Trustworthy framework for authentication cloud of things
Dissertant
Thesis advisor
University
Isra University
Faculty
Faculty of Information Technology
Department
Department Software Engineering
University Country
Jordan
Degree
Master
Degree Date
2017
English Abstract
The world has recently witnessed a rapid growth in the number of devices connected to the internet.
The concept of Internet of Things (IoT) is defined as the interaction of devices with each other through an internet-based environment. The deployment of IoT in several applications has initiated the need to relay on another paradigm which collects and manipulates the huge amount of data that is communicated from the devices in the IoT environment.
Cloud computing is advocated as the most suitable model which offers several advantages such as storage capacity and power handling capability to address the challenges related with implementing IoT.
Cloud of Things refers to an environment where both the Internet of Things and Cloud computing are integrated.
The Cloud of Things is an IoT management solution for connected devices that provide shared computer processing resources and data to its customers on demand.
Cloud of Things already plays an integral role in many different applications of the IoT.
These applications range from simple ones such as home automation scenarios to more complicated ones such as interconnected smart cities.
The successful deployment of such paradigm will be confronted with several problems.
On one hand, the IoT environment is expected to provide protection to users and devices through properly architected identification and authentication scheme.
On the other hand, the IoT should withstand any type of attacks and physical threats which can jeopardize the operation of the network.
A novel trustworthy framework is proposed in this research where a new layer is introduced and is called the trust layer.
In the proposed layer, only eligible and authorized users and devices are identified and given access to the cloud
Main Subjects
Information Technology and Computer Science
No. of Pages
76
Table of Contents
Table of contents.
Abstract.
Chapter One : Introduction.
Chapter Two : Literature review.
Chapter Three : Research methodology.
Chapter Four : Trust worthy framework for authentication cloud of thing.
Chapter Five : Internet of things classification.
Chapter Six : Fuzzy based model for calculating trust in IoT.
Chapter Seven : Conclusions and future work.
References.
American Psychological Association (APA)
Abu Sariyah, Rima Yusuf. (2017). Trustworthy framework for authentication cloud of things. (Master's theses Theses and Dissertations Master). Isra University, Jordan
https://search.emarefa.net/detail/BIM-789416
Modern Language Association (MLA)
Abu Sariyah, Rima Yusuf. Trustworthy framework for authentication cloud of things. (Master's theses Theses and Dissertations Master). Isra University. (2017).
https://search.emarefa.net/detail/BIM-789416
American Medical Association (AMA)
Abu Sariyah, Rima Yusuf. (2017). Trustworthy framework for authentication cloud of things. (Master's theses Theses and Dissertations Master). Isra University, Jordan
https://search.emarefa.net/detail/BIM-789416
Language
English
Data Type
Arab Theses
Record ID
BIM-789416