Trust and Access Controls in IoT to Avoid Malicious Activity
Document Type
Book Section
Publication Date
10-27-2020
Publication Title
Cloud Network Management: An IOT based Framework
Publisher
Chapman and Hall/CRC
Edition
1
First page number:
87
Last page number:
104
Abstract
This chapter discusses computing data in a cloud, current challenges to store, retrieve, process, as well as security requirements, and possible solutions. It frames the trust-based access control model that incorporates a digital signature to minimize the malicious activity for storage, retrieval, updates, and processing of sensitive data. The chapter provides the trust framework for the user and access control algorithms for data processing in the cloud environment. Cloud computing is a paradigm with unlimited on-demand services that is software as a service. It can virtualize hardware and software resources, with high processing power, storage, and pay-per-usage. Big Data technology solves many problems irrespective of volume, velocity, and source of generation. It is a continually changing technology, and many industries, customers, and government agencies are involved in usage and managing. Vulnerability assessment of the devices and software supporting these devices are essential to trust the functionality of these devices.
Keywords
Computing data; Cloud computing; Trust framework; Big data technology; Internet of things; IoT
Disciplines
Electrical and Computer Engineering | Engineering
Language
English
Repository Citation
Reddy, Y. B.,
Latifi, S.
(2020).
Trust and Access Controls in IoT to Avoid Malicious Activity.
Cloud Network Management: An IOT based Framework
87-104.
Chapman and Hall/CRC.
http://dx.doi.org/10.1201/9780429288630