Yazar "Erol-Kantarci, Melike" seçeneğine göre listele
Listeleniyor 1 - 2 / 2
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Anomaly detection and privacy preservation in Cloud-Centric Internet of Things(Ieee, 2015) Bütün, İsmail; Kantarci, Burak; Erol-Kantarci, MelikeInternet of Things (IoT) concept provides a number of opportunities to improve our daily lives while also creating a potential risk of increasing the vulnerability of personal information to security and privacy breaches. Data collected from IoT is usually offloaded to the Cloud which may further leave data prone to a variety of attacks if security and privacy issues are not handled properly. Anomaly detection has been one of the widely adopted security measures in wired and wireless networks. However, it is not straight forward to apply most of the anomaly detection techniques to IoT and cloud. One of the main challenges is deriving outlier features from the vast volume of data pumped from IoT to the cloud. Other challenges include the large number of sources generating data, heterogenous connectivity and traffic patterns of IoT devices, cloud services being offered at geographically remote places and causing IoT data to be stored in different countries with different legislations. This paper, for the first time, presents the challenges and opportunities in anomaly detection for IoT and cloud. It first introduces the prominent features and application fields of IoT and Cloud, then discusses security and privacy risks to personal information and finally focuses on solutions from anomaly detection perspective.Öğe Cloud-Centric Multi-Level Authentication as a Service for Secure Public Safety Device Networks(Ieee-Inst Electrical Electronics Engineers Inc, 2016) Bütün, İsmail; Erol-Kantarci, Melike; Kantarci, Burak; Song, HoubingWith the advances in IoT, future public safety responders will be well armed with devices that pump data between on-site responders and command centers, carrying useful information about the event scene, the status of a mission, and helping critical decisions to be made in real time. In addition, wearable and on-body sensors will monitor the vital signals and well being of the responders. These connected devices or the so-called IoT surrounding public safety responders generate highly vulnerable data, where security breaches may have life threatening consequences. Authentication of responder devices is essential in order to control access to public safety networks. Most of the existing authentication schemes do not scale well with the large number of devices of IoT, and are not fast enough to work during time-critical public safety missions. On the other hand, for general IoT services, cloud-based solutions provide unlimited resources for storing and accessing IoT data. However, the cloud may have some implications for sensitive data that are collected for public safety. Therefore, authentication solutions are desired to integrate well into the cloud environment. In this article, we propose cloud-centric, multi-level authentication as a service approach that addresses scalability and time constraints, and demonstrate its effectiveness. We draw future research directions for secure public safety networks in the presence of IoT devices and the cloud.