Chapter 8 IoT cloud security in digital transformation
Document Type
Book Chapter
Source of Publication
Accelerating Digital Transformation with the Cloud and the Internet of Things (IoT)
Publication Date
1-1-2025
Abstract
The convergence of IoT with cloud computing has catalyzed a paradigm shift across various industries, propelling businesses towards a future rich with intelligent, interconnected devices. However, this transformative journey is intertwined with the challenge of ensuring robust security, a task that becomes increasingly complex given the expanded attack surface and the intricate nature of data governance in IoT-cloud integrations. This chapter offers insightful lessons on the vulnerabilities prevalent in the IoT-cloud landscape. Some real-world incidents are illustrated to underscore the diverse threats, ranging from data breaches and service disruptions to physical and reputational damages. The foundational elements of information security in IoT-cloud systems are presented, covering vulnerabilities, threats, cyber attacks, and risk evaluation. The significance of regular vulnerability assessments as necessities of comprehensive threat modeling are emphasized. The chapter also discusses the importance of IoT device software and firmware maintenance, particularly highlighting Over-the-air (OTA) updates as key in addressing security concerns. Similarly, the paramount importance of adhering to regulatory compliance and security standards is stressed. The discussion extends to best practices for IoT-cloud security, including risk evaluation, the implementation of security protocols, and the need for continuous monitoring and updating to adapt to emerging threats. Proactive mitigation strategies, which highlight preemptive measures to safeguard interconnected IoT and cloud environments, are also discussed. Finally, a series of case studies that showcase real-world instances where organizations have successfully implemented those mitigation strategies are illustrated.
DOI Link
ISBN
9780443222177
Publisher
Elsevier
First Page
219
Last Page
251
Disciplines
Computer Sciences
Keywords
IoT security, cloud computing, data governance, vulnerability assessments, risk evaluation
Recommended Citation
Atif, Yacine and Mathew, Sujith Samuel, "Chapter 8 IoT cloud security in digital transformation" (2025). All Works. 7145.
https://zuscholars.zu.ac.ae/works/7145
Indexed in Scopus
no
Open Access
no