Cryptography Arbitration: Security Complexities of Cloud Enabled IoT in Europe and Beyond

Morgan Eldred, Hassan Alnoon, Sultan AlTamimi

2016

Abstract

The global nature of the Internet of Things and cloud has and will result in emerging challenges, such as whom is liable for data protection and security breaches of personal data. This paper puts forward the concept of ‘cryptography arbitration’ and the need to design and architect legally compliant solutions. As the world becomes more interconnected we are likely to see more example of technology practices sweeping the globe and raising further data protection challenges; much like the fault lines between tectonic plates. This paper provides contribution by capturing some emerging impacts and challenges and how they relate to the internet of things and the need for solutions to have the appropriate cryptography safeguards.

References

  1. Chang, V., Kuo, Y.-H. and Ramachandran, M. (2016) 'Cloud computing adoption framework: A security framework for business clouds', Future Generation Computer Systems, 57, pp. 24-41. doi: 10.1016/j.future.2015.09.031.
  2. Chang, V. and Ramachandran, M. (2016) Towards achieving data security with the cloud computing adoption framework. Available at: http://ieeexplore.ieee.org/xpl/abstractMetrics.jsp?arnu mber=7299312 (Accessed: 17 March 2016).
  3. Ning, H. and Liu, H. (2012). Cyber-Physical-Social Based Security Architecture for Future Internet of Things. Advances in Internet of Things, 02(01), pp.1-7.
  4. Ning, H., Liu, H. and Yang, L. (2013). Cyberentity Security in the Internet of Things. Computer, 46(4), pp.46-53.
  5. NIST, (2013). Cryptographic Key Management Issues & Challenges in Cloud Services (NISTIR 7956).
  6. Management. Eng, C. (2008). Cryptography for Penetration Testers.
  7. Gurkaynak, F., Oswald, E. and Preneel, B. (2004). Power-Analysis Attack on an ASIC AES Implementation. In: Information Technology: Coding and Computing. Leuven, Belgium: IEEE.
  8. IEEE, Retrieved from http://iot.ieee.org/about.html on 05/01/2016.
  9. Gartner, Retreived from http://www.gartner.com/itglossary/internet-of-things/) on 05/01/2016.
  10. Cisco, Retreived from http://www.cisco.com/c/en/us/ solutions/internet-of-things/overview.html on 05/01/ 2016.
Download


Paper Citation


in Harvard Style

Eldred M., Alnoon H. and AlTamimi S. (2016). Cryptography Arbitration: Security Complexities of Cloud Enabled IoT in Europe and Beyond . In Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD, ISBN 978-989-758-183-0, pages 356-361. DOI: 10.5220/0005922103560361


in Bibtex Style

@conference{iotbd16,
author={Morgan Eldred and Hassan Alnoon and Sultan AlTamimi},
title={Cryptography Arbitration: Security Complexities of Cloud Enabled IoT in Europe and Beyond},
booktitle={Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD,},
year={2016},
pages={356-361},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005922103560361},
isbn={978-989-758-183-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD,
TI - Cryptography Arbitration: Security Complexities of Cloud Enabled IoT in Europe and Beyond
SN - 978-989-758-183-0
AU - Eldred M.
AU - Alnoon H.
AU - AlTamimi S.
PY - 2016
SP - 356
EP - 361
DO - 10.5220/0005922103560361