Encryption as a service for IoT: opportunities, challenges and solutions

A Javadpour, F Ja'fari, T Taleb, Y Zhao… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The widespread adoption of Internet of Things (IoT) technology has introduced new
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …

Performance analysis of two cloud-based iot implementations: Empirical study

M Aleisa, AA Hussein, F Alsubaei… - 2020 7th IEEE …, 2020 - ieeexplore.ieee.org
The emergence of the Internet of things (IoT) has generated demand for computation
performed at the 'edge'of the network. With companies being increasingly challenged to …

Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives

MR Alagheband, A Mashatan - The Journal of Supercomputing, 2022 - Springer
Abstract The Internet of Things (IoT) is increasingly becoming widespread in different areas
such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse …

CEaaS: Constrained encryption as a service in fog-enabled IoT

PK Deb, A Mukherjee, S Misra - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
In this work, we present a solution toward facilitating dynamic encryption schemes—
Constrained Encryption as a Service (CEaaS)—in fog-enabled IoT environments. CEaaS is …

Securing Cloud-Based Internet of Things: Challenges and Mitigations

N Singh, R Buyya, H Kim - arXiv preprint arXiv:2402.00356, 2024 - arxiv.org
The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a
paradigm shift in the digital landscape. However, these technological strides have also …

Twenty security considerations for cloud-supported Internet of Things

J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …

Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …

Fortifying the IoT landscape: Strategies to counter security risks in connected systems

E James, F Rabbi - Tensorgate Journal of Sustainable …, 2023 - research.tensorgate.org
The proliferation of Internet of Things (IoT) devices in our connected world has brought
unparalleled convenience and efficiency to various sectors, ranging from smart homes to …

A panorama of cloud platforms for iot applications across industries

S Yangui - Sensors, 2020 - mdpi.com
Internet of Things (IoT) applications can play a critical role in business and industry.
Industrial IoT (IIoT) refers to the use of IoT technologies in manufacturing. Enabling IIoT …

Security challenges and strategies for the IoT in cloud computing

I Mohiuddin, A Almogren - 2020 11th international conference …, 2020 - ieeexplore.ieee.org
The Internet of Things is progressively turning into a pervasive computing service, needing
enormous volumes of data storage and processing. However, due to the distinctive …