140

M. Bakro et al.

or as a result of malicious code or a malfunction in user applications or a third party

injected malicious data as invasion, or as a result of the immaturity of the multi-tenant

system supported by IoT platforms, whatever the reason this failure will lead to. A

dispute will happen between the customer and the provider and so on. So, security

remains the obsession for any user and the most important reason not to rely on the

cloud and IoT that related it, according to a study released by IDC, it has been found

that almost 88.5% of customers stay away from using the cloud for their important

data, and their primary reason for refusal that is the security of data, but it should be

noted that traditional internal servers are not more secure. For example: in the United

States, hackers hacked into the government network, that supposed to be safe and

difficult to penetrate, it should be remembered that more than 70% of attacks come

from within the organization while emphasizing that providing security in the cloud

is more difficult than the traditional system because of its being has different layers

and levels.

2

Basic Concepts

2.1

IoT Architecture

Before focusing on the cloud and its security issues in this chapter, we must know the

architecture of the Internet of Things that described in four components, as shown

in Fig. 1.

Things: They are classified as uniquely recognizable nodes, primarily sensors or

actuators that communicate without human intervention using various methods

of connectivity.

Gateway: serve as mid-layer between things and the cloud to provide security,

manageability, and the needed connectivity.

Network infrastructure: This involves routers, aggregators, gateways, repeaters

and other equipment that monitor and secure data transfer.

Cloud infrastructure: comprises vast pools of virtualized servers and storage that

are networked together with computational and analytical capability.

Fig. 1 IoT architecture [1]