JIITA, vol.7 no.4, p.868-873 2023, DOI: 10.22664/ISITA.2023.7.4.884
N.G.S.Parameswaran, M.Sumathi
Abstract: Cloud computing is a booming technology used by IT organizations since it provides all types of services based on pay per use model. Security and privacy is the major concern of clouds. IoT devices are resource constrained devices, and are unable of securing and defending themselves, and can be fluently negotiated and compromised. Thus, it is important to take up proper schemes for authentication and control access to assure the overall security for IoT devices, their communications, and their data. Accessing the IoT devices using cloud is increasing. Also the authentication scheme must be reliable, scalable, and secure against known attacks and threats. Cloud and IoT need to follow stringent security mechanisms to detect its anomalies. Intrusion detection system (IDS) is used to analyse the intruder attack on the cloud. We emphasise the use of anomaly based intrusion detection techniques to prevent the intruder attack. Edge intelligence is the combination of AI and Edge Computing; it enables deployment of machine learning algorithms to the edge devices where the data is generated. It has the potential of providing artificial intelligence to any person and every organization at any place.
Keywords: IoT, Authentication, Cloud, Security, IDS, Edge Intelligence, Edge Computing
Fullpaper: