Yang H (2017) Multi-path data distribution mechanism based on RPL for energyconsumption and time delay. Information 8(4):1–19. https://doi.org/10.3390/info8040124

    Article  Google Scholar 

  7. Patil P, Narayankar P, Narayan DG, Meena SM (2016) A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Comput Sci 78:617–624. https://doi.org/10.1016/j.procs.2016.02.108

  8. Poonia V, Yadav NS (2015) Analysis of modified Blowfish algorithm in different cases with various parameters. In: ICACCS 2015 - Proceeding 2nd international conference on advanced computing and communication systems, pp 5–9. https://doi.org/10.1109/ICACCS.2015.7324114

  9. Suresh M, Neema M (2016) Hardware implementation of blish algorithm for the secure data transmission in internet of things. Procedia Technol 25(Raerest):248–255. https://doi.org/10.1016/j.protcy.2016.08.104.

  10. Bruschi R et al (2017) Open stack extension for fog-powered personal services deployment. In: Proceeding of 29th international teletraffic congress ITC 2017, vol 2, pp 19–23. https://doi.org/10.23919/ITC.2017.8065705.

  11. Mota AV, Azam S, Shanmugam B, Yeo KC, Kannoorpatti K (2018) Comparative analysis of different techniques of encryption for secured data transmission. In: IEEE International conference on power, control, signals and instrumentation engineering ICPCSI 2017, pp 231–237. https://doi.org/10.1109/ICPCSI.2017.8392158.

  12. Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of IoT and cloud computing. Futur Gener Comput Syst 78(December 2017), 964–975. https://doi.org/10.1016/j.future.2016.11.031

  13. Nandy T et al (2019) Review on security of internet of things authentication mechanism. IEEE Access 7(October):151054–151089

    Google Scholar 

  14. Kamgueu PO, Nataf E, Ndie TD (2018) Survey on RPL enhancements: a focus on topology, security and mobility. Comput Commun 120(July 2017):10–21

    Google Scholar 

  15. De Donno M, Giaretta A, Dragoni N, Bucchiarone A, Mazzara M (2019) Cyber-storms come fromclouds: security of cloud computing in the IoT era. Futur Internet 11(6), 1–30. https://doi.org/10.3390/fi11060127.

  16. Malge S, Singh P (2019) Internet of things IoT: security perspective. Int J Trend Sci Res Dev 3(4):1041–1043. https://doi.org/10.31142/ijtsrd24010

  17. Ari AAA et al (2019) Enabling privacy and security in cloud of things: architecture, applications, security and privacy challenges. Appl Comput Inf xxxx. https://doi.org/10.1016/j.aci.2019.11.005

  18. Vijayalakshmi V, Vimal S (2019) A new edge computing based cloud system for IoT applications. Int J Recent Technol Eng (IJRTE) 8(2)

    Google Scholar 

  19. Kaur C (2020) The cloud computing and internet of things (IoT). Int J Sci Res Sci Eng Technol 7(1) (www.ijsrset.com)

  20. Li W, Ping L (2009) Trust model to enhance security and interoperability of cloud environment. Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics) 5931:69–79. https://doi.org/10.1007/978-3-642-10665-1_7

  21. Manuel P (2015) A trust model of cloud computing based on quality of service. Ann Oper Res 233(1):281–292. https://doi.org/10.1007/s10479-013-1380-x

    Article  Google Scholar 

  22. Kaur U, Singh D (2015) Trust: models and architecture in cloud computing. Int J Comput Sci Inf Secur 13(12):150–155

    Google Scholar 

  23. Xu W (2018) Study on trust model for multi-users in cloud computing. Int J Netw Secur 20(4), 674–682

    Google Scholar 

  24. Kim HS, Paek J, Bahk S (2015) QU-RPL: queue utilization based RPL for load balancing in largescale industrial applications. In: 2015 12th Annu. IEEE Int. Conf. Sensing, Commun. Networking, SECON2015, pp 265–273. https://doi.org/10.1109/SAHCN.2015.7338325

  25. Zhou B, Dastjerdi AV, Calheiros RN, Srirama SN, Buyya R (2015) A context sensitive off loading scheme for mobile cloud computing service. In: Proc.—2015 IEEE 8th Int. Conf. Cloud Comput. CLOUD2015, pp 869–876. https://doi.org/10.1109/CLOUD.2015.119

  26. Qasem M et al (2018) Load balancing objective function in RPL draft-qasem-roll-rpl-load-balancing-01. Stand Track October:1–10

    Google Scholar 

  27. Gonzalez NM, et al. (2016) Fog computing: data analytics and cloud distributed processing on the network edges. In: Proc.—Int. Conf. Chil. Comput. Sci. Soc. SCCC. https://doi.org/10.1109/SCCC.2016.7836028

  28. Singh S, Chana I (2015) Q-aware: quality of service based cloud resource provisioning. Computers and electrical engineering. Elsevier Ltd, Amsterdam

    Google Scholar 

  29. Wazir U, Khan F, Shah S (2016) Service level agreement in cloud computing: a survey. Int J Comput Sci Inf Secur (IJCSIS) 14(6)

    Google Scholar 

  30. Padmaja K, Seshadri R, Anusha P (2016) Different scheduling algorithms in types of clouds. Int J Comput Sci Trends Technol (IJCST) 4(5)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Walia, R., Garg, P. (2022). Performance and Security Issues of Integrating Cloud Computing with IoT. In: Marriwala, N., Tripathi, C.C., Jain, S., Mathapathi, S. (eds) Emergent Converging Technologies and Biomedical Systems . Lecture Notes in Electrical Engineering, vol 841. Springer, Singapore. https://doi.org/10.1007/978-981-16-8774-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-8774-7_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-8773-0

  • Online ISBN: 978-981-16-8774-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics