Security and Authentication for Devices to Achieve Qos in IOT & Cloud

Authors

  • Dr. R. Jemima Priyadarsini  Associate Professor, Department of Computer Science, Bishop Heber College, Trichy, Tiruchirappalli, Tamil Nadu, India
  • S. Vivin Jose  Research Scholar Department of Computer Science, Bishop Heber College, Trichy, Tiruchirappalli, Tamil Nadu, India

Keywords:

IoT (Internet of Things), Sensor nodes, Routing algorithm, Security.

Abstract

The IoT (Internet of Things) is a network which connects things to the Internet for the intend of interchanging information through the information sensing devices with acceptable protocols. On the other hand, Cloud computing has virtually unlimited capabilities in terms of storage and processing power, is a much more mature technology, and has most of the IoT issues at least partially solved. Sensing Devices utilize in households and smart city is now interconnected with the Internet. These interconnections provide a full series of data that can be serene, aggregate, and then collective in sheltered and privacy-aware style. Some essential fields such as Wireless Sensor Network and Intelligent Transport System (ITS), base nodes collect information and transmit it to the destination nodes. Destination sends commands by the relay devices to the base nodes. Therefore, the integration of cloud and Internet of Things to providing the best service to users and have the highest level of customer satisfaction should always provide quality of service can be guaranteed. The purpose of this paper is to evaluate the integrity requirements of cloud services and Internet of Things so that quality of service in these services must be guaranteed. Thus maintaining the security of both base nodes and destination nodes in this kind of communication is a pressing problem. Instead of proposing yet another security scheme, this can be made easy if devices are identified before communication with secure routing.

References

  1. Prof. Anurag Shukla, Sarsij Tripathi "A Survey on Next generation Computing IoT Issues and Challenges" International Journal of Pure and Applied Mathematics, Volume 118 No. 9 2018, 45-64.
  2. R. Shantha Mary Joshitta, L. Arockiam "Security in IoT Environment: A Survey" Journal of Information Technology & Mechanical Engineering - IJITME, Vol.2 Issue. 7, July- 2016, pg. 1-8
  3. Marie-Aurélie Nef, Leonidas Perlepes, Sophia, and Panayotis K. Kikiras "Enabling QoS in the Internet of Things" CTRQ 2012: The Fifth International Conference on Communication Theory, Reliability, and Quality of Service.
  4. Ravi C Bhaddurgatte, and Vijaya Kumar BP, SMIEEE "A Review: QoS Architecture and Implementations in IoT Environment" Research & Reviews: Journal of Engineering and Technology, ISSN: 2319-9873
  5. Massimo Villari, Adnan Al-Anbuky, Antonio Celesti, Klaus Moessner et al presents "Leveraging the Internet of Things: Integration of Sensors and Cloud Computing Systems" Volume: 12 issue: 7, 2016
  6. Diego Mendez, Ioannis Papapanagiotou, Baijian Yang "Internet of Things: Survey on Security and Privacy" Information Security Journal, Submitted on 6 Jul 2017 (v1), last revised 10 Jul 2017 this version, v2.
  7. Carla Mouradian, Diala Naboulsi, Sami Yangui, Roch H. Glitho, Monique J. Morrow, and Paul A. Polakos "A Comprehensive Survey on Fog Computing: State-of-the-art and Research Challenges" IEEE Communications Surveys & Tutorials Volume: 20, Issue: 1, Firstquarter 2018
  8. Hourieh KHODKARI, Saied Ghazi MAGHREBI "Necessity of the integration Internet of Things and cloud services with quality of service assurance approach" Vol. 85, 2016, p. 434 - 445
  9. Gonçalo Marques, Nuno Garcia, Nuno Pombo "A Survey on IoT: Architectures, Elements, Applications, QoS, Platforms and Security concepts" Advances in Mobile Cloud Computing and Big Data in the 5G Era pp 115-130
  10. M.Mullaiarasu , Dr S.Veni "Comparing and Analysis of Routing protocol in QoS of IoT" International Journal of Innovations & Advancement in Computer Science, IJIACS, ISSN 2347 – 8616, Volume 7, Issue 3, March 2018
  11. Timo Koskela, Sami Hakola, Tao Chenand Janne Lehtomak "Clustering Concept using Device-to-Device Communication in Cellular System" 
  12. YANG Jin-cui, PANG Hao, ZHANG Xin "Enhanced mutual authentication model of IoT" 
  13. Thomas Kothmayr, Corinna Schmitt, Wen Hu, Michael Burning and Georg Carle" DTLS based security and two-way authentication for the Internet of Thing" Ad Hoc Networks, 2013 Zitiert von: 47 - Ähnliche Artikel - Alle 6 Versionen 
  14. Huansheng Ning, Hong Liu, Laurence T. Yang, "Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things", IEEE transactions on parallel and distributed systems, VOL. 26, NO. 3, pp. 657-667, MARCH 2015.
  15. Yijun Mao, Jin Li, Min-Rong Chen, Jianan Liu, Congge Xie, Yiju Zhan"Fully Secure Fuzzy Identity-Based Encryption for Secure IoT Communications" Computer Standards & Interfaces, 25 June 2015 
  16. Omaimah Omar Bamasag, Kamal Youcef-Toum "Towards Continuous Authentication in Internet of Things Based on Secret Sharing Scheme".

Downloads

Published

2018-07-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. R. Jemima Priyadarsini, S. Vivin Jose, " Security and Authentication for Devices to Achieve Qos in IOT & Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.252-258, July-August-2018.