EconPapers    
Economics at your fingertips  
 

Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era

Michele De Donno, Alberto Giaretta, Nicola Dragoni, Antonio Bucchiarone and Manuel Mazzara
Additional contact information
Michele De Donno: DTU Compute, Technical University of Denmark, 2800 Kongens Lyngby, Denmark
Alberto Giaretta: Centre for Applied Autonomous Sensor Systems Orebro University, 701 82 Orebro, Sweden
Nicola Dragoni: DTU Compute, Technical University of Denmark, 2800 Kongens Lyngby, Denmark
Antonio Bucchiarone: Fondazione Bruno Kessler, Via Sommarive 18, 38123 Trento, Italy
Manuel Mazzara: Institute of Software Development and Engineering, Innopolis University, Universitetskaya St, 1, 420500 Innopolis, Russian Federation

Future Internet, 2019, vol. 11, issue 6, 1-30

Abstract: The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds.

Keywords: security; Internet of Things; Cloud computing (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2019
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
https://www.mdpi.com/1999-5903/11/6/127/pdf (application/pdf)
https://www.mdpi.com/1999-5903/11/6/127/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:11:y:2019:i:6:p:127-:d:237171

Access Statistics for this article

Future Internet is currently edited by Ms. Grace You

More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jftint:v:11:y:2019:i:6:p:127-:d:237171