Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2024 Dec 26;25(1):79.
doi: 10.3390/s25010079.

Securing Cloud-Based Internet of Things: Challenges and Mitigations

Affiliations
Review

Securing Cloud-Based Internet of Things: Challenges and Mitigations

Nivedita Singh et al. Sensors (Basel). .

Abstract

The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a paradigm shift in the digital landscape. However, these technological strides have introduced new challenges, particularly in cybersecurity. IoT devices, inherently connected to the internet, are susceptible to various forms of attacks. Moreover, IoT services often handle sensitive user data, which could be exploited by malicious actors or unauthorized service providers. As IoT ecosystems expand, the convergence of traditional and cloud-based systems presents unique security threats in the absence of uniform regulations. Cloud-based IoT systems, enabled by Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) models, offer flexibility and scalability but also pose additional security risks. The intricate interaction between these systems and traditional IoT devices demands comprehensive strategies to protect data integrity and user privacy. This paper highlights the pressing security concerns associated with the widespread adoption of IoT devices and services. We propose viable solutions to bridge the existing security gaps while anticipating and preparing for future challenges. This paper provides a detailed survey of the key security challenges that IoT services are currently facing. We also suggest proactive strategies to mitigate these risks, thereby strengthening the overall security of IoT devices and services.

Keywords: IaaS; IoT privacy; IoT security; cloud; security.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflicts of interest.

Figures

Figure 1
Figure 1
IoT cloud ecosystem model.
Figure 2
Figure 2
Article framework. This figure outlines the system model, IoT categories, security risks, mitigations, and related use cases. The ‘Use Cases’ represent real-world scenarios that illustrate the identified security issues or demonstrate the application of proposed mitigation strategies. While some use cases highlight cloud-based IoT systems, others showcase IoT systems transitioning toward cloud integration, emphasizing the relevance of the cloud in their future evolution.
Figure 3
Figure 3
Overview of the article, highlighting key security challenges and providing examples of mitigation strategies.
Figure 4
Figure 4
Basic architecture for cloud-based wearable IoT device.

Similar articles

Cited by

References

    1. Kumar S., Tiwari P., Zymbler M. Internet of Things is a revolutionary approach for future technology enhancement: A review. J. Big Data. 2019;6:1–21. doi: 10.1186/s40537-019-0268-2. - DOI
    1. Kamal M., Aljohani A., Alanazi E. IoT meets COVID-19: Status, Challenges, and Opportunities. arXiv. 20202007.12268
    1. Tabrizi S.S., Ibrahim D. A Review on Cloud Computing and Internet of Things. Int. J. Comput. Inf. Eng. 2017;11:493–498.
    1. Alrawi O., Lever C., Antonakakis M., Monrose F. Sok: Security evaluation of home-based iot deployments; Proceedings of the 2019 IEEE Symposium on Security and Privacy; San Francisco, CA, USA. 13–23 May 2019; pp. 1362–1380.
    1. Apthorpe N., Reisman D., Feamster N. A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic. arXiv. 20171705.06805

LinkOut - more resources