Total views : 247

Secure Communications on IoT and Big Data

Affiliations

  • Department of Information Technology, College of Applied Sciences, Ministry of Higher Education, Sultanate of Oman, Oman

Abstract


Objective: Presently Internet of Things or “IoT” refers to the means of all possible communications. This paper presents a review of Internet of things and big data available on it. Methods/Analysis: The paper depicts the impacts and importance of these terminologies in the current scenario. Data Analytics is an emerging field which utilizes IoT and big data. Most of the organizations start cultivating big data available on IoT for their strategic decisions Findings: Though organizations finding it beneficial, also facing security challenges to protect their important data. Companies that fail to maintain reasonable security, it means for organizations is that if they fail to secure the life cycle of their big data environments, then they may face regulatory consequences, in addition to the significant brand damage that data breaches can cause. To protect various techniques likes cryptography, and encryption etc. are used. For secure communication in IoT-type systems currently requires many levels of configuration of security algorithms, which discourages users from implementing protection and often encourages functionality to be prioritized over security. This paper highlights new security enhancing techniques which are based on identification and authentication of the things in the IoT environment. Global Data is on the rise, by 2020, we would have manifold of the data we generate every day. This data would be generated through a wide array of sensors we are continuously incorporating in our lives. Improvement: So we have to implement standard approach to risk management which assumes that the trust boundary is already defined. What is missing in the risk-focused and technocentric approach is everything related to the management of trust, i.e., the new functions and processes, and the new policies and structures required to expand the risk boundary

Keywords

Big Data, Communication, Cryptography, Data Analytics, IOT, Security

Full Text:

 |  (PDF views: 206)

References


  • Okman L, Gal-Oz N, Gonen Y, Gudes E and Abramov J. Security Issues in NoSQL Databases. Proceedings of Trust Com IEEE Conference on International Conference on Trust, Security and Privacy in Computing and Communications. 2011, p. 541–7. Crossref
  • Top 10 Big Data Security and Privacy Challenges, Cloud Security Alliance. 2012 [Date Accessed: 5/12/2016].Available from: Crossref
  • Jonker W and Petkovic M. Data Security challenges and research operations. Springer International Publishing.Switzerland; 2014. p. 9–13. LNCS 8425. Crossref
  • Feng J, Chen Y and Liu P. Bridging the Missing Link of Cloud Data Storage Security in AWS. Proceedings of 7th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC’10); Las Vegas, Nevada, USA. 2010 Jan. p. 9–12. Crossref
  • Sarkar D and Nath A. Big Data – A Pilot Study on Scope and Challenges. International Journal of Advance Research in Computer Science and Management Studies (IJARCSMS).2014 Dec 31. 2(12):9–19. ISSN: 2371-7782).
  • The ESG White Paper. The Big Data Security Analytics Era Is Here. 2013 Jan.
  • An Inside-Out Approach to Enterprise Security, Oracle/ CSO Custom Solutions Group white paper. 2013.
  • 3GPP. “3GPP Specification detail; 3GPP TS 33.220 – Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA),” 2016. [Accessed February 2016]. Available from: Crossref
  • Ericsson White paper “Bootstrapping security” 284 23-3284 Uen. 2016 Feb.
  • Toshniwal R et al. Big Data Security Issues and Challenges. International Journal of Innovative Research in Advanced Engineering (IJIRAE). 2015 Feb; 2(2):15–20.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.