IoT Cloud Security Review
- 3 May 2021
- journal article
- review article
- Published by Association for Computing Machinery (ACM) in ACM Computing Surveys
- Vol. 54 (4), 1-36
- https://doi.org/10.1145/3447625
Abstract
Recent years have seen the rapid development and integration of the Internet of Things (IoT) and cloud computing. The market is providing various consumer-oriented smart IoT devices; the mainstream cloud service providers are building their software stacks to support IoT services. With this emerging trend even growing, the security of such smart IoT cloud systems has drawn much research attention in recent years. To better understand the emerging consumer-oriented smart IoT cloud systems for practical engineers and new researchers, this article presents a review of the most recent research efforts on existing, real, already deployed consumer-oriented IoT cloud applications in the past five years using typical case studies. Specifically, we first present a general model for the IoT cloud ecosystem. Then, using the model, we review and summarize recent, representative research works on emerging smart IoT cloud system security using 10 detailed case studies, with the aim that the case studies together provide insights into the insecurity of current emerging IoT cloud systems. We further present a systematic approach to conduct a security analysis for IoT cloud systems. Based on the proposed security analysis approach, we review and suggest potential security risk mitigation methods to protect IoT cloud systems. We also discuss future research challenges for the IoT cloud security area.Keywords
Funding Information
- National Natural Science Foundation of China (61872243)
This publication has 94 references indexed in Scilit:
- Twenty Security Considerations for Cloud-Supported Internet of ThingsIEEE Internet of Things Journal, 2015
- Secure Cloud Storage Meets with Secure Network CodingInternational Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2015
- Principles for Engineering IoT Cloud SystemsIEEE Cloud Computing, 2015
- Security for the Internet of Things: A Survey of Existing Protocols and Open Research IssuesIEEE Communications Surveys & Tutorials, 2015
- Security, privacy and trust in Internet of Things: The road aheadComputer Networks, 2015
- Cloud Computing Security: A SurveyComputers, 2014
- New approaches to security and availability for cloud dataCommunications of the ACM, 2013
- Computer security and the modern homeCommunications of the ACM, 2013
- The Poly1305-AES Message-Authentication CodeLecture Notes in Computer Science, 2005
- The Elliptic Curve Digital Signature Algorithm (ECDSA)International Journal of Information Security, 2001