Cloud of Things (CoTs): Security Threats and Attacks |
Almtrafi, Sara Mutlaq
(College of Computers and Information Technology Taif University)
Alkhudadi, Bdour Abduallatif (College of Computers and Information Technology Taif University) Alsuwat, Hatim (Department of Computer Science College of Computer and Information Systems Umm Al Qura University) Alsuwat, Emad (College of Computers and Information Technology Taif University) |
1 | Atiewi, S., Al-Rahayfeh, A., Almiani, M., Yussof, S., Alfandi, O., Abugabah, A., & Jararweh, Y. (2020). Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography. IEEE Access, 8, 113498-113511. DOI |
2 | Zhu, H., Yuan, Y., Chen, Y., Zha, Y., Xi, W., Jia, B., & Xin, Y. (2019). A secure and efficient data integrity verification scheme for cloud-IoT based on short signature. IEEE Access, 7, 90036-90044. DOI |
3 | Yang, H., & Kim, Y. (2019). Design and implementation of high-availability architecture for IoT-cloud services. Sensors, 19(15), 3276. DOI |
4 | Yeh, T., & Tu, Y. (2018, December). Enhancing data availability through automatic replication in the hadoop cloud system. In 2018 9th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP) (pp. 86-93). IEEE. |
5 | Gurulakshmi, K., & Nesarani, A. (2018, May). Analysis of IoT Bots against DDOS attack using Machine learning algorithm. In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 1052-1057). IEEE. |
6 | Ravi, N., & Shalinie, S. M. (2020). Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet of Things Journal, 7(4), 3559-3570 DOI |
7 | Alsaidi, A., & Kausar, F. (2018, September). Security attacks and countermeasures on cloud assisted IoT applications. In 2018 IEEE International Conference on Smart Cloud (SmartCloud) (pp. 213-217). IEEE. |
8 | Wang, X., Ning, Z., Zhou, M., Hu, X., Wang, L., Hu, B. ... & Guo, Y. (2018). A privacy-preserving message forwarding framework for opportunistic cloud of things. IEEE Internet of Things Journal, 5(6), 5281-5295. DOI |
9 | Atlam, H. F., Alenezi, A., Alharthi, A., Walters, R. J., & Wills, G. B. (2017, June). Integration of cloud computing with internet of things: challenges and open issues. In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 670-675). IEEE. |
10 | Paul, A., & Jeyaraj, R. (2019). Internet of Things: A primer. Human Behavior and Emerging Technologies, 1(1), 37-47. DOI |
11 | Farahzadi, A., Shams, P., Rezazadeh, J., & Farahbakhsh, R. (2018). Middleware technologies for cloud of things: a survey. Digital Communications and Networks, 4(3), 176-188 DOI |
12 | Tadapaneni, N. R. (2018). Cloud Computing: Opportunities and Challenges. Available at SSRN 3563342. |
13 | Bhawiyuga, A., Kartikasari, D. P., Amron, K., Pratama, O. B., & Habibi, M. W. (2019). Architectural design of IoT-cloud computing integration platform. Telkomnika, 17(3), 1399-1408. DOI |
14 | Pacheco, L., Alchieri, E., & Solis, P. (2017, April). Architecture for Privacy in Cloud of Things. In ICEIS (2) (pp. 487-494) |
15 | Nguyen, T. G., Phan, T. V., Nguyen, B. T., So-In, C., Baig, Z. A., & Sanguanpong, S. (2019). Search: A collaborative and intelligent nids architecture for sdn-based cloud iot networks. IEEE access, 7, 107678-107694 DOI |
16 | Li, W., Santos, I., Delicato, F. C., Pires, P. F., Pirmez, L., Wei, W., & Khan, S. (2017). System modelling and performance evaluation of a three-tier Cloud of Things. Future Generation Computer Systems, 70, 104-125. DOI |
17 | Sahmim, S., & Gharsellaoui, H. (2017). Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a review. Procedia computer science, 112, 1516-1522. DOI |
18 | Choudhury, T., Gupta, A., Pradhan, S., Kumar, P., & Rathore, Y. S. (2017, October). Privacy and security of cloud-based internet of things (IoT). In 2017 3rd International Conference on Computational Intelligence and Networks (CINE) (pp. 40-45). IEEE. |
19 | Li, F., Zhang, K., Chen, S., Yang, H., & Wang, B. (2020, November). Research on Key Technologies of Active Defense for Distribution Internet of Things Service Security. In 2020 IEEE International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA) (Vol. 1, pp. 676-679). IEEE. |
20 | Song, Y., Liu, T., Wei, T., Wang, X., Tao, Z., & Chen, M. (2020). Fda3: Federated defense against adversarial attacks for cloud-based iiot applications. IEEE Transactions on Industrial Informatics. |
21 | Mohammadnia, H., & Slimane, S. B. (2020, April). IoTNETZ: Practical Spoofing Attack Mitigation Approach in SDWN Network. In 2020 Seventh International Conference on Software Defined Systems (SDS) (pp. 5-13). IEEE |
22 | Wu, B., Wang, C., & Yao, H. (2020). Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things. PloS one, 15(4), e0230722. DOI |
23 | Tian, Y, Kaleemullah, M. M., Rodhaan, M. A., Song, B., Al-Dhelaan, A., & Ma, T. (2019). A privacy preserving location service for cloud-of-things system. Journal of Parallel and Distributed Computing, 123, 215-222. DOI |
24 | Al-Asli, M., Elrabaa, M. E., & Abu-Amara, M. (2018). FPGA-based symmetric re-encryption scheme to secure data processing for cloud-integrated internet of things. IEEE Internet of Things Journal, 6(1), 446-457. DOI |
25 | Liu, S., Yu, J., Xiao, Y., Wan, Z., Wang, S., & Yan, B. (2020). BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT. IEEE Internet of Things Journal, 7(9), 7851-7867. DOI |
26 | Xiong, S., Ni, Q., Wang, L., & Wang, Q. (2020). SEM-ACSIT: secure and efficient multiauthority access control for IoT cloud storage. IEEE Internet of Things Journal, 7(4), 2914-2927 DOI |
27 | Alabdulatif, A., Khalil, I., & Ahmed, S. H. (2018). Integration of Internet of Things (IoT) and Cloud Computing: Privacy Concerns and Possible Solutions. Integration, 2017. |
28 | Abualese, H., Al-Rousan, T., & Al-Shargabi, B. (2019). A New Trust Framework for E-Government in Cloud of Things. International Journal of Electronics and Telecommunications, 65. |
29 | He, J., Zhang, Z., Li, M., Zhu, L., & Hu, J. (2018). Provable data integrity of cloud storage service with enhanced security in the internet of things. IEEE Access, 7, 6226-6239. DOI |
30 | Sohal, A. S., Sandhu, R., Sood, S. K., & Chang, V. (2018). A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Computers & Security, 74, 340-354. DOI |
31 | da Silva Martins, W., Estrella, J. C., Bruschi, S. M., de Azevedo, L. J. D. M., & Andreazi, G. T. (2020, October). Performance evaluation for signing JSON tokens in access control for the cloud of things. In 2020 IEEE Cloud Summit (pp. 72-78). IEEE. |
32 | Riyaz Belgaum, M., Soomro, S., Alansari, Z., Alam, M., Musa, S., & Suud, M. M. (2018). Challenges: Bridge between Cloud and IoT. arXiv e-prints, arXiv-1803. |