Affiliation:
1. Universidade da Beira Interior and Instituto de Telecomunicações, Portugal
Abstract
Over the years, pervasive computing and communication technologies have enabled the emergence of new computing paradigms that have gained importance across a wide spectrum of domains. The three most notable that have witnessed significant advancements and have a solid track record of exponential growth in diverse applications are the Internet of Things (IoT), Cloud, and Mobile Computing. The ubiquity of these paradigms, their expandability, and applicability in different problem spaces have made them invaluable in modern computing solutions. Security becomes a real concern, especially when it comes to the development of applications in these environments, as numerous security issues may arise from potential design flaws. Secure application development across these three technologies can only be achieved when applications and systems are designed and developed with security in mind. This will improve the quality of the solutions and ensure that vulnerabilities are identified. It will also help in defining countermeasures against cyberattacks or mitigate the effects of potential threats to the systems. This article surveys existing approaches, tools, and techniques for attack and system modeling applicable to IoT, Cloud computing, and Mobile Computing. It also evaluates the strengths and limitations of the reviewed approaches and tools, from which it highlights the main existing challenges and open issues in the area.
Funder
European Regional Development Fund
Fundação para a Ciência e a Tecnologia
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Reference122 articles.
1. Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved
2. U.S. Food 8 Drug Administration. 2017. Firmware Update to Address Cybersecurity Vulnerabilities Identified in Abbott’s (formerly St. Jude Medical’s) Implantable Cardiac Pacemakers: FDA Safety Communication. https://www.fda.gov/medical-devices/safety-communications/firmware-update-address-cybersecurity-vulnerabilities-identified-abbotts-formerly-st-jude-medicals. U.S. Food 8 Drug Administration. 2017. Firmware Update to Address Cybersecurity Vulnerabilities Identified in Abbott’s (formerly St. Jude Medical’s) Implantable Cardiac Pacemakers: FDA Safety Communication. https://www.fda.gov/medical-devices/safety-communications/firmware-update-address-cybersecurity-vulnerabilities-identified-abbotts-formerly-st-jude-medicals.
3. Jumping the Air Gap
4. A survey on smartphones security: Software vulnerabilities, malware, and attacks;Ahvanooey Milad Taleby;Int. J. Adv. Comput. Sci. Appl,2017
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Data Security in Cloud Computing Using Maritime Search and Rescue Algorithm;2024 Third International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN);2024-07-18
2. Expediting the design and development of secure cloud-based mobile apps;International Journal of Information Security;2024-07-04
3. Fortifying Cloud Data Security with the Maritime Search and Rescue Algorithm;2024 Second International Conference on Data Science and Information System (ICDSIS);2024-05-17
4. Wearable Devices for Monitoring and Management of Heart Failure (Preprint);2024-05-02
5. IIoT Intrusion Detection using Lightweight Deep Learning Models on Edge Devices;2024 IEEE 20th International Conference on Factory Communication Systems (WFCS);2024-04-17