IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-Oriented Applications

Fei Chen*, Duming Luo, Tao Xiang, Ping Chen, Junfeng Fan, Linh Truong

*Corresponding author for this work

Research output: Contribution to journalReview Articlepeer-review

776 Downloads (Pure)

Abstract

Recent years have seen the rapid development and integration of the Internet of Things (IoT) and cloud computing. The market is providing various consumer-oriented smart IoT devices; the mainstream cloud service providers are building their software stacks to support IoT services. With this emerging trend even growing, the security of such smart IoT cloud systems has drawn much research attention in recent years. To better understand the emerging consumer-oriented smart IoT cloud systems for practical engineers and new researchers, this article presents a review of the most recent research efforts on existing, real, already deployed consumer-oriented IoT cloud applications in the past five years using typical case studies. Specifically, we first present a generalmodel for the IoT cloud ecosystem. Then, using the model, we reviewand summarize recent, representative research works on emerging smart IoT cloud system security using 10 detailed case studies, with the aim that the case studies together provide insights into the insecurity of current emerging IoT cloud systems. We further present a systematic approach to conduct a security analysis for IoT cloud systems. Based on the proposed security analysis approach, we reviewand suggest potential security riskmitigationmethods to protect IoT cloud systems. We also discuss future research challenges for the IoT cloud security area.

Original languageEnglish
Article number75
Number of pages36
JournalACM COMPUTING SURVEYS
Volume54
Issue number4
DOIs
Publication statusPublished - Jul 2021
MoE publication typeA2 Review article in a scientific journal

Fingerprint

Dive into the research topics of 'IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-Oriented Applications'. Together they form a unique fingerprint.

Cite this