Abstrakt: |
In current times, devices are connected over the internet to make our life simpler without our actual involvement. This connectivity's backbone is an advanced technology that plays a protagonist in this networking world through material objects embedded in RFID form. Technology that we will deep dive into is IoT, and the other one to enhance this is cloud computing. The cloud of things has completely driven our lives in this ubiquitous computing world, whether it is computing, networking and, storage. This purpose can be achieved easily by pay as per usage and that too on-demand basis. Unfortunately, when the users and IoT devices continuously share networking resources and computing remotely, it projects security issues. Therefore, preserving data policies is highly important in this environment. In this research paper, the prime focus is on critical risk, i.e., security and privacy issues, by analyzing potential challenges and security issues that are yet to be resolved. This technology is our future and therefore getting more attention on the security part. Thus, it requires the deployment of high-end security and policies which can ensure confidentiality of the data, authentication of devices, managing and monitoring the access point, and integrity of the network. [ABSTRACT FROM AUTHOR] |