With regard to Cloud Computing, although emerging and developing the cloud computing rapidly both conceptually and in reality, But the legal / contractual, economic, service quality, interoperability, security and privacy issues still form significant challenges.
There are three IoT security challenges :
1. A trillion points of vulnerability
Every single device and sensor in the IoT represents a potential risk. How confident can an organisation be that each of these devices have the controls in place to preserve the confidentiality of the data collected and the integrity of the data sent.
2. Trust and data integrity
Corporate systems will be bombarded by data from all manner of connected sensors in the IoT, Security must be built into the design of these devices and systems to create trust in both the hardware and integrity of the data.
3. Data collection, protection and privacy
The vision for the IoT is to make our everyday lives easier and boost the efficiency and productivity of businesses and employees. The data collected will help us make smarter decisions. But this will also have an impact on privacy expectations. If data collected by connected devices is compromised it will undermine trust in the IoT. We are already seeing consumers place higher expectations on businesses and governments to safeguard their personal information.
because data is distributed over the number of regions it is difficult to find their location.
Integrity
The system should keep security for example; the data just can be modified by the authorized person.
Access
it is referring to the data security policies. for example, the employees in their organization offer an access to the section of data based on the company security policies.
Confidentiality
Data can be stored by the cloud users on remote servers, and the users should know about which data is stored and its accessibility.
Storage
one of an important issue is the reliability of data storage.the need of Virtual machines to store data in a physical infrastructure may cause a security risk
In addition of what has mentioned above the equipment's standardization is a critical issue it changes rapidly as the main internet revolution progress.
We are as of now observing purchasers put higher desires on organizations and governments to protect their own data. The vision for the IoT is to make our regular daily existences less demanding and help the proficiency and profitability of organizations and workers. On the off chance, that information gathered by associated gadgets is bargained it will undermine confide in the IoT. Corporate frameworks will be assaulted by information from all way of associated sensors in the IoT, Security must be incorporated with the outline of these gadgets and frameworks to make confide in both the equipment and uprightness of the information. How sure can an association be that each of these gadgets has the controls set up to safeguard the secrecy of the information gathered and the respectability of the information sent?
The Challenges in the Security of Cloud-supported IoT:
1- Secure communications: Secrecy to prevent eavesdropping and data leakage, and integrity to protect data from corruption/interference.
2- Access controls for IoT-Cloud: External access to cloud resources should be regulated by access controls to govern the actions that may be taken on objects, issuing a query, performing some computation, etc.
3- Identifying sensitive data: Data will encapsulate various aspects of the physical environment, including highly personal information about individuals, groups and companies, and can also have physical consequences.
4- Cloud architectures: Public, private or hybrid, where particularly sensitive, there may be decisions to prevent data being placed on a public cloud.
5- In-cloud data protection: This concerns the cloud provider protecting data within their service, by preventing data leakage during transmission, processing; and storing in the cloud.
6- Encryption by ‘things’: ‘Things’ (users and tenants) could encrypt data before uploading to the cloud to prevent the provider having access to intelligible data; prevent the provider being forced to disclose intelligible data to others, ensure protection against the provider leaking data; deal with differences in sensitivity for different data items; protect data while in transit.
7- Malicious ‘things’ protection of provider: The cloud provider will maintain various access, and other controls, to protect against specific attacks.
8- Malicious ‘things’ protection of others: Cloud improved security across the IoT ecosystem since it operates as a mediator and coordinator between ‘things’,
9- Trustworthiness of cloud services: Trust placed in a cloud service provider is much needed to secure service, ensure it is correctly configured, report issues, and use data only for the intended purposes.
10- Impact of cloud decentralization on security. The concept of the decentralized cloud raises interesting security consideration.
In general, IoT could be combined with the unlimited capabilities (virtually) of the Could Computing to benefit from its technological constraints such as processing, storage and communication. Also, Cloud Computing could benefit from the IoT, by extending its scope to include the real world in more distributed environment; In order to deliver new services with many scenarios. On the other hand, CloudIoT would be hard to implement due to the complex scenarios of the applications that waving in the research area. For instance, security and privacy issues would arise due to the fact that there would be no trust in the service provider. Such a distributed system is more exposed to be attacked in many ways such as hijacking, session riding, SQL injection and many more possible attacks. In addition, Heterogeneity is a big challenge; thinking about the variety of Operating Systems, Devices, Platforms and application’s services. Performance is another problem with CloudIoT, because it requires some capabilities to provide specific Quality of Service. When thinking about the huge number of events that occurs in our lives, we must consider the huge amount of data that would be recorded. So, at the end there would be a big data problem to be processed. Finally, sensor networks as the main attribute in the IoT needs for an infrastructure to enable it to measure and infer in order to deal with the indications.