Recently, there have been many issues related to academic misconduct,...
Read More![](https://www.iaesjournal.com/wp-content/uploads/2023/07/SCIOT.webp)
Cloud computing is an advancement in information technology as a method of delivering various services over the internet and remotely in the “cloud” or virtual space. With this technology, the use of physical devices is reduced because all processes and data storage are carried out through virtual space so that it can be done anytime and anywhere as long as there is internet access. In this rapidly growing technology, data security is an interesting and important topic for researchers.
The paper written by Ullah et al. with the title “Cloud and internet-of-things secure integration along with security concerns” published in the International Journal of Informatics and Communication Technology (IJ-ICT) Volume 12, Issue 1, April 2023 discusses the integration of cloud computing and internet of things (IoT) and the security issues that arise from the integration.
The authors provide an overview of both technologies and highlight the security challenges that should be addressed to ensure secure integration. The paper concludes by discussing the importance of addressing these security issues to enable the full potential of cloud computing and IoT to be realized [1].
It is without a doubt that the convenience and cheapness of cloud computing services have changed our daily lives. However, the security issues associated with cloud computing make us vulnerable to cyber crimes that occur every day. Attacks can cause damage to cloud infrastructure (devices), access, and cloud computing networks.
This attack is carried out by tricking the target into running an older, less secure software version. This attack forcibly targets cloud infrastructure. This attack results in damage to the cloud infrastructure and data leakage.
Denial of service (DoS) is a type of cyberattack to prevent legitimate users from accessing by flooding the traffic of a system, network, or device by sending information that triggers damage.
This attack allows attackers to obtain paid credentials for free.
This attack leverages hardware when two virtual machines (VMs) share physical resources, such as CPU cache. This allows an attacker to obtain access to sensitive information from one VM by monitoring the behaviour of the other VM.
A botnet attack is a cyber attack that uses a network of infected devices, known as bots, to perform malicious tasks.
Phishing is a social engineering attack that attempts to trick victims into revealing personal information, such as passwords, credit card numbers, or social security numbers. Phishing attacks are often carried out through email, but can also be carried out through text messages, social media, or even phone calls.
A type of attack that involves injecting malicious code into a cloud environment. The attacker inserts code so that the system malfunctions.
The domain of security attacks on different hybrid devices is increasing day by day. Recently IoT was adopted the most in terms of connection of new devices over the internet. Every day these smart devices are targeted by attackers, they try different methods to get the desired goal [3].
The integration of IoT with cloud computing poses security challenges for stored data. Cloud computing provides highly scalable and flexible storage, but also introduces new security risks to data stored in the cloud [4].
IoT relies on cloud computing to integrate servers, analyze information collected from sensors, increase processing power, and increase storage capacity. The main cloud-related challenges facing IoT include API gateway misconfiguration, which can lead to unauthorized access to data [5].
Successful data breaches still occur due to weak credentials. Since passwords are still the primary means of authentication, companies should implement strict password policies to prevent abuses. IAM misconfiguration can also lead to unauthorized access to data [5].
The heterogeneity of devices in IoT networks poses challenges to security. Different devices have different security requirements, and it may be hard to ensure that all devices are secure [6].
Integrating IoT with cloud computing can pose problems with latency, bandwidth requirements, and reliability [7].
Ensuring the security of IoT systems is complex, mainly because many smart devices have limited resources. Attackers easily exploit vulnerable firmware and software to gain unauthorized access to devices and data [8].
The integration of IoT with cloud computing poses several security challenges that need to be addressed to ensure secure integration. These challenges include data security, API gateway misconfiguration, IAM misconfiguration, heterogeneity, performance, and firmware and software vulnerabilities. Securing connected IoT devices and cloud services is essential to prevent data leakage and unauthorized access to sensitive information. Here are some best practices for securing IoT devices and connected cloud computing services:
Securing connected IoT devices and cloud services is critical to preventing data breaches and unauthorized access to sensitive information. Best practices for securing IoT devices and linked cloud services include using secure passwords, designing out security, updating firmware and software, monitoring devices and networks, using encryption, and restricting access.
References:
by: Dwi Ilham and Septian D. Cahyo
Recently, there have been many issues related to academic misconduct,...
Read MorePrihardanu et al. (2021) analyzed survey data related to indoor...
Read MoreBigBear.ai is a company at the forefront of leveraging artificial...
Read More