Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs

Summary Recent developments in the cloud technologies have motivated the migration of distributed large systems, specifically the Internet of Things to the cloud architecture. Since Internet of Things consist of a vast network and variety of objects, the cloud platform proves to be an ideal option....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Concurrency and computation 2019-04, Vol.31 (8), p.n/a
Hauptverfasser: Khurshid, Anum, Khan, Abdul Nasir, Khan, Fiaz Gul, Ali, Mazhar, Shuja, Junaid, Khan, Atta ur Rehman
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Summary Recent developments in the cloud technologies have motivated the migration of distributed large systems, specifically the Internet of Things to the cloud architecture. Since Internet of Things consist of a vast network and variety of objects, the cloud platform proves to be an ideal option. It is essential for the proper functioning of the Internet of Things to be able to share data among the system processes. The biggest problem faced during the transition of the IoTs to the cloud is the security of data especially while data sharing within the cloud and among its tenants. Information Flow Control mechanisms are one of the many solutions to enable a controlled sharing of data. Integration of Information Flow Control Systems to the existing architecture requires various levels of re‐engineering efforts. Moreover, most of the Information Flow Control systems focus on data flow within the cloud and neglect the security and integrity of data while it is being transferred to the cloud from various devices. This research focuses on securing the entire process of data migration to cloud from devices while the in‐cloud data flow is monitored by the Information Flow Control policies specified by the users. We have developed a prototype for the proposed model, and results are evaluated on the basis of energy consumption and execution time. As proposed model provides security services such as privacy, integrity, and authentication, hence it takes more execution time and consumes more energy as compared with the existing model.
ISSN:1532-0626
1532-0634
DOI:10.1002/cpe.4729