Anomaly detection and privacy preservation in cloud-centric internet of things

I Butun, B Kantarci… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
2015 IEEE International Conference on Communication Workshop (ICCW), 2015ieeexplore.ieee.org
Internet of Things (IoT) concept provides a number of opportunities to improve our daily lives
while also creating a potential risk of increasing the vulnerability of personal information to
security and privacy breaches. Data collected from IoT is usually offloaded to the Cloud
which may further leave data prone to a variety of attacks if security and privacy issues are
not handled properly. Anomaly detection has been one of the widely adopted security
measures in wired and wireless networks. However, it is not straight forward to apply most of …
Internet of Things (IoT) concept provides a number of opportunities to improve our daily lives while also creating a potential risk of increasing the vulnerability of personal information to security and privacy breaches. Data collected from IoT is usually offloaded to the Cloud which may further leave data prone to a variety of attacks if security and privacy issues are not handled properly. Anomaly detection has been one of the widely adopted security measures in wired and wireless networks. However, it is not straight forward to apply most of the anomaly detection techniques to IoT and cloud. One of the main challenges is deriving outlier features from the vast volume of data pumped from IoT to the cloud. Other challenges include the large number of sources generating data, heterogenous connectivity and traffic patterns of IoT devices, cloud services being offered at geographically remote places and causing IoT data to be stored in different countries with different legislations. This paper, for the first time, presents the challenges and opportunities in anomaly detection for IoT and cloud. It first introduces the prominent features and application fields of IoT and Cloud, then discusses security and privacy risks to personal information and finally focuses on solutions from anomaly detection perspective.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果