Trust and Access Controls in IoT to Avoid Malicious Activity

Document Type

Book Section

Publication Date

10-27-2020

Publication Title

Cloud Network Management: An IOT based Framework

Publisher

Chapman and Hall/CRC

Edition

1

First page number:

87

Last page number:

104

Abstract

This chapter discusses computing data in a cloud, current challenges to store, retrieve, process, as well as security requirements, and possible solutions. It frames the trust-based access control model that incorporates a digital signature to minimize the malicious activity for storage, retrieval, updates, and processing of sensitive data. The chapter provides the trust framework for the user and access control algorithms for data processing in the cloud environment. Cloud computing is a paradigm with unlimited on-demand services that is software as a service. It can virtualize hardware and software resources, with high processing power, storage, and pay-per-usage. Big Data technology solves many problems irrespective of volume, velocity, and source of generation. It is a continually changing technology, and many industries, customers, and government agencies are involved in usage and managing. Vulnerability assessment of the devices and software supporting these devices are essential to trust the functionality of these devices.

Keywords

Computing data; Cloud computing; Trust framework; Big data technology; Internet of things; IoT

Disciplines

Electrical and Computer Engineering | Engineering

Language

English

UNLV article access

Search your library

Share

COinS