Trustworthy framework for authentication cloud of things

مقدم أطروحة جامعية

Abu Sariyah, Rima Yusuf

مشرف أطروحة جامعية

al-Rusan, Thamir

الجامعة

جامعة الإسراء

الكلية

كلية تكنولوجيا المعلومات

القسم الأكاديمي

قسم هندسة البرمجيات

دولة الجامعة

الأردن

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2017

الملخص الإنجليزي

The world has recently witnessed a rapid growth in the number of devices connected to the internet.

The concept of Internet of Things (IoT) is defined as the interaction of devices with each other through an internet-based environment. The deployment of IoT in several applications has initiated the need to relay on another paradigm which collects and manipulates the huge amount of data that is communicated from the devices in the IoT environment.

Cloud computing is advocated as the most suitable model which offers several advantages such as storage capacity and power handling capability to address the challenges related with implementing IoT.

Cloud of Things refers to an environment where both the Internet of Things and Cloud computing are integrated.

The Cloud of Things is an IoT management solution for connected devices that provide shared computer processing resources and data to its customers on demand.

Cloud of Things already plays an integral role in many different applications of the IoT.

These applications range from simple ones such as home automation scenarios to more complicated ones such as interconnected smart cities.

The successful deployment of such paradigm will be confronted with several problems.

On one hand, the IoT environment is expected to provide protection to users and devices through properly architected identification and authentication scheme.

On the other hand, the IoT should withstand any type of attacks and physical threats which can jeopardize the operation of the network.

A novel trustworthy framework is proposed in this research where a new layer is introduced and is called the trust layer.

In the proposed layer, only eligible and authorized users and devices are identified and given access to the cloud

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

عدد الصفحات

76

قائمة المحتويات

Table of contents.

Abstract.

Chapter One : Introduction.

Chapter Two : Literature review.

Chapter Three : Research methodology.

Chapter Four : Trust worthy framework for authentication cloud of thing.

Chapter Five : Internet of things classification.

Chapter Six : Fuzzy based model for calculating trust in IoT.

Chapter Seven : Conclusions and future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Abu Sariyah, Rima Yusuf. (2017). Trustworthy framework for authentication cloud of things. (Master's theses Theses and Dissertations Master). Isra University, Jordan
https://search.emarefa.net/detail/BIM-789416

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Abu Sariyah, Rima Yusuf. Trustworthy framework for authentication cloud of things. (Master's theses Theses and Dissertations Master). Isra University. (2017).
https://search.emarefa.net/detail/BIM-789416

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Abu Sariyah, Rima Yusuf. (2017). Trustworthy framework for authentication cloud of things. (Master's theses Theses and Dissertations Master). Isra University, Jordan
https://search.emarefa.net/detail/BIM-789416

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-789416