Skip to main content

Security in Decentralised Computing, IoT and Industrial IoT

  • Chapter
  • First Online:

Abstract

Internet-of-Things (IoT) is applied in many contexts, Industrial IoT (IIoT) is one such example. This chapter explores the security issues and challenges in IIoT. Cloud Computing is significantly influencing the architectural and implementation factors for IoT. Due to the nature of Cloud and IoT architectures and infrastructures, it is important to consider distributed and Decentralised Computing. With the focus on security aspects and concerns in IIoT, this chapter presents a discussion on Decentralised Computing and security concerns of Decentralised Computing from a Cloud Computing and IoT perspective. The chapter introduces the concept and definitions of Cloud Computing, Decentralised Computing, and IoT. It also addresses how Decentralised Computing is an approach to implement Cloud Architecture and IoT infrastructure, and how Cloud and IoT security concerns affect the deployment of a decentralised architecture. The above security and implementation aspects of Decentralised Computing, Cloud Computing and IoT are mapped into the context of IIoT.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ahmed, M.: Ki-Ngā-Kōpuku: a decentralised, distributed security model for cloud computing. Ph.D. Thesis, Auckland University of Technology (2018)

    Google Scholar 

  2. Ahmed, M., Litchfield, A.T.: Taxonomy for identification of security issues in cloud computing environments. J. Comput. Inf. Syst. 58(1), 79–88 (2018)

    Google Scholar 

  3. Ahmed, M., Singh, N.: A framework for strategic cloud migration. In: Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence. ACM, New York (2019), pp. 160–163

    Google Scholar 

  4. Alqassem, I., Svetinovic, D.: A taxonomy of security and privacy requirements for the internet of things (IoT). In: 2014 IEEE International Conference on Industrial Engineering and Engineering Management. IEEE, Piscataway (2014), pp. 1244–1248

    Google Scholar 

  5. Arregui, D.: Mitigating byod information security risks. In: Australasian Conference on Information Systems (2016)

    Google Scholar 

  6. IEEE Standards Association: Internet of Things (IoT) Ecosystem Study. Institute of Electrical and Electronics Engineers, New York (2014)

    Google Scholar 

  7. Assunção, M.D., Calheiros, R.N., Bianchi, S., Netto, M.A., Buyya, R.: Big data computing and clouds: trends and future directions. J. Parallel Distrib. Comput. 79, 3–15 (2015)

    Article  Google Scholar 

  8. Azza, A., Hanaa, F., Elmageed, M.A.: IoT perception layer security and privacy. Int. J. Comput. Appl. 975, 8887 (2019)

    Google Scholar 

  9. Bahga, A., Madisetti, V.K.: Blockchain platform for industrial Internet of Things. J. Softw. Eng. Appl. 9(10), 533 (2016)

    Article  Google Scholar 

  10. Bertino, E.: Data security and privacy in the IoT. In: Proceedings of the 19th International Conference on Extending Database Technology (EDBT), vol. 2016 (2016), pp. 1–3

    Google Scholar 

  11. Burhan, M., Rehman, R.A., Khan, B., Kim, B.S.: IoT elements, layered architectures and security issues: a comprehensive survey. Sensors 18(9), 2796 (2018)

    Article  Google Scholar 

  12. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Futur. Gener. Comput. Syst. 25(6), 599–616 (2009)

    Article  Google Scholar 

  13. Che, J., Duan, Y., Zhang, T., Fan, J.: Study on the security models and strategies of cloud computing. Proc. Eng. 23, 586–593 (2011)

    Article  Google Scholar 

  14. Debbabi, B.: Cube: a decentralised architecture-based framework for software self-management. Ph.D. Thesis (2014)

    Google Scholar 

  15. Endres, H., Indulska, M., Ghosh, A., Baiyere, A., Broser, S.: Industrial internet of things (IIoT) business model classification. In: Fourtieth International Conference on Information Systems (ICIS) (2019)

    Google Scholar 

  16. Garg, A., Rathi, R.: A survey on cloud computing risks and remedies. Int. J. Comput. Appl. 178(29), 35–37 (2019)

    Google Scholar 

  17. Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Näslund, M., Pourzandi, M.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1(1), 11 (2012)

    Article  Google Scholar 

  18. Haase, B., Labrique, B.: Aucpace: Efficient verifier-based pake protocol tailored for the IIoT. In: IACR Transactions on Cryptographic Hardware and Embedded Systems (2019), pp. 1–48

    Google Scholar 

  19. Liu, Y., Tong, K.F., Qiu, X., Liu, Y., Ding, X.: Wireless mesh networks in IoT networks. In: 2017 International Workshop on Electromagnetics: Applications and Student Innovation Competition. IEEE, Piscataway (2017), pp. 183–185

    Google Scholar 

  20. Liu, W., Popovski, P., Li, Y., Vucetic, B.: Wireless networked control systems with coding-free data transmission for industrial IoT. (2019, preprint). arXiv:1907.13297

    Google Scholar 

  21. Madhu, B., Vaishnavi, K., Dushyanth, N.G., Tushar Jain, S.C.: IoT based home automation system over cloud. Int. J. Trend Sci. Res. Dev. 3(4), 966–968 (2019)

    Google Scholar 

  22. Mell, P., Grance, T., et al.: The NIST definition of cloud computing, SP 800-145 (2011)

    Google Scholar 

  23. Perwej, Y., Haq, K., Parwej, F., Mumdouh, M., Hassan, M.: The Internet of Things (IoT) and its application domains. Int. J. Comput. Appl. 182(49), 36–49 (2019)

    Google Scholar 

  24. Razzaq, M.A., Gill, S.H., Qureshi, M.A., Ullah, S.: Security issues in the Internet of Things (IoT): a comprehensive study. Int. J. Adv. Comput. Sci. Appl. 8(6), 383–388 (2017)

    Google Scholar 

  25. Santee, C.D.: An exploratory study of the approach to bring your own device (BYOD) in assuring information security, PhD Thesis, Nova Southeastern University, (2017). Available at: https://nsuworks.nova.edu/gscis_etd/1005/

  26. International Telecommunication Union: Series Y: global information infrastructure, internet protocol aspects and next-generation networks next generation networks–frameworks and functional architecture models. International Telecommunication Union: Geneva (2012)

    Google Scholar 

  27. Sheikh, A., Munro, M., Budgen, D.: Systematic literature review (SLR) of resource scheduling and security in cloud computing. Int. J. Adv. Comput. Sci. Appl. 10(4), 35–44 (2019)

    Google Scholar 

  28. Venceslau, A., Andrade, R., Vidal, V., Nogueira, T., Pequeno, V.: IoT semantic interoperability: a systematic mapping study. In: International Conference on Enterprise Information Systems, vol. 1. SciTePress, Setúbal (2019), pp. 535–544

    Google Scholar 

  29. Wang, L., Von Laszewski, G., Younge, A., He, X., Kunze, M., Tao, J., Fu, C.: Cloud computing: a perspective study. N. Gener. Comput. 28(2), 137–146 (2010)

    Article  Google Scholar 

  30. Wong, K.S., Kim, M.H.: Privacy protection for data-driven smart manufacturing systems. Int. J. Web Services Res. 14(3), 17–32 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Monjur Ahmed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ahmed, M., Jaidka, S., Sarkar, N.I. (2020). Security in Decentralised Computing, IoT and Industrial IoT. In: Butun, I. (eds) Industrial IoT . Springer, Cham. https://doi.org/10.1007/978-3-030-42500-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-42500-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-42499-2

  • Online ISBN: 978-3-030-42500-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics