ارسل ملاحظاتك

ارسل ملاحظاتك لنا







Trustworthy Framework for Authentication Cloud of Things

المؤلف الرئيسي: Abu Siryeh, Rima Yousef (Author)
مؤلفين آخرين: Al Rousan, Thamer (Advisor)
التاريخ الميلادي: 2017
موقع: عمان
الصفحات: 1 - 76
رقم MD: 901463
نوع المحتوى: رسائل جامعية
اللغة: الإنجليزية
الدرجة العلمية: رسالة ماجستير
الجامعة: جامعة الاسراء الخاصة
الكلية: كلية تكنولوجيا المعلومات
الدولة: الاردن
قواعد المعلومات: Dissertations
مواضيع:
رابط المحتوى:
صورة الغلاف QR قانون

عدد مرات التحميل

191

حفظ في:
المستخلص: The world has recently witnessed a rapid growth in the number of devices connected to the internet. The concept of Internet of Things (IoT) is defined as the interaction of devices with each other through an internet-based environment. The deployment of IoT in several applications has initiated the need to relay on another paradigm which collects and manipulates the huge amount of data that is communicated from the devices in the IoT environment. Cloud computing is advocated as the most suitable model which offers several advantages such as storage capacity and power handling capability to address the challenges related with implementing IoT. Cloud of Things refers to an environment where both the Internet of Things and Cloud computing are integrated. The Cloud of Things is an IoT management solution for connected devices that provide shared computer processing resources and data to its customers on demand. Cloud of Things already plays an integral role in many different applications of the IoT. These applications range from simple ones such as home automation scenarios to more complicated ones such as interconnected smart cities. The successful deployment of such paradigm will be confronted with several problems. On one hand, the IoT environment is expected to provide protection to users and devices through properly architected identification and authentication scheme. On the other hand, the IoT should withstand any type of attacks and physical threats which can jeopardize the operation of the network. A novel trustworthy framework is proposed in this research where a new layer is introduced and is called the trust layer. In the proposed layer, only eligible and authorized users and devices are identified and given access to the cloud.

عناصر مشابهة