Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

IoT protection through device to cloud synchronization

Gehrmann, Christian LU and Abdelraheem, Mohamed Ahmed (2017) 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016 p.527-532
Abstract

This paper addresses the problem of protecting distributed IoT units from network based attacks while still having a high level of availability. In particular we suggest a novel method where the IoT device execution state is modeled with a suitable high level application model and where the execution state of the application of the IoT device is 'mirrored' in a cloud executed machine. This machine has very high availability and high attack resistance. The IoT device will only communicate with the mirror machine in the cloud using a dedicated synchronization protocol. All essential IoT state information and state manipulations are communicated through this synchronization protocol while all end application communication directed towards... (More)

This paper addresses the problem of protecting distributed IoT units from network based attacks while still having a high level of availability. In particular we suggest a novel method where the IoT device execution state is modeled with a suitable high level application model and where the execution state of the application of the IoT device is 'mirrored' in a cloud executed machine. This machine has very high availability and high attack resistance. The IoT device will only communicate with the mirror machine in the cloud using a dedicated synchronization protocol. All essential IoT state information and state manipulations are communicated through this synchronization protocol while all end application communication directed towards the IoT units is done towards the mirror machine in the cloud. This gives a very robust and secure system with high availability at the price of slower responses. However, for many non-real time IoT application with high security demands this performance penalty can be justified.

(Less)
Please use this url to cite or link to this publication:
author
and
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
keywords
Cloud, DDoS, IoT, Security, Synchronization
host publication
Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016
article number
7830733
pages
6 pages
publisher
IEEE - Institute of Electrical and Electronics Engineers Inc.
conference name
8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016
conference location
Luxembourg, Luxembourg
conference dates
2016-12-12 - 2016-12-15
external identifiers
  • scopus:85012970248
ISBN
9781509014460
9781509014453
DOI
10.1109/CloudCom.2016.0092
language
English
LU publication?
no
id
97cddc6b-3084-4fcb-ac90-7692497eefde
date added to LUP
2018-11-21 16:44:13
date last changed
2024-01-15 07:31:55
@inproceedings{97cddc6b-3084-4fcb-ac90-7692497eefde,
  abstract     = {{<p>This paper addresses the problem of protecting distributed IoT units from network based attacks while still having a high level of availability. In particular we suggest a novel method where the IoT device execution state is modeled with a suitable high level application model and where the execution state of the application of the IoT device is 'mirrored' in a cloud executed machine. This machine has very high availability and high attack resistance. The IoT device will only communicate with the mirror machine in the cloud using a dedicated synchronization protocol. All essential IoT state information and state manipulations are communicated through this synchronization protocol while all end application communication directed towards the IoT units is done towards the mirror machine in the cloud. This gives a very robust and secure system with high availability at the price of slower responses. However, for many non-real time IoT application with high security demands this performance penalty can be justified.</p>}},
  author       = {{Gehrmann, Christian and Abdelraheem, Mohamed Ahmed}},
  booktitle    = {{Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016}},
  isbn         = {{9781509014460}},
  keywords     = {{Cloud; DDoS; IoT; Security; Synchronization}},
  language     = {{eng}},
  month        = {{01}},
  pages        = {{527--532}},
  publisher    = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}},
  title        = {{IoT protection through device to cloud synchronization}},
  url          = {{http://dx.doi.org/10.1109/CloudCom.2016.0092}},
  doi          = {{10.1109/CloudCom.2016.0092}},
  year         = {{2017}},
}