IoT protection through device to cloud synchronization
2016 (English)In: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016, p. 527-532, article id 7830733Conference paper, Published paper (Refereed)
Abstract [en]
This paper addresses the problem of protecting distributed IoT units from network based attacks while still having a high level of availability. In particular we suggest a novel method where the IoT device execution state is modeled with a suitable high level application model and where the execution state of the application of the IoT device is 'mirrored' in a cloud executed machine. This machine has very high availability and high attack resistance. The IoT device will only communicate with the mirror machine in the cloud using a dedicated synchronization protocol. All essential IoT state information and state manipulations are communicated through this synchronization protocol while all end application communication directed towards the IoT units is done towards the mirror machine in the cloud. This gives a very robust and secure system with high availability at the price of slower responses. However, for many non-real time IoT application with high security demands this performance penalty can be justified.
Place, publisher, year, edition, pages
2016. p. 527-532, article id 7830733
Keywords [en]
Cloud, DDoS, IoT, Security, Synchronization, Cloud computing, Clouds, Mirrors, High availability, High level applications, Network-based attacks, Performance penalties, State information, Synchronization protocols, Internet of things
National Category
Natural Sciences
Identifiers
URN: urn:nbn:se:ri:diva-31062DOI: 10.1109/CloudCom.2016.0092Scopus ID: 2-s2.0-85012970248ISBN: 978-1-5090-1445-3 (electronic)OAI: oai:DiVA.org:ri-31062DiVA, id: diva2:1138506
Conference
8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016), December 12-15, 2016, Luxembourg City, Luxembourg
2017-09-052017-09-052020-12-01Bibliographically approved