IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v11y2019i6p127-d237171.html
   My bibliography  Save this article

Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era

Author

Listed:
  • Michele De Donno

    (DTU Compute, Technical University of Denmark, 2800 Kongens Lyngby, Denmark)

  • Alberto Giaretta

    (Centre for Applied Autonomous Sensor Systems Orebro University, 701 82 Orebro, Sweden)

  • Nicola Dragoni

    (DTU Compute, Technical University of Denmark, 2800 Kongens Lyngby, Denmark
    Centre for Applied Autonomous Sensor Systems Orebro University, 701 82 Orebro, Sweden)

  • Antonio Bucchiarone

    (Fondazione Bruno Kessler, Via Sommarive 18, 38123 Trento, Italy)

  • Manuel Mazzara

    (Institute of Software Development and Engineering, Innopolis University, Universitetskaya St, 1, 420500 Innopolis, Russian Federation)

Abstract

The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds.

Suggested Citation

  • Michele De Donno & Alberto Giaretta & Nicola Dragoni & Antonio Bucchiarone & Manuel Mazzara, 2019. "Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era," Future Internet, MDPI, vol. 11(6), pages 1-30, June.
  • Handle: RePEc:gam:jftint:v:11:y:2019:i:6:p:127-:d:237171
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/11/6/127/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/11/6/127/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Shashank Gupta & B. B. Gupta, 2017. "Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 8(1), pages 512-530, January.
    2. Massimo Ficco & Massimiliano Rak, 2016. "Economic Denial of Sustainability Mitigation in Cloud Computing," Lecture Notes in Information Systems and Organization, in: Cecilia Rossignoli & Mauro Gatti & Rocco Agrifoglio (ed.), Organizational Innovation and Change, edition 1, pages 229-238, Springer.
    3. Sanjay Ahuja & Deepa Komathukattil, 2012. "A Survey of the State of Cloud Security," Network and Communication Technologies, Canadian Center of Science and Education, vol. 1(2), pages 1-66, November.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Shaukat Ali & Naveed Islam & Azhar Rauf & Ikram Ud Din & Mohsen Guizani & Joel J. P. C. Rodrigues, 2018. "Privacy and Security Issues in Online Social Networks," Future Internet, MDPI, vol. 10(12), pages 1-12, November.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:11:y:2019:i:6:p:127-:d:237171. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.