Cybersecurity Challenges in IoT Cloud Systems
Keywords:
IoT cloud systems, Cybersecurity challenges, Device authentication, Data integrity, Privacy, Network security, DDoS attacksAbstract
The swift growth of the Internet of Things (IoT) has resulted in the integration of IoT devices with cloud computing, creating IoT cloud systems. Although this merger provides improved data storage, real-time analytics, and scalability, it also brings about significant cybersecurity challenges. This paper investigates the specific security vulnerabilities present in IoT cloud systems, concentrating on issues related to device authentication, data integrity, privacy, and network security. Additionally, it analyzes how the limited resources of IoT devices intensify these vulnerabilities, making them more prone to attacks such as Distributed Denial of Service (DDoS), data breaches, and malware attacks. By reviewing existing security protocols and new technologies, this research emphasizes the necessity for stronger security frameworks to safeguard IoT cloud ecosystems. Suggested approaches, including encryption methods, sophisticated authentication strategies, and AI-driven threat detection, are evaluated for their efficacy in reducing risks and ensuring secure data transmission. This study offers a thorough overview of the cybersecurity environment in IoT cloud systems, with the goal of informing future research and policy-making in this vital field.
References
Siddhartha, V., Gaba, G. S., & Kansal, L. (2020). A lightweight authentication protocol using implicit certificates for securing IoT systems. Procedia computer science, 167, 85–96. https://doi.org/10.1016/j.procs.2020.03.185
Alluhaidan, A., & Prabu, P. (2023). End-to-end encryption in resource-constrained IoT device. IEEE access, 99(1). http://dx.doi.org/10.1109/ACCESS.2023.3292829
Li, D., Peng, W., Deng, W., & Gai, F. (2018). A blockchain-based authentication and security mechanism for IoT. http://dx.doi.org/10.1109/ICCCN.2018.8487449
Goad, D., Collins, A., & Gal, U. (2020). Privacy and the internet of things – an experiment in discrete choice. Information & management, 58, 103292. http://dx.doi.org/10.1109/ACCESS.2023.3292829
Dwork, C. (2006). Differential privacy. Proceedings of the 33rd international conference on automata, languages and programming - volume part II (pp. 1–12). Berlin, Heidelberg: Springer-Verlag. https://doi.org/10.1007/11787006_1
Husnoo, M. A., Anwar, A., Chakrabortty, R., Doss, R., & Ryan, M. (2021). Differential privacy for IoT-enabled critical infrastructure: A comprehensive survey. IEEE access, 99(1), 1. https://doi.org/10.1007/11787006_1
Mohapatra, H., Mohanta, B. K., Nikoo, M. R., Daneshmand, M., & Gandomi, A. H. (2023). MCDM-based routing for iot-enabled smart water distribution network. IEEE internet of things journal, 10(5), 4271–4280. https://doi.org/10.1109/JIOT.2022.3216402
Ren, W., Tong, X., Du, J., Wang, N., Li, S., Min, G., & Zhao, Z. (2021). Privacy enhancing techniques in the internet of things using data anonymisation. Information systems frontiers, 1–12. https://doi.org/10.1007/s10796-021-10116-w
Abomhara, M., Køien, G., & Alghamdi, M. (2021). Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks.
Gyamfi, E., & Jurcut, A. (2022). Intrusion detection in internet of things systems: A review on design approaches leveraging multi-access edge computing, machine learning, and datasets. Sensors, 22(10). https://doi.org/10.3390/s22103744
Alrajhi, A. (2020). A survey of artificial intelligence techniques for cybersecurity improvement. International journal of cyber-security and digital forensics, 9, 34–41. http://dx.doi.org/10.17781/P002650
Saxena, S., Bhushan, B., & Ahad, M. A. (2021). Blockchain based solutions to secure IoT: Background, integration trends and a way forward. Journal of network and computer applications, 181, 103050. https://doi.org/10.1016/j.jnca.2021.103050