Integration of Cloud Computing with Internet of Things. Группа авторов

Чтение книги онлайн.

Читать онлайн книгу Integration of Cloud Computing with Internet of Things - Группа авторов страница 19

Integration of Cloud Computing with Internet of Things - Группа авторов

Скачать книгу

data to other apps and servers on a daily basis.

      The second problem is the lack of consistency with the quality of search data. Seeing that every quest made on some of the IoT related devices and sites has been going on which increases concern among interviewees that their quest habits are not explicitly documented and are accessible. “There is a great deal of interest in the privacy literature around preserving the confidentiality of personal details in public datasets Geo-location is sensitive knowledge regarding privacy and its disclosure will seriously harm consumer privacy.”

      2.4.2 Develop and Sustain Ethicality

      Respondents in our research described two factors relevant to the nature of ethics in the IoT world—legal principles and fair usage. Existing literature has found rational usage and ethics to be significant, in particular because of the pervasive existence of technology.

Schematic illustration of the types of data.

      Figure 2.1 Types of data.

      2.4.3 Maximize the Power of IoT Access

      Often the main objective of ensuring data confidentiality is to achieve this essential objective. Organizations may have a wealth of confidential information, but the data are not widely available to anyone. As regards IoT, there are further attack vector and hence better probability of attack, together with a large number of linked computers. Unauthorized exposure could exploit security vulnerabilities that could lead to physical security risks [28] (Figure 2.2).

      2.4.4 Understanding Importance of Firewalls

      The IoT is a frightening place. Criminals on the IoT have the potential to put out of sight behind their computers, or even other people’s computers, while they attempt to intervene in your computer to thieve personal information or to use it for their own purposes. But how you can prevent it or safeguard? The answer is that you can protect yourself with a firewall.

Schematic illustration of Internet of Things and its components.

      Figure 2.2 IoT and its components.

      As values are produced, they are not automatically grouped into well-integrated classes with a good comprehension of which values are linked to the others and why. Within this analysis, the value-focused mindset methodology is used to produce IoT protection principles, goals and behavior of IT practitioners who rely on optimizing IoT protection (Figure 2.3).

Schematic illustration of Internet of Things access control that are user, device, back end system, and network control.

      Figure 2.3 IoT access control.

Schematic illustration of the concept of firewall.

      Figure 2.4 Concept of firewall.

      Includes these steps:

       Developing a value list of consumers, involving asking the people concerned what they value for IoT safety?

       Management of priorities to identify ways to accomplish end-of-life (fundamental) objectives;

       Safety mechanisms to be chosen for the firewall to ensure better protection as electronic transactions are ongoing.

      Security issues associated with IoT are various. Security is the only such problem. To order to ensure the security of user knowledge from IoT exposure, the Internet of Things requires special requirements to order to have a specific identity for virtually every physical or virtual person or device, which will autonomously communicate with the Web or related networks. The table below illustrates that all privacy can be impaired.

Schematic illustration of privacy in IoT.

      Figure 2.5 Privacy in IoT.

      An IoT security plan requires a holistic strategy that includes IT infrastructure, operational commands, cloud and consumer technology that function in tandem to ensure security. IoT-based threats have far too many implications to ignore. Hackers may now endanger human security and might even trigger confrontations.

      Internet of Things connectivity provides versatility for remote control of devices

      And in some situations, enabling the collection of data from physical sensors. There has been a huge rise in the Internet of Things, with a growing amount of physical devices connected with each other over the network. The environment created by IoT where different devices are connected through different software and operating systems, make them more vulnerable to attacks. Most IoT devices have no protection features, and even those that are there, are mostly rudimentary. Hence it is easy to attack them. IoT devices may become points of entry into smart homes and organizations Figure 2.5.

      2.6.1 Challenge of Data Management

      Organizations use the collected data for evaluating, preserving and enhancing operating performance. The pattern of rapid processing and use of data has contributed to a rise in data-driven business practices. Saving and sharing the collected data, however, can be a big concern for business leaders. With the issue of data privacy, businesses need to be extremely careful.

Скачать книгу