Trustworthy framework for authentication cloud of things

Dissertant

Abu Sariyah, Rima Yusuf

Thesis advisor

al-Rusan, Thamir

University

Isra University

Faculty

Faculty of Information Technology

Department

Department Software Engineering

University Country

Jordan

Degree

Master

Degree Date

2017

English Abstract

The world has recently witnessed a rapid growth in the number of devices connected to the internet.

The concept of Internet of Things (IoT) is defined as the interaction of devices with each other through an internet-based environment. The deployment of IoT in several applications has initiated the need to relay on another paradigm which collects and manipulates the huge amount of data that is communicated from the devices in the IoT environment.

Cloud computing is advocated as the most suitable model which offers several advantages such as storage capacity and power handling capability to address the challenges related with implementing IoT.

Cloud of Things refers to an environment where both the Internet of Things and Cloud computing are integrated.

The Cloud of Things is an IoT management solution for connected devices that provide shared computer processing resources and data to its customers on demand.

Cloud of Things already plays an integral role in many different applications of the IoT.

These applications range from simple ones such as home automation scenarios to more complicated ones such as interconnected smart cities.

The successful deployment of such paradigm will be confronted with several problems.

On one hand, the IoT environment is expected to provide protection to users and devices through properly architected identification and authentication scheme.

On the other hand, the IoT should withstand any type of attacks and physical threats which can jeopardize the operation of the network.

A novel trustworthy framework is proposed in this research where a new layer is introduced and is called the trust layer.

In the proposed layer, only eligible and authorized users and devices are identified and given access to the cloud

Main Subjects

Information Technology and Computer Science

No. of Pages

76

Table of Contents

Table of contents.

Abstract.

Chapter One : Introduction.

Chapter Two : Literature review.

Chapter Three : Research methodology.

Chapter Four : Trust worthy framework for authentication cloud of thing.

Chapter Five : Internet of things classification.

Chapter Six : Fuzzy based model for calculating trust in IoT.

Chapter Seven : Conclusions and future work.

References.

American Psychological Association (APA)

Abu Sariyah, Rima Yusuf. (2017). Trustworthy framework for authentication cloud of things. (Master's theses Theses and Dissertations Master). Isra University, Jordan
https://search.emarefa.net/detail/BIM-789416

Modern Language Association (MLA)

Abu Sariyah, Rima Yusuf. Trustworthy framework for authentication cloud of things. (Master's theses Theses and Dissertations Master). Isra University. (2017).
https://search.emarefa.net/detail/BIM-789416

American Medical Association (AMA)

Abu Sariyah, Rima Yusuf. (2017). Trustworthy framework for authentication cloud of things. (Master's theses Theses and Dissertations Master). Isra University, Jordan
https://search.emarefa.net/detail/BIM-789416

Language

English

Data Type

Arab Theses

Record ID

BIM-789416