140
M. Bakro et al.
or as a result of malicious code or a malfunction in user applications or a third party
injected malicious data as invasion, or as a result of the immaturity of the multi-tenant
system supported by IoT platforms, whatever the reason this failure will lead to. A
dispute will happen between the customer and the provider and so on. So, security
remains the obsession for any user and the most important reason not to rely on the
cloud and IoT that related it, according to a study released by IDC, it has been found
that almost 88.5% of customers stay away from using the cloud for their important
data, and their primary reason for refusal that is the security of data, but it should be
noted that traditional internal servers are not more secure. For example: in the United
States, hackers hacked into the government network, that supposed to be safe and
difficult to penetrate, it should be remembered that more than 70% of attacks come
from within the organization while emphasizing that providing security in the cloud
is more difficult than the traditional system because of its being has different layers
and levels.
2
Basic Concepts
2.1
IoT Architecture
Before focusing on the cloud and its security issues in this chapter, we must know the
architecture of the Internet of Things that described in four components, as shown
in Fig. 1.
• Things: They are classified as uniquely recognizable nodes, primarily sensors or
actuators that communicate without human intervention using various methods
of connectivity.
• Gateway: serve as mid-layer between things and the cloud to provide security,
manageability, and the needed connectivity.
• Network infrastructure: This involves routers, aggregators, gateways, repeaters
and other equipment that monitor and secure data transfer.
• Cloud infrastructure: comprises vast pools of virtualized servers and storage that
are networked together with computational and analytical capability.
Fig. 1 IoT architecture [1]