Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cloud Security Research Based On The Internet of Things

Similar presentations


Presentation on theme: "Cloud Security Research Based On The Internet of Things"— Presentation transcript:

1 Cloud Security Research Based On The Internet of Things
Group 4 FAN Junzhou LIN Jiao

2 PART 01 The relationship between cloud computing and the Internet of Things PART 02 Security issues for the Internet of Things Catalog PART 03 Solution to cloud security problem in the IoT ------Alibaba cloud PART 04 Perspective -----Deep learning

3 01 The relationship between cloud computing and the IoT

4 The relationship between cloud and the IoT
Cloud is the control center like the brain. The IoT generates behaviors The benefits of applying the cloud flexible computing services improve the reliability of information processing

5 02 Security issues for the Internet of Things

6 Perception Network Security issues for the Internet of Things
Confidential information is stored and exchanged in cloud computing platform Application Information is easily to be eavesdropped and modified during the transmission. The nodes are vulnerable. The label information is simply encrypted.

7 4.Defenses against malicious attacks
3.Data recovery (high requirements) 1.Cloud data isolation 4.Defenses against malicious attacks ( e.g. DOS attacks ) 2.Cloud data processing (timely response &avoid data loss) The problem of cloud security

8 03 Solution to cloud security problem in the IoT ------Alibaba cloud

9 Automated monitoring system
Cloud data isolation Automated monitoring system Corresponding isolation mechanism. 1.Identity authentication technology (e.g. authentication based on security credentials) 2.Access Control Mechanism (Ali cloud sets permissions for resources tenants) 3.Optimized Encryption Technology (Guarantee the confidentiality & identification ) Malicious attack Cloud data processing 1.Intrusion detection operation (Identify abnormal behaviors& minimize resource consumption) 2.Defense mechanism (Integrate the firewall, advanced defense server to form network monitoring system) 3.Data repairing mechanism (User transparent) 1.Distributed data storage & redundant storage ( ensures data reliability) 2.Fast and accurate response (handing data in batches or in partitions.) 3.Method of rewriting(residual data problem) 4.Load balancing(High availability)

10 Automated monitoring system
Cloud data isolation Monitoring Corresponding isolation mechanism. 1.Identity authentication technology (e.g. Authentication based on security credentials) 2.Access Control Mechanism (Ali cloud sets permissions for resources tenants) 3.Optimized Encryption Technology (Guarantee the confidentiality & identification ) Automated monitoring system Malicious attack Cloud data processing 1.Intrusion detection operation (Identify abnormal behaviors& minimize resource consumption) 2.Defense mechanism (Integrate the firewall, advanced defense server to form a comprehensive defense system) 3.Data repairing mechanism (User transparent) 1.Distributed data storage & redundant storage ( Ensures data reliability) 2.Fast and accurate response (Handle data in batches or in partitions.) 3.Method of rewriting(residual data problem) 4.Load balancing(High availability)

11 04 Perspective -----Deep learning

12 01 In May 2017, the ransomware swept the world, which had caused enormous losses. 02 The ransomware occupies terminal equipment in the IoT and affects the normal operation, so the loss is even more serious. 03 More proactive defense mechanisms are needed. (Deep learning algorithm)

13 Combining deep learning algorithm with cloud security in the IoT
1.Intrusion detection Output the result Classification of software types Analyzing sample malware Extracting features Feature extraction Removing redundant information Data standardization Data processing Method applying deep learning algorithms Superiority Dealing with new threats Reduce the security cost Operating more accurately Traditional method Output the result Computer executes instructions based on features Manually enter sample features

14 e.g. tracking test higher accuracy but high requirements
2.Vulnerability mining Traditional methods e.g. tracking test higher accuracy but high requirements A story of Google Applying deep learning algorithm  Improve mining speed  Suitable for complex environment  Not flexible as manual work Combing the artificial vulnerability analysis with deep learning algorithm to further optimize the IoT cloud security system.

15 Reference [1] Help.aliyun.com. (2017)阿里云数据安全白皮书_信任中心-阿里云. [online] Available at: [Accessed 1 Nov. 2017] [2]Security and Privacy for Cloud-Based IoT: Challenges Zhou, Jun ; Cao, Zhenfu ; Dong, Xiaolei ; Vasilakos, Athanasios V.IEEE Communications Magazine, January 2017, Vol.55(1),pp.26-33[Peer Reviewed Journal] [3] Cloud security issues and challenges: A survey Singh, Ashish ; Chatterjee, Kakali Journal of Network and Computer Applications, 1 February 2017, Vol.79, pp [Peer Reviewed Journal] [4]En.wikipedia.org. (2017). Cloud computing. [online] Available at: [Accessed 13 Nov. 2017]. [5]Jiang, Z. and Liu, B. (2012). The Security Threats and Risk Analysis of Cloud Computing. Ph.D. Graduate of University. [6]Yang, J., Wang, H., Wang, J. and Yu, D. (2012). Survey on some Security Issues of Cloud Computing. Journal of Chinese Computer System, 33(3), p.8

16 Thank you!


Download ppt "Cloud Security Research Based On The Internet of Things"

Similar presentations


Ads by Google