IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Applying Security to a Big Stream Cloud Architecture for the Internet of Things

Applying Security to a Big Stream Cloud Architecture for the Internet of Things
View Sample PDF
Author(s): Laura Belli (University of Parma, Parma, Italy), Simone Cirani (University of Parma, Parma, Italy), Luca Davoli (University of Parma, Parma, Italy), Gianluigi Ferrari (University of Parma, Parma, Italy), Lorenzo Melegari (University of Parma, Parma, Italy)and Marco Picone (University of Parma, Parma, Italy)
Copyright: 2016
Volume: 7
Issue: 1
Pages: 22
Source title: International Journal of Distributed Systems and Technologies (IJDST)
Editor(s)-in-Chief: Nik Bessis (Edge Hill University, UK)
DOI: 10.4018/IJDST.2016010103

Purchase

View Applying Security to a Big Stream Cloud Architecture for the Internet of Things on the publisher's website for pricing and purchasing information.

Abstract

The Internet of Things (IoT) is expected to interconnect billions (around 50 by 2020) of heterogeneous sensor/actuator-equipped devices denoted as “Smart Objects” (SOs), characterized by constrained resources in terms of memory, processing, and communication reliability. Several IoT applications have real-time and low-latency requirements and must rely on architectures specifically designed to manage gigantic streams of information (in terms of number of data sources and transmission data rate). We refer to “Big Stream” as the paradigm which best fits the selected IoT scenario, in contrast to the traditional “Big Data” concept, which does not consider real-time constraints. Moreover, there are many security concerns related to IoT devices and to the Cloud. In this paper, we analyze security aspects in a novel Cloud architecture for Big Stream applications, which efficiently handles Big Stream data through a Graph-based platform and delivers processed data to consumers, with low latency. The authors detail each module defined in the system architecture, describing all refinements required to make the platform able to secure large data streams. An experimentation is also conducted in order to evaluate the performance of the proposed architecture when integrating security mechanisms.

Related Content

Honglong Xu, Zhonghao Liang, Kaide Huang, Guoshun Huang, Yan He. © 2024. 17 pages.
Sherin Eliyas, P. Ranjana. © 2024. 10 pages.
Shuang Li, Xiaoguo Yao. © 2024. 16 pages.
Jialan Sun. © 2024. 21 pages.
Mei Gong, Bingli Mo. © 2024. 15 pages.
Qian He, Ke Wang. © 2024. 19 pages.
Sunil Kumar, Rashmi Mishra, Tanvi Jain, Achyut Shankar. © 2024. 12 pages.
Body Bottom