IoT protection through device to cloud synchronization
(2017) 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016 p.527-532- Abstract
This paper addresses the problem of protecting distributed IoT units from network based attacks while still having a high level of availability. In particular we suggest a novel method where the IoT device execution state is modeled with a suitable high level application model and where the execution state of the application of the IoT device is 'mirrored' in a cloud executed machine. This machine has very high availability and high attack resistance. The IoT device will only communicate with the mirror machine in the cloud using a dedicated synchronization protocol. All essential IoT state information and state manipulations are communicated through this synchronization protocol while all end application communication directed towards... (More)
This paper addresses the problem of protecting distributed IoT units from network based attacks while still having a high level of availability. In particular we suggest a novel method where the IoT device execution state is modeled with a suitable high level application model and where the execution state of the application of the IoT device is 'mirrored' in a cloud executed machine. This machine has very high availability and high attack resistance. The IoT device will only communicate with the mirror machine in the cloud using a dedicated synchronization protocol. All essential IoT state information and state manipulations are communicated through this synchronization protocol while all end application communication directed towards the IoT units is done towards the mirror machine in the cloud. This gives a very robust and secure system with high availability at the price of slower responses. However, for many non-real time IoT application with high security demands this performance penalty can be justified.
(Less)
- author
- Gehrmann, Christian LU and Abdelraheem, Mohamed Ahmed
- publishing date
- 2017-01-23
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- keywords
- Cloud, DDoS, IoT, Security, Synchronization
- host publication
- Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016
- article number
- 7830733
- pages
- 6 pages
- publisher
- IEEE - Institute of Electrical and Electronics Engineers Inc.
- conference name
- 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016
- conference location
- Luxembourg, Luxembourg
- conference dates
- 2016-12-12 - 2016-12-15
- external identifiers
-
- scopus:85012970248
- ISBN
- 9781509014460
- 9781509014453
- DOI
- 10.1109/CloudCom.2016.0092
- language
- English
- LU publication?
- no
- id
- 97cddc6b-3084-4fcb-ac90-7692497eefde
- date added to LUP
- 2018-11-21 16:44:13
- date last changed
- 2024-01-15 07:31:55
@inproceedings{97cddc6b-3084-4fcb-ac90-7692497eefde, abstract = {{<p>This paper addresses the problem of protecting distributed IoT units from network based attacks while still having a high level of availability. In particular we suggest a novel method where the IoT device execution state is modeled with a suitable high level application model and where the execution state of the application of the IoT device is 'mirrored' in a cloud executed machine. This machine has very high availability and high attack resistance. The IoT device will only communicate with the mirror machine in the cloud using a dedicated synchronization protocol. All essential IoT state information and state manipulations are communicated through this synchronization protocol while all end application communication directed towards the IoT units is done towards the mirror machine in the cloud. This gives a very robust and secure system with high availability at the price of slower responses. However, for many non-real time IoT application with high security demands this performance penalty can be justified.</p>}}, author = {{Gehrmann, Christian and Abdelraheem, Mohamed Ahmed}}, booktitle = {{Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016}}, isbn = {{9781509014460}}, keywords = {{Cloud; DDoS; IoT; Security; Synchronization}}, language = {{eng}}, month = {{01}}, pages = {{527--532}}, publisher = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}}, title = {{IoT protection through device to cloud synchronization}}, url = {{http://dx.doi.org/10.1109/CloudCom.2016.0092}}, doi = {{10.1109/CloudCom.2016.0092}}, year = {{2017}}, }