Figure 3 - uploaded by Ahmed Alenezi
Content may be subject to copyright.
Security requirements agreed by security experts 

Security requirements agreed by security experts 

Source publication
Article
Full-text available
The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction...

Contexts in source publication

Context 1
... conducting the interviews with the cloud security experts, the security requirements were reviewed and updated based on the context for securing the VM image in cloud computing. The definitions with which the interviewed experts agreed (as shown in Figure 3), are listed below: ...
Context 2
... conducting the interviews with the cloud security experts, the security requirements were reviewed and updated based on the context for securing the VM image in cloud computing. The definitions with which the interviewed experts agreed (as shown in Figure 3), are listed below: ...

Similar publications

Conference Paper
In this paper, we propose the integration of three technologies: mobile cloud, web services discovery and mobile agents. This allows wireless users to discover and execute enriched semantic web services. This is without the need for a simultaneous presence of the user. In addition, we will use the context information defining user and Web service....

Citations

... Validating the proposed risk estimation approach is essential to ensure its accuracy and acceptance. One of the most popular ways to validate a proposed technique is an expert review [40] . The use of the expert interviews allows collecting valid and reliable data that is related to the research to refine it in the light of opinions of well-qualified experts. ...
Article
The need to increase information sharing in the Internet of Things (IoT) applications made the risk-based access control model to be the best candidate for both academic and com- mercial organizations. Risk-based access control model carries out a security risk analysis on the access request by using IoT contextual information to provide access decisions dy- namically. Unlike current static access control approaches that are based on predefined policies and give the same result in different situations, this model provides the required flexibility to access system resources and works well in unexpected conditions and situa- tions of the IoT system. One of the main issues to implement this model is to determine the appropriate risk estimation technique that is able to generate accurate and realistic risk values for each access request to determine the access decision. Therefore, this paper pro- poses a risk estimation technique which integrates the fuzzy inference system with expert judgment to assess security risks of access control operations in the IoT system. Twenty IoT security experts from inside and outside the UK were interviewed to validate the proposed risk estimation technique and build the fuzzy inference rules accurately. The proposed risk estimation approach was implemented and simulated using access control scenarios of the network router. In comparison with the existing fuzzy techniques, the proposed technique has demonstrated it produces precise and realistic values in evaluating security risks of access control operations in the IoT context.
... The safety in the IoT system should be considered since a device may work safely in normal use, but if the device is hacked, the attacker will try to manipulate the functionality of the device causing harm to objects controlled by the device or compromise people approaching into contact with it [47]. ...
Chapter
Full-text available
The Internet of Things (IoT) represents a revolution of the Internet which can connect nearly all environment devices over the Internet to share their data to create novel services and applications for improving our quality of life. Using cheap sensors, the IoT enables various devices and objects around us to be ad-dressable, recognizable and locatable. Although the IoT brought infinite benefits, it creates several challenges, especially in security and privacy. Handling these is-sues and ensuring security and privacy for IoT products and services must be a fundamental priority. Users need to trust IoT devices and related services are se-cure. Moreover, the IoT safety must be considered to prevent the IoT system and its components from causing an unacceptable risk of injury or a physical damage and at the same time considering social behaviour and ethical use of IoT technol-ogies to enable effective security and safety. This chapter provides a discussion of IoT security, privacy, safety and ethics. It starts by providing an overview of the IoT system, its architecture and essential characteristics. This is followed by dis-cussing IoT security challenges, requirements and best practices to protect IoT devices. The IoT privacy is also discussed by highlighting various IoT privacy threats and solutions to preserve privacy of IoT devices. The IoT safety, ethics, the need for the ethical design and challenges encountered are also discussed. In the end, smart cities are introduced as a case study to investigate various security threats and suggested solutions to maintain a good security level in a smart city.
... Exploiting these vulnerabilities results in stealing user information and may put their lives in danger. Also, as IoT sensors are distributed in our surroundings which allow it to collect our sensitive information, marketing behavior, habits and other information which violates our privacy [76]. ...
Chapter
Blockchain technology is getting a growing attention from various organizations and researchers as it provides magical solutions to the problems associated with the classical centralized architecture. Blockchain, whether public or private, is a distributed ledger with the capability of maintaining the integrity of transactions by decentralizing the ledger among participating users. On the other hand, the Internet of Things (IoT) represents a revolution of the Internet which can connect nearly all environment devices over the Internet to share their data to create novel services and applications for improving our quality of life. Although the centralized IoT system provides countless benefits, it raises several challenges. Resolving these challenges can be done by integrating IoT with blockchain technology. To be prepared for the integration process, this chapter provides an overview of technical aspects of the blockchain and IoT. It started by reviewing blockchain technology and its main structure. Applications and challenges of the blockchain are also presented. This is followed by reviewing the IoT system by highlighting common architecture and essential characteristics. Various applications and challenges of the IoT system are also discussed.
Article
Full-text available
The information and communications technology time are essential for the security aspect of processes and methodologies. The security of information should a key priority in the secret exchange of information between two parties. That's to guarantee the information's security, some strategies are used, and they include steganography, watermark, and cryptography. In cryptography, the secrete message is converted into unintelligible text, but the existence of the secrete message is noticed, on the other hand, watermarking and steganography involve hiding the secrete message in a way that its presence cannot be noticed. Presently, the design and development of an effective image steganogra-phy system are facing several challenges such as low capacity, poor robustness and imperceptibility. To surmount these challenges, a new secure image steganography work called the Pixels Contrast (PC) method is proposed along with the eight neighbour's method and Huffman coding algorithm to overcome the imperceptibility and capacity issues. In the proposed method, a new image partitioning with a Henon map is used to increase the security part. This method has three main stages (preprocessing, embedding, and extracting) each stage has a different process. In this method, different standard images were used such as medical images and SIPI-dataset. The experimental result was evaluated with different measurement parameters like Histogram Analysis Structural Similarity Index (SSIM), Peak signal-to-noise ratio (PSNR). Compared the proposed method with the previous works then proved to be better than existing methods. In short, the proposed steganography method outperformed the commercially available data hiding schemes, thereby resolving the existing issues.
Book
Part I – Digital Twins and Smart Cities 1. The Convergence of Digital Twin, IoT and Machine Learning: Transforming Data into Action- Authors: Maninder Jeet Kaur, Ved P. Mishra, and Piyush Maheshwari 2. A Novel Approach Towards Enhancing the Quality of Life in Smart Cities using Clouds and IoT Based Technologies - Authors: Kamta Nath Mishra, and Chinmay Chakraborty 3. The Future of Mobility with Connected and Autonomous Vehicles in Smart Cities - Authors: Patrice Seuwou *, Ebad Banissi, and George Ubakanma 4. A Digital Twin Model for Enhancing Performance Measurement in Assembly Lines - Author: Christos I. Papanagnou 5. Information Sharing in Sustainable Value Chain Network (SVCN): The Perspective of Transportation in Cities - Author: Luai Jraisat 6. Healthcare in the Cyberspace: Medical Cyber-Physical System and Digital Twin Challenges – Authors: Jaime Ibarra Jimenez, Hamid Jahankhani, and Stefan Kendzierskyj Part II – Internet of Things, the Digital Twin Enabler 7. Present scenarios of IoT projects with security aspects focused - Authors: Aniruddha Bhattacharjya *, Xiaofeng Zhong, Jing Wang and Xing Li 8. IoT Security, Privacy, Safety and Ethics - Authors: Hany F. Atlam, and Gary B. Wills 9. CoAP - application layer connection-less lightweight protocol for the Internet of Things (IoT) and CoAP -IPSEC Security with DTLS Supporting CoAP - Authors: Aniruddha Bhattacharjya *, Xiaofeng Zhong, Jing Wang and Xing Li 10. Some computational considerations for kernel-based support vector machine - Authors: Mohsen Esmailbeigi, Alireza Daneshkhah*, and Omid Chatrabgoun 11. Secure Hybrid RSA (SHRSA) based multilayered authenticated, efficient and End to End secure 6-layered personal messaging communication protocol - Authors: Aniruddha Bhattacharjya *, Xiaofeng Zhong, Jing Wang and Xing Li