Sammanfattning
This paper addresses the problem of protecting distributed IoT units from network based attacks while still having a high level of availability. In particular we suggest a novel method where the IoT device execution state is modeled with a suitable high level application model and where the execution state of the application of the IoT device is 'mirrored' in a cloud executed machine. This machine has very high availability and high attack resistance. The IoT device will only communicate with the mirror machine in the cloud using a dedicated synchronization protocol. All essential IoT state information and state manipulations are communicated through this synchronization protocol while all end application communication directed towards the IoT units is done towards the mirror machine in the cloud. This gives a very robust and secure system with high availability at the price of slower responses. However, for many non-real time IoT application with high security demands this performance penalty can be justified.
Originalspråk | engelska |
---|---|
Titel på värdpublikation | Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016 |
Förlag | IEEE - Institute of Electrical and Electronics Engineers Inc. |
Sidor | 527-532 |
Antal sidor | 6 |
ISBN (elektroniskt) | 9781509014453 |
ISBN (tryckt) | 9781509014460 |
DOI | |
Status | Published - 2017 jan. 23 |
Externt publicerad | Ja |
Evenemang | 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016 - Luxembourg, Luxemburg Varaktighet: 2016 dec. 12 → 2016 dec. 15 |
Konferens
Konferens | 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016 |
---|---|
Land/Territorium | Luxemburg |
Ort | Luxembourg |
Period | 2016/12/12 → 2016/12/15 |
Ämnesklassifikation (UKÄ)
- Annan data- och informationsvetenskap