Chapter 8 IoT cloud security in digital transformation

Document Type

Book Chapter

Source of Publication

Accelerating Digital Transformation with the Cloud and the Internet of Things (IoT)

Publication Date

1-1-2025

Abstract

The convergence of IoT with cloud computing has catalyzed a paradigm shift across various industries, propelling businesses towards a future rich with intelligent, interconnected devices. However, this transformative journey is intertwined with the challenge of ensuring robust security, a task that becomes increasingly complex given the expanded attack surface and the intricate nature of data governance in IoT-cloud integrations. This chapter offers insightful lessons on the vulnerabilities prevalent in the IoT-cloud landscape. Some real-world incidents are illustrated to underscore the diverse threats, ranging from data breaches and service disruptions to physical and reputational damages. The foundational elements of information security in IoT-cloud systems are presented, covering vulnerabilities, threats, cyber attacks, and risk evaluation. The significance of regular vulnerability assessments as necessities of comprehensive threat modeling are emphasized. The chapter also discusses the importance of IoT device software and firmware maintenance, particularly highlighting Over-the-air (OTA) updates as key in addressing security concerns. Similarly, the paramount importance of adhering to regulatory compliance and security standards is stressed. The discussion extends to best practices for IoT-cloud security, including risk evaluation, the implementation of security protocols, and the need for continuous monitoring and updating to adapt to emerging threats. Proactive mitigation strategies, which highlight preemptive measures to safeguard interconnected IoT and cloud environments, are also discussed. Finally, a series of case studies that showcase real-world instances where organizations have successfully implemented those mitigation strategies are illustrated.

ISBN

9780443222177

Publisher

Elsevier

First Page

219

Last Page

251

Disciplines

Computer Sciences

Keywords

IoT security, cloud computing, data governance, vulnerability assessments, risk evaluation

Indexed in Scopus

no

Open Access

no

Share

COinS