Abstract
Internet-of-Things (IoT) is applied in many contexts, Industrial IoT (IIoT) is one such example. This chapter explores the security issues and challenges in IIoT. Cloud Computing is significantly influencing the architectural and implementation factors for IoT. Due to the nature of Cloud and IoT architectures and infrastructures, it is important to consider distributed and Decentralised Computing. With the focus on security aspects and concerns in IIoT, this chapter presents a discussion on Decentralised Computing and security concerns of Decentralised Computing from a Cloud Computing and IoT perspective. The chapter introduces the concept and definitions of Cloud Computing, Decentralised Computing, and IoT. It also addresses how Decentralised Computing is an approach to implement Cloud Architecture and IoT infrastructure, and how Cloud and IoT security concerns affect the deployment of a decentralised architecture. The above security and implementation aspects of Decentralised Computing, Cloud Computing and IoT are mapped into the context of IIoT.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ahmed, M.: Ki-Ngā-Kōpuku: a decentralised, distributed security model for cloud computing. Ph.D. Thesis, Auckland University of Technology (2018)
Ahmed, M., Litchfield, A.T.: Taxonomy for identification of security issues in cloud computing environments. J. Comput. Inf. Syst. 58(1), 79–88 (2018)
Ahmed, M., Singh, N.: A framework for strategic cloud migration. In: Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence. ACM, New York (2019), pp. 160–163
Alqassem, I., Svetinovic, D.: A taxonomy of security and privacy requirements for the internet of things (IoT). In: 2014 IEEE International Conference on Industrial Engineering and Engineering Management. IEEE, Piscataway (2014), pp. 1244–1248
Arregui, D.: Mitigating byod information security risks. In: Australasian Conference on Information Systems (2016)
IEEE Standards Association: Internet of Things (IoT) Ecosystem Study. Institute of Electrical and Electronics Engineers, New York (2014)
Assunção, M.D., Calheiros, R.N., Bianchi, S., Netto, M.A., Buyya, R.: Big data computing and clouds: trends and future directions. J. Parallel Distrib. Comput. 79, 3–15 (2015)
Azza, A., Hanaa, F., Elmageed, M.A.: IoT perception layer security and privacy. Int. J. Comput. Appl. 975, 8887 (2019)
Bahga, A., Madisetti, V.K.: Blockchain platform for industrial Internet of Things. J. Softw. Eng. Appl. 9(10), 533 (2016)
Bertino, E.: Data security and privacy in the IoT. In: Proceedings of the 19th International Conference on Extending Database Technology (EDBT), vol. 2016 (2016), pp. 1–3
Burhan, M., Rehman, R.A., Khan, B., Kim, B.S.: IoT elements, layered architectures and security issues: a comprehensive survey. Sensors 18(9), 2796 (2018)
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Futur. Gener. Comput. Syst. 25(6), 599–616 (2009)
Che, J., Duan, Y., Zhang, T., Fan, J.: Study on the security models and strategies of cloud computing. Proc. Eng. 23, 586–593 (2011)
Debbabi, B.: Cube: a decentralised architecture-based framework for software self-management. Ph.D. Thesis (2014)
Endres, H., Indulska, M., Ghosh, A., Baiyere, A., Broser, S.: Industrial internet of things (IIoT) business model classification. In: Fourtieth International Conference on Information Systems (ICIS) (2019)
Garg, A., Rathi, R.: A survey on cloud computing risks and remedies. Int. J. Comput. Appl. 178(29), 35–37 (2019)
Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Näslund, M., Pourzandi, M.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1(1), 11 (2012)
Haase, B., Labrique, B.: Aucpace: Efficient verifier-based pake protocol tailored for the IIoT. In: IACR Transactions on Cryptographic Hardware and Embedded Systems (2019), pp. 1–48
Liu, Y., Tong, K.F., Qiu, X., Liu, Y., Ding, X.: Wireless mesh networks in IoT networks. In: 2017 International Workshop on Electromagnetics: Applications and Student Innovation Competition. IEEE, Piscataway (2017), pp. 183–185
Liu, W., Popovski, P., Li, Y., Vucetic, B.: Wireless networked control systems with coding-free data transmission for industrial IoT. (2019, preprint). arXiv:1907.13297
Madhu, B., Vaishnavi, K., Dushyanth, N.G., Tushar Jain, S.C.: IoT based home automation system over cloud. Int. J. Trend Sci. Res. Dev. 3(4), 966–968 (2019)
Mell, P., Grance, T., et al.: The NIST definition of cloud computing, SP 800-145 (2011)
Perwej, Y., Haq, K., Parwej, F., Mumdouh, M., Hassan, M.: The Internet of Things (IoT) and its application domains. Int. J. Comput. Appl. 182(49), 36–49 (2019)
Razzaq, M.A., Gill, S.H., Qureshi, M.A., Ullah, S.: Security issues in the Internet of Things (IoT): a comprehensive study. Int. J. Adv. Comput. Sci. Appl. 8(6), 383–388 (2017)
Santee, C.D.: An exploratory study of the approach to bring your own device (BYOD) in assuring information security, PhD Thesis, Nova Southeastern University, (2017). Available at: https://nsuworks.nova.edu/gscis_etd/1005/
International Telecommunication Union: Series Y: global information infrastructure, internet protocol aspects and next-generation networks next generation networks–frameworks and functional architecture models. International Telecommunication Union: Geneva (2012)
Sheikh, A., Munro, M., Budgen, D.: Systematic literature review (SLR) of resource scheduling and security in cloud computing. Int. J. Adv. Comput. Sci. Appl. 10(4), 35–44 (2019)
Venceslau, A., Andrade, R., Vidal, V., Nogueira, T., Pequeno, V.: IoT semantic interoperability: a systematic mapping study. In: International Conference on Enterprise Information Systems, vol. 1. SciTePress, Setúbal (2019), pp. 535–544
Wang, L., Von Laszewski, G., Younge, A., He, X., Kunze, M., Tao, J., Fu, C.: Cloud computing: a perspective study. N. Gener. Comput. 28(2), 137–146 (2010)
Wong, K.S., Kim, M.H.: Privacy protection for data-driven smart manufacturing systems. Int. J. Web Services Res. 14(3), 17–32 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Ahmed, M., Jaidka, S., Sarkar, N.I. (2020). Security in Decentralised Computing, IoT and Industrial IoT. In: Butun, I. (eds) Industrial IoT . Springer, Cham. https://doi.org/10.1007/978-3-030-42500-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-42500-5_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-42499-2
Online ISBN: 978-3-030-42500-5
eBook Packages: Computer ScienceComputer Science (R0)