Cybersecurity Challenges in IoT Cloud Systems

Authors

Keywords:

IoT cloud systems, Cybersecurity challenges, Device authentication, Data integrity, Privacy, Network security, DDoS attacks

Abstract

The swift growth of the Internet of Things (IoT) has resulted in the integration of IoT devices with cloud computing, creating IoT cloud systems. Although this merger provides improved data storage, real-time analytics, and scalability, it also brings about significant cybersecurity challenges. This paper investigates the specific security vulnerabilities present in IoT cloud systems, concentrating on issues related to device authentication, data integrity, privacy, and network security. Additionally, it analyzes how the limited resources of IoT devices intensify these vulnerabilities, making them more prone to attacks such as Distributed Denial of Service (DDoS), data breaches, and malware attacks. By reviewing existing security protocols and new technologies, this research emphasizes the necessity for stronger security frameworks to safeguard IoT cloud ecosystems. Suggested approaches, including encryption methods, sophisticated authentication strategies, and AI-driven threat detection, are evaluated for their efficacy in reducing risks and ensuring secure data transmission. This study offers a thorough overview of the cybersecurity environment in IoT cloud systems, with the goal of informing future research and policy-making in this vital field.

References

Siddhartha, V., Gaba, G. S., & Kansal, L. (2020). A lightweight authentication protocol using implicit certificates for securing IoT systems. Procedia computer science, 167, 85–96. https://doi.org/10.1016/j.procs.2020.03.185

Alluhaidan, A., & Prabu, P. (2023). End-to-end encryption in resource-constrained IoT device. IEEE access, 99(1). http://dx.doi.org/10.1109/ACCESS.2023.3292829

Li, D., Peng, W., Deng, W., & Gai, F. (2018). A blockchain-based authentication and security mechanism for IoT. http://dx.doi.org/10.1109/ICCCN.2018.8487449

Goad, D., Collins, A., & Gal, U. (2020). Privacy and the internet of things – an experiment in discrete choice. Information & management, 58, 103292. http://dx.doi.org/10.1109/ACCESS.2023.3292829

Dwork, C. (2006). Differential privacy. Proceedings of the 33rd international conference on automata, languages and programming - volume part II (pp. 1–12). Berlin, Heidelberg: Springer-Verlag. https://doi.org/10.1007/11787006_1

Husnoo, M. A., Anwar, A., Chakrabortty, R., Doss, R., & Ryan, M. (2021). Differential privacy for IoT-enabled critical infrastructure: A comprehensive survey. IEEE access, 99(1), 1. https://doi.org/10.1007/11787006_1

Mohapatra, H., Mohanta, B. K., Nikoo, M. R., Daneshmand, M., & Gandomi, A. H. (2023). MCDM-based routing for iot-enabled smart water distribution network. IEEE internet of things journal, 10(5), 4271–4280. https://doi.org/10.1109/JIOT.2022.3216402

Ren, W., Tong, X., Du, J., Wang, N., Li, S., Min, G., & Zhao, Z. (2021). Privacy enhancing techniques in the internet of things using data anonymisation. Information systems frontiers, 1–12. https://doi.org/10.1007/s10796-021-10116-w

Abomhara, M., Køien, G., & Alghamdi, M. (2021). Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks.

Gyamfi, E., & Jurcut, A. (2022). Intrusion detection in internet of things systems: A review on design approaches leveraging multi-access edge computing, machine learning, and datasets. Sensors, 22(10). https://doi.org/10.3390/s22103744

Alrajhi, A. (2020). A survey of artificial intelligence techniques for cybersecurity improvement. International journal of cyber-security and digital forensics, 9, 34–41. http://dx.doi.org/10.17781/P002650

Saxena, S., Bhushan, B., & Ahad, M. A. (2021). Blockchain based solutions to secure IoT: Background, integration trends and a way forward. Journal of network and computer applications, 181, 103050. https://doi.org/10.1016/j.jnca.2021.103050

Published

2025-03-27

How to Cite

Cybersecurity Challenges in IoT Cloud Systems. (2025). Risk Assessment and Management Decisions, 2(1), 47-54. https://ramd.reapress.com/journal/article/view/48

Similar Articles

11-16 of 16

You may also start an advanced similarity search for this article.