Match!

Integrating Internet-of-Things with the power of Cloud Computing and the intelligence of Big Data analytics — A three layered approach

Published on Dec 1, 2015
· DOI :10.1109/APWCCSE.2015.7476124
Tanzim Khorshed4
Estimated H-index: 4
(Deakin University),
Neeraj Sharma9
Estimated H-index: 9
+ 3 AuthorsYang Xiang57
Estimated H-index: 57
(Deakin University)
Abstract
This paper is written through the vision on integrating Internet-of-Things (IoT) with the power of Cloud Computing and the intelligence of Big Data analytics. But integration of all these three cutting edge technologies is complex to understand. In this research we first provide a security centric view of three layered approach for understanding the technology, gaps and security issues. Then with a series of lab experiments on different hardware, we have collected performance data from all these three layers, combined these data together and finally applied modern machine learning algorithms to distinguish 18 different activities and cyber-attacks. From our experiments we find classification algorithm RandomForest can identify 93.9% attacks and activities in this complex environment. From the existing literature, no one has ever attempted similar experiment for cyber-attack detection for IoT neither with performance data nor with a three layered approach.
  • References (12)
  • Citations (6)
📖 Papers frequently viewed together
2015
4 Citations
2014IMIS: Innovative Mobile and Internet Services in Ubiquitous Computing
3 Authors (Antonio J. Jara, ..., Yann Bocchi)
17 Citations
61 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
References12
Newest
#1Tuhin BorgohainH-Index: 3
#2Uday KumarH-Index: 3
Last. Sugata SanyalH-Index: 22
view all 3 authors...
This paper is a comprehensive survey of the various operating systems available for the Internet of Things environment. At first the paper introduces the various aspects of the operating systems designed for the IoT environment where resource constraint poses a huge problem for the operation of the general OS designed for the various computing devices. The latter part of the paper describes the various OS available for the resource constraint IoT environment along with the various platforms each...
12 Citations
#1Tanzim Khorshed (Central Queensland University)H-Index: 4
#2Ali A. B. M. Shawkat (Central Queensland University)H-Index: 16
Last. Saleh A. Wasimi (Central Queensland University)H-Index: 9
view all 3 authors...
One of the crucial but complicated tasks is to detect cyber attacks and their types in any IT networking environment including recent uptake of cloud services.
3 CitationsSource
#1Jayavardhana Gubbi (University of Melbourne)H-Index: 15
#2Rajkumar Buyya (University of Melbourne)H-Index: 105
Last. Marimuthu Palaniswami (University of Melbourne)H-Index: 47
view all 4 authors...
Ubiquitous sensing enabled by Wireless Sensor Network (WSN) technologies cuts across many areas of modern day living. This offers the ability to measure, infer and understand environmental indicators, from delicate ecologies and natural resources to urban environments. The proliferation of these devices in a communicating-actuating network creates the Internet of Things (IoT), wherein sensors and actuators blend seamlessly with the environment around us, and the information is shared across plat...
4,389 CitationsSource
#1Ali A. B. M. Shawkat (Central Queensland University)H-Index: 16
#2Salahuddin Azad (Central Queensland University)H-Index: 7
Last. Tanzim Khorshed (Central Queensland University)H-Index: 4
view all 3 authors...
The demand of electricity is increasing in parallel with the growth of the world population. The existing power grid, which is over 100 years old, is facing many challenges to facilitate the continuous flow of electricity from large power plants to the consumers. To overcome these challenges, the power industry has warmly accepted the new concept smart grid which has been initiated by the engineers. This movement will be more beneficial and sustainable to the extent if we can offer a secure smar...
3 CitationsSource
#1Tanzim Khorshed (Central Queensland University)H-Index: 4
#2Ali A. B. M. Shawkat (Central Queensland University)H-Index: 16
Last. Saleh A. Wasimi (Central Queensland University)H-Index: 9
view all 3 authors...
From traditional networking to cloud computing, one of the essential but formidable tasks is to detect cyber attacks and their types. A cloud provider's unwillingness to share security-related data with its clients adds to the difficulty of detection by a cloud customer. The research contributions in this paper are twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is hindering cloud adoption, accompanied by a review of the threat remediation...
16 CitationsSource
#1Md. Tanzim Khorshed (Central Queensland University)H-Index: 1
#2Ali A. B. M. Shawkat (Central Queensland University)H-Index: 16
Last. Saleh A. Wasimi (Central Queensland University)H-Index: 9
view all 3 authors...
The long-term potential benefits through reduction of cost of services and improvement of business outcomes make Cloud Computing an attractive proposition these days. To make it more marketable in the wider IT user community one needs to address a variety of information security risks. In this paper, we present an extensive review on cloud computing with the main focus on gaps and security concerns. We identify the top security threats and their existing solutions. We also investigate the challe...
181 CitationsSource
Dec 1, 2011 in ICPADS (International Conference on Parallel and Distributed Systems)
#1Tanzim Khorshed (Central Queensland University)H-Index: 4
#2Ali A. B. M. Shawkat (Central Queensland University)H-Index: 16
Last. Saleh A. Wasimi (Central Queensland University)H-Index: 9
view all 3 authors...
The research contribution in this paper is twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is slowing down cloud adoption as well as reviewing the threat remediation challenges. Next, some thoughts are constructed on novel approaches to address some of the widely discussed attack types using machine learning techniques. Such thoughts captured through a series of experiments are expected to give researchers, cloud providers and their custom...
23 CitationsSource
#1Tanzim Khorshed (Central Queensland University)H-Index: 4
#2Ali A. B. M. Shawkat (Central Queensland University)H-Index: 16
Last. Saleh A. Wasimi (Central Queensland University)H-Index: 9
view all 3 authors...
One of the essential but formidable tasks in cloud computing is to detect malicious attacks and their types. A cloud provider's constraints or inability in monitoring its employees, and lack of transparency, may make the detection process even harder. We found these insiders' activities form similar pattern in the monitoring systems as some other cyber attacks because these also uses huge computer resources. In this paper we first provide a brief overview on the importance of monitoring insiders...
23 CitationsSource
Radio Frequency Identification (RFID) systems and Wireless Sensor Networks (WSNs) represent two key technologies for ubiquitous computing that have attracted considerable attention in recent years because their use revolutionizes diverse application areas. However, these two technologies have separate research and development areas. The integration of RFID and sensor networks can increase their utilities to other scientific and engineering fields by exploiting the advantages of both technologies...
43 Citations
Jan 1, 2010 in IOT (The Internet of Things)
#1Rolf H. Weber (HKU: University of Hong Kong)H-Index: 15
The Internet of Things, an emerging global Internet-based technical architecture facilitating the exchange of goods and services in global supply chain networks has an impact on the security and privacy of the involved stakeholders. Measures ensuring the architecture's resilience to attacks, data authentication, access control and client privacy need to be established. An adequate legal framework must take the underlying technology into account and would best be established by an international l...
671 CitationsSource
Cited By6
Newest
#1Miguel M. Martín-Lopo (Comillas Pontifical University)
#2Jaime Boal (Comillas Pontifical University)H-Index: 2
Last. Alvaro Sanchez-Miralles (Comillas Pontifical University)H-Index: 6
view all 3 authors...
Abstract The rising interest in connecting everything to the Internet has not gone unnoticed in the energy sector. New actors that aim to remotely monitor and control home devices such as heating, ventilation and air conditioning (HVAC), light bulbs, or distributed energy resources (e.g., batteries, PV panels…) have come into play. However, transitioning from isolated often not interoperable home automation systems to open, yet secure, solutions that integrate external sources of information and...
Source
#1H.M.B. Priyabhashana (Sabaragamuwa University)
#2K.P.N. Jayasena (Sabaragamuwa University)
Fog computing introduced by Cisco for local processing of tasks on edge Internet of Things (IoT) devices known as fog devices. Nowadays IoT applications produce a large amount of data and require powerful analytical approaches. These data should transmit to cloud data centres to extract useful information. In fog computing, these kinds of data handling by fog layer. The fog layer consists of geo-allocated servers which are deployed on the network periphery. Each fog server can be known as a ligh...
Source
#1Karthiban K. Mr.H-Index: 1
#2Jennifer S. Raj DrH-Index: 1
10 CitationsSource
Last. Dimitrios N. SerpanosH-Index: 18
view all 6 authors...
Cyber-Physical Systems (CPSs) combine computational and physical components enabling real-world interaction. Digitization, decentralization, and high connectivity, as well as incorporation of various enabling technologies, raise various security issues. These security concerns may affect safety, endangering assets and even human lives. This is especially true for CPS utilization in different sectors of great significance, including manufacturing or critical infrastructures, creating a need for e...
Source
#1Shabnam Shadroo (IAU: Islamic Azad University)H-Index: 1
#2Amir Masoud Rahmani (IAU: Islamic Azad University)H-Index: 20
Abstract In recent years, the Internet of Things (IoT) has emerged as a new opportunity. Thus, all devices such as smartphones, transportation facilities, public services, and home appliances are used as data creator devices. All the electronic devices around us help our daily life. Devices such as wrist watches, emergency alarms, and garage doors and home appliances such as refrigerators, microwaves, air conditioning, and water heaters are connected to an IoT network and controlled remotely. Me...
12 CitationsSource
#1Indira Avdagic (University of Sarajevo)H-Index: 1
#2Kemal Hajdarevic (University of Sarajevo)H-Index: 3
Today IT vendors and mail/web/internet providers put their cloud strategy in the first place. Challenges such as data security, privacy protection, data access, storage model, lack of standards and service interoperability were set up almost ten years ago. This paper presents a part of the research on the cloud security systems at the infrastructure layer and its sublayer — network layer. To analyze and protect cloud systems we need storage and machines with extra features. Due to these needs, w...
Source
#1Kemal Hajdarevic (University of Sarajevo)H-Index: 3
#2Adna Kozic (University of Sarajevo)H-Index: 1
Last. Nejdet Dogru (International Burch University)H-Index: 2
view all 5 authors...
The threat of resource starvation attacks is one of the major problems for the e-Business. More recently these attacks became threats for Cloud environments and Denial of Service is a sub-category of these kinds of attack. The network management is process of taking proactive actions before the attack has taken effect which is responsibility of skilled employees — network managers. In recent time vulnerability testing skills are needed to harden system security. These skills have to be developed...
1 CitationsSource
#1Zerina Masetic (International Burch University)H-Index: 2
#2Kemal Hajdarevic (University of Sarajevo)H-Index: 3
Last. Nejdet Dogru (International Burch University)H-Index: 2
view all 3 authors...
Cloud computing became very popular in past few years, and most of the business and home users rely on its services. Because of its wide usage, cloud computing services became a common target of different cyber-attacks executed by insiders and outsiders. Therefore, cloud computing vendors and providers need to implement strong information security protection mechanisms on their cloud infrastructures. One approach that has been taken for successful threat detection that will lead to the successfu...
2 CitationsSource
Dec 1, 2016 in ISSPIT (International Symposium on Signal Processing and Information Technology)
#1Jongmin Lee (ASU: Arizona State University)H-Index: 4
#2Michael Stanley (NXP Semiconductors)H-Index: 2
Last. Cihan Tepedelenlioglu (ASU: Arizona State University)H-Index: 26
view all 4 authors...
Interpreting sensor data in Internet-of-Things applications is a challenging problem particularly in embedded systems. We consider sensor data analytics where machine learning algorithms can be fully implemented on an embedded processor/sensor board. We develop an efficient real-time realization of a Gaussian mixture model (GMM) for execution on the NXP FRDM-K64F embedded sensor board. We demonstrate the design of a customized program and data structure that generates real-time sensor features, ...
9 CitationsSource