A Proposed Lightweight Cloud Security Framework to Secure Communications Between Internet of Things Devices

  • Islam A. T. F. Taj-Eddin
  • M. Samir Abou El-Seoud
  • Hosam Elsofany
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 716)


Cloud services can be categorized into Infrastructure as a Service (IaaS), the Platform as a Service (PaaS) and the Software as a Service (SaaS). In (Iaas), the whole IT infrastructure can be delivered as a service. In (Paas), a virtual platform over the internet gives users the ability to develop and deploy applications. In (SaaS), it provides accessing an application through the internet on demand. In the (SaaS) layer, a single instance on the cloud for multiple users could be provided. Google Apps, one of the most powerful (SaaS) that is used by many institutes to provide a variety of Web-based applications for business, education, and government. Security in Cloud computing is an important and critical problem. Cloud service provider and the cloud service consumer should make sure that the cloud is safe enough from all the external threats so that the customer does not face any problem such as loss of data or data theft. Internets of Things (IoT) are small IP enabled devices that can cooperate to perform specific functions for various set of applications. This new emerging technology is strongly involved in applications that have direct impact on human welfare, such as business, education and government. Securing IoT device’s communications are becoming a must. In this paper a lightweight technique for secure and authentic communication between IoT devices. That lightweight technique is based on framework of ideas from virtual server, network management and cloud services.


Cloud computing Data security Cloud issues Data issues  Security issues IoT security Network management Light weight protocols  Virtual server 


  1. 1.
    Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013). Elsevier Science, Amsterdam, The Netherlands. ISSN: 0167-739XCrossRefGoogle Scholar
  2. 2.
  3. 3.
    Suciu, G., Suciu, V., Martin, A.: Data, Internet of Things and cloud convergence—an architecture for secure e-health applications. J. Med. Syst. 39(11), 141 (2015)CrossRefGoogle Scholar
  4. 4.
    Hassan, M.M., Song, B.,Huh E.N.: A framework of sensor cloud integration opportunities and challenges. In: Proceedings of International Conference Ubiquitous Information Management Communication, pp. 618–626 (2009)Google Scholar
  5. 5.
    Fox, G.C., Kamburugamuve, S., Hartman, R.D.: Architecture and measured characteristics of a cloud based internet of things. In: International Conference on IEEE Collaboration Technologies and Systems (CTS), pp. 6–12 (2012)Google Scholar
  6. 6.
    Jara, A.J., Genoud, D., Bocchi, Y.: Sensors data fusion for smart cities with KNIME - a real experience in the Smart Santander Test bed. In: I.E. World Forum on Internet of Things (WF-IoT), pp. 173–174 (2014)Google Scholar
  7. 7.
    Kim, B., Jung, C.: Design and implementation of cloud based realtime temperature and humidity monitoring system of honey bee colony. J. Apiculture 30(4), 263–267 (2015)CrossRefGoogle Scholar
  8. 8.
    Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over LowPower Wireless Personal Area Networks (6LoWPANs): Overview, assumptions, problem statement, and goals. Internet Engineering Task Force (IETF), Fremont, CA, USA, RFC4919, vol. 10 (2007)Google Scholar
  9. 9.
    Hasan, M., Hossain, E., Niyato, D.: Random access for machine-to-machine communication in LTE-Advanced networks: Issues and approaches. IEEE Commun. Mag. 51(6), 86–93 (2013)CrossRefGoogle Scholar
  10. 10.
    Clemm, A.: Network Management Fundamentals (2007). ISBN-10: 1587201372, ISBN-13: 978-1587201370Google Scholar
  11. 11.
    Stamp, M.: Information Security: Principles and Practice, 2nd edn. Wiley, San Jose (2011). CrossRefGoogle Scholar
  12. 12.
    Motawie, R., El-Khouly, M.M., El-Seoud, M.S.A.: Security Problems in Cloud Computing (2016).
  13. 13.
    Leandro, M.A.P., Nascimento, T.J., dos Santos, D.R., Westphall, C.M., Westphall, C.B.: Multitenancy authorization system with federated identity for cloud-based environments using shibboleth. In: Proceedings of the Eleventh International Conference on Networks, pp. 88–93 (2012)Google Scholar
  14. 14.
    El-Sofany, H.F., Al Tayeb, A., Alghatani, K., El-Seoud, S.A.: The Impact of cloud computing technologies in e-learning. Int. J. Emerg. Technol. Learn. 8(1), 37–43 (2013). ICL2012Google Scholar
  15. 15.
    El-Seoud, M.S., El-Sofany, H.F., Taj-Eddin, I.A.T.F., Nosseir, A.F., El-Khouly, M.M.: Implementation of web-based education in Egypt through cloud computing technologies and its effectbon higher education. High. Educ. Stud. 3(3), 62 (2013)Google Scholar
  16. 16.
    El-Seoud, M.S.A., Taj-Eddin, I.A.T.F.: Developing an android mobile bluetooth chat messenger as an interactive and collaborative learning aid. In: Auer M., Guralnick D., Uhomoibhi J. (eds) Interactive Collaborative Learning, ICL 2016. Intelligent Systems and Computing, vol 545, pp. 3–15. Springer, Cham (2016).
  17. 17.
    El-Seoud, M.S.A., Taj-Eddin, I.A.T.F.: Beyond android: an essential integration for better utilization In: International Conference on Interactive Mobile Communication Technologies and Learning (IMCL2016), pp. 98–102. IEEE (2016).
  18. 18.
    El-Seoud, M.S.A., El-Sofany, H.F., Taj-Eddin, I.A.T.F.: Mobile applications and semantic-web a case study on automated course management. Int. J. Interact. Mob. Technol. (iJIM) 10(3), 42–53 (2016). International Association of Online Engineering. CrossRefGoogle Scholar
  19. 19.
    El-Seoud, M.S.A., El-Khouly, M., Taj-Eddin, I.A.T.F.: Strategies to enhance learner’s motivation in e-learning environment. In: Proceedings of 18th International Conference on Interactive Collaborative Learning (ICL2015), pp. 944–949. IEEE (2015). ISBN: 978-1-4799-8706-1/15 ©2015
  20. 20.
    El-Seoud, M.S.A., El-Sofany, H.F., Karkar, A., Dandashi, A., Taj-Eddin, I.A.T.F., AL-Ja’am, J.M.: Semantic-web automated course management and evaluation system using mobile applications. In: Proceedings of 18th International Conference on Interactive Collaborative Learning (ICL2015), pp. 271–282. IEEE (2015). ISBN: 978-1-4799-8706-1/15 ©2015
  21. 21.
    NIST: National Institute of Standards and Technology - Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director. NIST Cloud Computing Standards Roadmap Working Group, NIST Cloud Computing Program, Information Technology Laboratory, NIST Special Publication 500-291, Version 2, July 2013.
  22. 22.
    OrBytes Website Admin: Cloud Computing (2009). Accessed 8 Nov 2010
  23. 23.
    Waxer, B.: The Benefits of Cloud Computing (2009). Accessed 21 Dec 2010
  24. 24.
    Dans, E.: Benefits and Disadvantages of Cloud Computing (2011). Accessed 14 Mar 2011
  25. 25.
    Kynetix Technology group. Cloud Computing Strategy Guide (2009). Accessed 2 Dec 2010

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Islam A. T. F. Taj-Eddin
    • 1
  • M. Samir Abou El-Seoud
    • 2
  • Hosam Elsofany
    • 3
    • 4
  1. 1.Faculty of Computers and InformationAssiut UniversityAssiutEgypt
  2. 2.The British University in Egypt (BUE)CairoEgypt
  3. 3.Department of Computer Science, College of Sciences and ArtsKing Khalid UniversityAbhaKingdom of Saudi Arabia
  4. 4.Department of Computer ScienceCairo Higher InstituteCairoEgypt

Personalised recommendations