Next Article in Journal
Distributed Edge Computing to Assist Ultra-Low-Latency VANET Applications
Next Article in Special Issue
The Design and Deployment of an End-To-End IoT Infrastructure for the Natural Environment
Previous Article in Journal
CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems
Previous Article in Special Issue
Novel Approach to Task Scheduling and Load Balancing Using the Dominant Sequence Clustering and Mean Shift Clustering Algorithms
Article Menu

Export Article

Open AccessArticle

Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era

1
DTU Compute, Technical University of Denmark, 2800 Kongens Lyngby, Denmark
2
Centre for Applied Autonomous Sensor Systems Orebro University, 701 82 Orebro, Sweden
3
Fondazione Bruno Kessler, Via Sommarive 18, 38123 Trento, Italy
4
Institute of Software Development and Engineering, Innopolis University, Universitetskaya St, 1, 420500 Innopolis, Russian Federation
*
Authors to whom correspondence should be addressed.
Future Internet 2019, 11(6), 127; https://doi.org/10.3390/fi11060127
Received: 28 January 2019 / Revised: 14 May 2019 / Accepted: 30 May 2019 / Published: 4 June 2019
(This article belongs to the Special Issue Cloud Computing and Internet of Things)
  |  
PDF [790 KB, uploaded 4 June 2019]
  |  

Abstract

The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds. View Full-Text
Keywords: security; Internet of Things; Cloud computing security; Internet of Things; Cloud computing
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

De Donno, M.; Giaretta, A.; Dragoni, N.; Bucchiarone, A.; Mazzara, M. Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era. Future Internet 2019, 11, 127.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top