Abstract
Internet of things (IoT) empowers different gadgets to interface with one another by means of web. This guarantees the gadgets to be brilliant and send the data to an incorporated framework, which will at that point screen and take activities as per the undertaking given to it. IoT can be utilized in numerous areas such human services, transportation, amusement, power lattices, and keen structures. IoT is required to go about as a motivation for the future developments, and its utilization is relied upon to rise exponentially over the coming years. As indicated by security point of view, the IoT will be challenged with more extreme difficulties. Subsequently, the new security and protection issues will emerge.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: MCC’12, August 17, 2012, ACM 978-1-4503-1519-7/12/08
Kutzias D, Falkner J, Kett H (2019) On the complexity of cloud and IoT integration: architectures, challenges and solution approaches. In: Proceedings of the 4th international conference on internet of things, big data and security, pp 376–384
Fotouhi H, Moreira D, Alves M, Yomsi PM (2017) mRPL+: a mobility management framework in RPL/6LoWPAN. Comput Commun 104(2017):34–54
Dillon T, Wu C, Chang E (2010) Cloud computing: issues and challenges. In: 24th IEEE international conference on advanced information networking and applications
Nie T, Zhang T (2009) A study of DES and blowfish encryption algorithm. In: IEEE Reg. 10 Annu. Int. Conf. Proceedings/TENCON, pp 1–4. https://doi.org/10.1109/TENCON.2009.5396115
Zhu L, Wang R, Yang H (2017) Multi-path data distribution mechanism based on RPL for energyconsumption and time delay. Information 8(4):1–19. https://doi.org/10.3390/info8040124
Patil P, Narayankar P, Narayan DG, Meena SM (2016) A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Comput Sci 78:617–624. https://doi.org/10.1016/j.procs.2016.02.108
Poonia V, Yadav NS (2015) Analysis of modified Blowfish algorithm in different cases with various parameters. In: ICACCS 2015 - Proceeding 2nd international conference on advanced computing and communication systems, pp 5–9. https://doi.org/10.1109/ICACCS.2015.7324114
Suresh M, Neema M (2016) Hardware implementation of blish algorithm for the secure data transmission in internet of things. Procedia Technol 25(Raerest):248–255. https://doi.org/10.1016/j.protcy.2016.08.104.
Bruschi R et al (2017) Open stack extension for fog-powered personal services deployment. In: Proceeding of 29th international teletraffic congress ITC 2017, vol 2, pp 19–23. https://doi.org/10.23919/ITC.2017.8065705.
Mota AV, Azam S, Shanmugam B, Yeo KC, Kannoorpatti K (2018) Comparative analysis of different techniques of encryption for secured data transmission. In: IEEE International conference on power, control, signals and instrumentation engineering ICPCSI 2017, pp 231–237. https://doi.org/10.1109/ICPCSI.2017.8392158.
Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of IoT and cloud computing. Futur Gener Comput Syst 78(December 2017), 964–975. https://doi.org/10.1016/j.future.2016.11.031
Nandy T et al (2019) Review on security of internet of things authentication mechanism. IEEE Access 7(October):151054–151089
Kamgueu PO, Nataf E, Ndie TD (2018) Survey on RPL enhancements: a focus on topology, security and mobility. Comput Commun 120(July 2017):10–21
De Donno M, Giaretta A, Dragoni N, Bucchiarone A, Mazzara M (2019) Cyber-storms come fromclouds: security of cloud computing in the IoT era. Futur Internet 11(6), 1–30. https://doi.org/10.3390/fi11060127.
Malge S, Singh P (2019) Internet of things IoT: security perspective. Int J Trend Sci Res Dev 3(4):1041–1043. https://doi.org/10.31142/ijtsrd24010
Ari AAA et al (2019) Enabling privacy and security in cloud of things: architecture, applications, security and privacy challenges. Appl Comput Inf xxxx. https://doi.org/10.1016/j.aci.2019.11.005
Vijayalakshmi V, Vimal S (2019) A new edge computing based cloud system for IoT applications. Int J Recent Technol Eng (IJRTE) 8(2)
Kaur C (2020) The cloud computing and internet of things (IoT). Int J Sci Res Sci Eng Technol 7(1) (www.ijsrset.com)
Li W, Ping L (2009) Trust model to enhance security and interoperability of cloud environment. Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics) 5931:69–79. https://doi.org/10.1007/978-3-642-10665-1_7
Manuel P (2015) A trust model of cloud computing based on quality of service. Ann Oper Res 233(1):281–292. https://doi.org/10.1007/s10479-013-1380-x
Kaur U, Singh D (2015) Trust: models and architecture in cloud computing. Int J Comput Sci Inf Secur 13(12):150–155
Xu W (2018) Study on trust model for multi-users in cloud computing. Int J Netw Secur 20(4), 674–682
Kim HS, Paek J, Bahk S (2015) QU-RPL: queue utilization based RPL for load balancing in largescale industrial applications. In: 2015 12th Annu. IEEE Int. Conf. Sensing, Commun. Networking, SECON2015, pp 265–273. https://doi.org/10.1109/SAHCN.2015.7338325
Zhou B, Dastjerdi AV, Calheiros RN, Srirama SN, Buyya R (2015) A context sensitive off loading scheme for mobile cloud computing service. In: Proc.—2015 IEEE 8th Int. Conf. Cloud Comput. CLOUD2015, pp 869–876. https://doi.org/10.1109/CLOUD.2015.119
Qasem M et al (2018) Load balancing objective function in RPL draft-qasem-roll-rpl-load-balancing-01. Stand Track October:1–10
Gonzalez NM, et al. (2016) Fog computing: data analytics and cloud distributed processing on the network edges. In: Proc.—Int. Conf. Chil. Comput. Sci. Soc. SCCC. https://doi.org/10.1109/SCCC.2016.7836028
Singh S, Chana I (2015) Q-aware: quality of service based cloud resource provisioning. Computers and electrical engineering. Elsevier Ltd, Amsterdam
Wazir U, Khan F, Shah S (2016) Service level agreement in cloud computing: a survey. Int J Comput Sci Inf Secur (IJCSIS) 14(6)
Padmaja K, Seshadri R, Anusha P (2016) Different scheduling algorithms in types of clouds. Int J Comput Sci Trends Technol (IJCST) 4(5)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Walia, R., Garg, P. (2022). Performance and Security Issues of Integrating Cloud Computing with IoT. In: Marriwala, N., Tripathi, C.C., Jain, S., Mathapathi, S. (eds) Emergent Converging Technologies and Biomedical Systems . Lecture Notes in Electrical Engineering, vol 841. Springer, Singapore. https://doi.org/10.1007/978-981-16-8774-7_1
Download citation
DOI: https://doi.org/10.1007/978-981-16-8774-7_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8773-0
Online ISBN: 978-981-16-8774-7
eBook Packages: EngineeringEngineering (R0)