Singh et al., 2015 - Google Patents
Twenty security considerations for cloud-supported Internet of ThingsSingh et al., 2015
View PDF- Document ID
- 4838904704475929344
- Author
- Singh J
- Pasquier T
- Bacon J
- Ko H
- Eyers D
- Publication year
- Publication venue
- IEEE Internet of things Journal
External Links
Snippet
To realize the broad vision of pervasive computing, underpinned by the “Internet of Things”(IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT …
- 238000005516 engineering process 0 abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Singh et al. | Twenty security considerations for cloud-supported Internet of Things | |
Ali et al. | Multi-access edge computing architecture, data security and privacy: A review | |
Jurcut et al. | Security considerations for Internet of Things: A survey | |
Iqbal et al. | An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security | |
Gebremichael et al. | Security and privacy in the industrial internet of things: Current standards and future challenges | |
Wazid et al. | Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap | |
Arfaoui et al. | A security architecture for 5G networks | |
Liu et al. | A survey on secure data analytics in edge computing | |
Jurcut et al. | Introduction to IoT security | |
Seliem et al. | Towards privacy preserving iot environments: a survey | |
Oh et al. | Security requirements analysis for the IoT | |
Sicari et al. | Security, privacy and trust in Internet of Things: The road ahead | |
Tuna et al. | A survey on information security threats and solutions for Machine to Machine (M2M) communications | |
Rahouti et al. | Secure software-defined networking communication systems for smart cities: Current status, challenges, and trends | |
Popescul et al. | Data security in smart cities: challenges and solutions | |
Thabit et al. | Cryptography algorithms for enhancing IoT security | |
Singh et al. | Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things | |
Rizzardi et al. | Securing the access control policies to the Internet of Things resources through permissioned blockchain | |
Jabraeil Jamali et al. | IoT security | |
Ullrich et al. | Network-based secret communication in clouds: A survey | |
Bhattacharjya et al. | Present scenarios of IoT projects with security aspects focused | |
Zhang et al. | Overview of IoT security architecture | |
Muzammal et al. | A study on secured authentication and authorization in Internet of Things: Potential of blockchain technology | |
Moussaid et al. | Enhance the security properties and information flow control | |
Pešić et al. | CAAVI-RICS model for observing the security of distributed IoT and edge computing systems |