Applying Security to a Big Stream Cloud Architecture for the Internet of Things | IGI Global Scientific Publishing
Reference Hub16
Applying Security to a Big Stream Cloud Architecture for the Internet of Things

Applying Security to a Big Stream Cloud Architecture for the Internet of Things

Laura Belli, Simone Cirani, Luca Davoli, Gianluigi Ferrari, Lorenzo Melegari, Marco Picone
Copyright: © 2016 |Volume: 7 |Issue: 1 |Pages: 22
ISSN: 1947-3532|EISSN: 1947-3540|EISBN13: 9781466692121|DOI: 10.4018/IJDST.2016010103
Cite Article Cite Article

MLA

Belli, Laura, et al. "Applying Security to a Big Stream Cloud Architecture for the Internet of Things." IJDST vol.7, no.1 2016: pp.37-58. https://doi.org/10.4018/IJDST.2016010103

APA

Belli, L., Cirani, S., Davoli, L., Ferrari, G., Melegari, L., & Picone, M. (2016). Applying Security to a Big Stream Cloud Architecture for the Internet of Things. International Journal of Distributed Systems and Technologies (IJDST), 7(1), 37-58. https://doi.org/10.4018/IJDST.2016010103

Chicago

Belli, Laura, et al. "Applying Security to a Big Stream Cloud Architecture for the Internet of Things," International Journal of Distributed Systems and Technologies (IJDST) 7, no.1: 37-58. https://doi.org/10.4018/IJDST.2016010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The Internet of Things (IoT) is expected to interconnect billions (around 50 by 2020) of heterogeneous sensor/actuator-equipped devices denoted as “Smart Objects” (SOs), characterized by constrained resources in terms of memory, processing, and communication reliability. Several IoT applications have real-time and low-latency requirements and must rely on architectures specifically designed to manage gigantic streams of information (in terms of number of data sources and transmission data rate). We refer to “Big Stream” as the paradigm which best fits the selected IoT scenario, in contrast to the traditional “Big Data” concept, which does not consider real-time constraints. Moreover, there are many security concerns related to IoT devices and to the Cloud. In this paper, we analyze security aspects in a novel Cloud architecture for Big Stream applications, which efficiently handles Big Stream data through a Graph-based platform and delivers processed data to consumers, with low latency. The authors detail each module defined in the system architecture, describing all refinements required to make the platform able to secure large data streams. An experimentation is also conducted in order to evaluate the performance of the proposed architecture when integrating security mechanisms.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global Scientific Publishing bookstore.