Affiliation:
1. Raj Kumar Goel Institute of Technology, Ghaziabad, India
Abstract
Secure communication protocols are paramount in ensuring the integrity, confidentiality, and availability of data in the interconnected landscapes of cloud computing and the internet of things (IoT). This comprehensive review explores the significance of these protocols, beginning with an introduction to cloud computing, IoT, and the challenges they pose to security. The exploration of security threats in both ecosystems lays the foundation for in-depth discussions on communication protocols tailored for Cloud and IoT environments. The review provides an exhaustive analysis of communication protocols for cloud security, including TLS/SSL and IPsec, unraveling their strengths, weaknesses, and use cases. Transitioning to IoT, the exploration delves into protocols such as MQTT and CoAP, evaluating their suitability across diverse IoT scenarios. Integration challenges in Cloud and IoT environments, real-world case studies, and emerging technologies like blockchain further enrich the discussion. Looking to the future, trends such as zero trust architecture and edge computing are examined, along with the potential impact of blockchain on security. Practical recommendations for implementing secure communication protocols and best practices for ongoing security in Cloud and IoT systems are presented. The conclusion underscores the critical role of secure communication protocols in navigating the evolving digital landscape.
Reference25 articles.
1. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
2. A survey of security in fog computing.;A.Armando;ACM Computing Surveys,2018
3. The Internet of Things: A survey
4. Internet of Things (IoT) for Cloud-based healthcare: A survey.;M. H.Chowdhury;Future Generation Computer Systems,2018
5. Cisco. (2018). Cisco Global Cloud Index: Forecast and Methodology, 2016–2021 White Paper. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/global-cloud-index-gci/white-paper-c11-738085.html
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Understanding Cybersecurity Threats in E-Commerce;Advances in Web Technologies and Engineering;2024-08-30