- Open Access
- Total Downloads : 16
- Authors : Ujwala Kini H, Tejaswini
- Paper ID : IJERTCONV6IS13027
- Volume & Issue : NCESC – 2018 (Volume 6 – Issue 13)
- Published (First Online): 24-04-2018
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Internet of Things (IoT) A Gateway for Smarter Life
Ujwala Kini H Tejaswini
Department of Electronics and Department of Electronics and Communication and Communication
GSSS Institute of Engineering GSSS Institute of Engineering
and Technology for Women and Technology for Women Mysuru Mysuru
Abstract:- Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unavoidable for anyone. The form of communication that we see now is either human-human or human-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-machine (M2M).
Internet of Things(IoT) is the network of physical objects- devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data. The internet of things allows objects to be sensed and controlled remotely across existing network infrastructure .
This paper contains the summary of IoT based service models which are helpful for academic and industrial world to understand IoT business and it aims to provide a comprehensive overview of the IoT scenario and reviews its enabling technologies and the sensor networks. Also, it describes a six-layered architecture of IoT and points out the related key challenge.
Keywords:- Internet of Things(IoT), IoT Vision,IoT architecture, RFID, WSN, IoT applications, IoTsecurity.
With the continuous advancement in technology a potential innovation, IoT is coming down the road which is burgeoning as an ubiquitous global computing network where everyone and everything will be connected to the Internet .
The definition for Internet of Things would be:
An open and comprehensive network of intelligent objects that have the capacity to auto-organize, share information, data and resources, reacting and acting in face of situations and changes in the environment .
IoT is continually evolving and is a hot research topic where opportunities are infinite and imaginations are boundless which have put it on the verge of reshaping the current form of internet into a modified and integrated version. The number of devices availing internet services is increasing every day and having all of them connected by wire or wireless will put a powerful source of information
at our finger tips. IoT, as you can guess by its name, is the approach of converging data obtained from different kinds of things to any virtual platform on existing Internet infrastructure .
The concept of IoT dates back to 1982 when a modified coke machine was connected to the Internet which was able to report the drinks contained and that whether the drinks were cold . Later, in 1991, a contemporary vision of IoT in the form of ubiquitous computing was first given by Mark Weiser . However in 1999, Bill Joy gave a clue about Device to Device communication in his taxonomy of internet . In the very same year, Kevin Ashton proposed the term, Internet of Things to describe a system of inter- connected devices .
The basic idea of IoT is to allow autonomous exchange of useful information between invisibly embedded different uniquely identifiable real world devices around us, with technologies like Radio-Frequency IDentification (RFID) and Wireless Sensor Networks (WSNs) which are sensed by the sensor devices and further processed for decision making, on the basis of which an automated action is performed .
Fig 1: Expected penetration of connected objects by the year 2020, according to Cisco
An article published in Network World revealed IoT strategies of top IT vendors, they carried out some interviews from the key IT vendors. As of HPs vision,
they see a world where people are always connected to their content. Cisco believes in the industrial automation and convergence of operational technology. Intel focusedonempoweringbillionsofexistingdeviceswithintellig ence. Microsoft does not consider IoT as any futuristic technology but they believe that it already exists in todays powerful devices and that thedevicesjustneedtobeconnectedforalargeamountofinforma tion which could be helpful. While, IBM has a vision of a Smarter Planetbyremotelycontrollingthedevicesviasecured servers .
Despite of having different visions, they all agree about a network of interconnected devices therefore more developments within the coming decades are expected to be seen including that of a new converged information society .
More than 25 Billion things are expected to be connected by 2020whichisahugenumbersotheexistingarchitectureofInterne t with TCP/IP protocols, adopted in 1980 , cannot handle a
networkasbigasIoTwhichcausedaneedforanewopenarchitect ure that could address various security and Quality of Service (QoS) issues as well as it could support the existing network applications usingopenprotocol .Withoutaproperprivacyassurance,IoT is not likely to be adopted by many. Therefore protection of data and privacy of users are key challenges for IoT.
Forfurther developmentofIoT,anumberofmulti- layeredsecurity architectures are proposed.  described a three key level architecture of IoT while  described a four key level architecture.  proposed a ve layered architecture using the best features of the architectures of Internet and Telecommunication management networks based on TCP/IP and TMN models respectively. Similarlyasix- layeredarchitecturewasalsoproposedbasedonthenetwork hierarchical structure . So generally its divided into six layers as shown in the Figure 2.
Fig 2: Six-Layered Architecture of IoT
CodinglayeristhefoundationofIoTwhichprovidesidenticati on to the objects of interest. In this layer, each object is assigned a unique ID which makes it easy to discern the objects .
This is the device layer of IoT which gives a physical meaning to
eachobject.ItconsistsofdatasensorsindifferentformslikeRFI D tags, IR sensors or other sensor networks which could sense the temperature, humidity, speed and location etc of the objects. This layer gathers the useful information of the objects from the sensor devices linked with them and converts the information into digital signals which is then passed onto the Network Layer for further action .
The purpose of this layer is receive the useful information in the form of digital signals from the Perception Layer and transmit it to the processing systems in the Middleware Layer through the transmission mediums like WiFi, Bluetooth, WiMaX, Zigbee, GSM, 3G etc with protocols like IPv4, IPv6, MQTT, DDS etc .
This layer processes the information received from the sensor devices. It includes the technologies like Cloud computing, Ubiquitous computing which ensures a direct access to the database to storeallthenecessaryinformationinit.UsingsomeIntelligentPr ocessing Equipment, the information is processed and a fully automated action is taken based on the processed results of the information .
This layer realizes the applications of IoT for all kinds of industry, based on the processed data. Because applications promote the development of IoT so this layer is very helpful in the large scale development of IoT network. The IoT related applications could be smart homes, smart transportation, smart panet etc.
This layer manages the applications and services of IoT and is responsible for all the research related to IoT. It generates different business models for effective business strategies.
Microwave Frequency (2.4G, 5.80)
The different transmission medium which can be used in Network layer is shown in Figure 4
The development of a ubiquitous computing system where digital objects can be uniquely identied and can be able to think and interact with other objects to collect data on the basis of which automated actions are taken, requires the need for a combination of new and effective technologies which is only possible through an integration of different technologies which can make the objects to be identied and communicate with each other. In this section therelevanttechnologiesthatcanhelpinthelarge-scale development of IoT are discussed.
RFID is the key technology for making the objects uniquely identiable. Its reduced size and cost makes it integrable into any object.Itisatransceivermicrochipsimilartoanadhesivesticker which could be both active and passive, depending on the type of application . Active tags have a battery attached to them due to which they are always active and therefore continuously emit the data signals while Passive tags just get activated when they are triggered.ActivetagsaremorecostlythanthePassivetagshowe ver they have a wide range of useful applications. RFID system is
composedofreadersandassociatedRFIDtagswhichemittheide ntication, location or any other specics about the object, on gettingtriggeredbythegenerationofanyappropriatesignal
.The emitted object related data signals are transmitted to the Readers using radio frequencies which are then passed onto the processors to analyse the data.
Fig 3: RFID Scenario
Dependingonthetypeofapplication,RFIDfrequenciesaredivi ded into four different frequencies ranges , which are given below:
Low frequency (135 KHz or less)
High Frequency (13.56MHz)
Ultra-High Frequency (862MHz 928MHz)
Fig 4: Transmission Medium
Wireless Sensor Network(WSN)
WSNisabi- directionalwirelesslyconnectednetworkofsensorsin a multi- hop fashion, built from several nodes scattered in a sensor eldeachconnectedtooneorseveralsensorswhichcancollectth e object specic data such as temperature, humidity, speed etc and then pass on to the processing equipment . The sensing nodes communicate in multi-hop. Each sensor is a transceiver having an antenna,amicro- controllerandaninterfacingcircuitforthesensors as a communication, actuation and sensing unit respectively along with a source of power which could be both battery or any energy harvestingtechnology. However hasproposedanadditional unit for saving the data, named as Memory Unit which could also be a part of the sensing node. A typical sensing node is shown Figure 5
Wireless Sensors Network technology and RFID technology when combined together opens up possibilities for even more smart devices,forwhichanumberofsolutionshavebeenproposed
.An examplesolutionisprovidedbytheIntelResearchLabsinthefor m
ofWirelessIdenticationSensingPlatform(WISP).WISP isa passivewirelesssensornetworkwithbuilt- inlight,temperatureand many other sensors . Both WSN and RFID Sensor Networks have their own advantages but RFID Sensor Networks have a low range and their communication is Asymmetric while WSNs have a comparatively longer range and their communication is Peer-toPeer. Moreover most of the WSNs are based on the IEEE 802.15.4
standard,whichspeciesthePhysicalandMAClayerofLowRat e Wireless Personal Area Networks (LR-WPANs) .
Fig 5: Sensor Node
ThetechnologiesthatenablestheintegrationofWSNwiththeIo T areahot research topic,manysolutionshavebeenproposedforthat includingthatofa6LoWPANstandard,thatallowsIPv6pac ketstobetransmittedthroughthenetworksthatarecomputation ally restricted.AlsotheresROLLroutingstandardforend-to- endrouting solutions .
With millions of devices expected to come by 2020, the cloud seems to be the only technology that can analyse and store all the data effectively. It is an intelligent computing technology in which number of servers are converged on one cloud platform to allow sharing of resources between each other which can be accessed at anytimeandanyplace. Cloudcomputingisthemostimportant partofIoT,whichnotonlyconvergestheserversbutalsoprocess es on an increased processing power and analyses the useful information obtained from the sensors and even provide good storage capacity. Cloud computing interfaced with smart objects using potentially millions of sensors can be of enormous benets and can help IoT for a very large scale development.
Fig 6: A Typical Cloud Computing Scenario
These technologies have an important role in the success of IoT since they are responsible for the connection between the objects, sothere is a needforfastandan effective networktohandlealargenumber ofpotentialdevices.Forwide- rangetransmissionnetworkcommonly used are 3G, 4G etc. but as everyone knows, mobile trafc is so much predictable since it only has to perform the usual tasks like
making acall,sendingatextmessageetc. Sosteppingintothismodernera of ubiquitous computing, it will not be predictable anymore which callsforaneedofasuper-fast,super-efcient sixth generation, seventh generation
wirelesssystemwhichcouldofferalotmore bandwidth.Similarly for a short-range communication network we use technologies like Bluetooth, WiFietc
NanoTechnologies Thistechnologyrealizessmallerandimprovedversionofthethi ngs that are interconnected. It can decrease the consumption of a system by enabling the development of devices in nano meters scale which can be used as a sensor and an actuator just like a normal device. Such a nano device is made from nano components and the resulting network denes a new networking paradigm which is Internet of Nano-Things .
MEMS are a combination of electric and mechanical components working together to provide several applications including sensing and actuating which are already being commercially used in many eld in the form of transducers and accelerometers etc. MEMS combined with Nano technologies are a cost-effective solution for improvising the communication system of IoT and other advantages like size reduction of sensors and actuators, integrated ubiquitous computingdevices and higher range of frequencies etc .
RapiddevelopmentsintheeldofOpticaltechnologiesinthefor m of technologies like Li-Fi and Ciscos BiDi optical technology could be a major breakthrough in the development of IoT. Li-Fi, anepoch- makingVisibleLightCommunication(VLC)technology, will provide a great connectivity on a higher bandwidth for the objectsinterconnectedonthe concept ofIoT.SimilarlyBi- Directional (BiDi) technology gives a 40G ethernet for a big data from multifarious devices of IoT .
Most of the daily life applications normally, are already smart but they are unable to communicate with each other and enabling them to communicate with each other and share useful information with each other will create a wide range of innovative applications. These emerging applications with some autonomouscapabilitieswouldcertainlyimprovethequalityof our lives.Afewofsuchapplicationsarealreadyinthe market,lets taketheexampleoftheGoogleCarwhichisaninitiativetoprovid e aself-drivingcarexperiencewithreal- timetrafc,roadconditions, weather and other information exchanges all due to the concept of IoT . In this section, few of the IoT applications are presented.
5.1 Smart Trafc System
Trafc is an importat part of a society therefore all the related problems must be properly addressed. There is a need for a system that can improve the trafc situation based on the trafc information obtained from objects
using IoT technologies . For such an intelligent trafc monitoring system, realization of a proper system for automatic identication of vehicles and other trafc factors is very important for which we need IoT technologies instead of using common image processing methods.Theintelligenttrafcmonitoringsystemwillprovide a good transportation experience by easing the congestion.
It will provide features like
theft-detection, reporting of trafc accidents, less environmental pollution. The roads of this smart city will give diversions with climatic changes or unexpected trafc jams due to which driving and walking routes will be optimized. The trafc lighting system will be weather adaptive to save energy. Availability of parking spaces throughout the city will be accessible by everyone.
5.4 Smart Hospitals
Fig 9: Smart Home
Fig 7: Traffic Management
Prediction of natural disasters such as ood, forest re, earthquakes etc will be possible due to innovative technologies of IoT. There will be a proper monitoring of air pollution in the environment.
Hospitals will be equipped with smart exiblewearableembeddedwithRFIDtagswhichwillbegivent o the patients on arrivals, through which not just doctors but nurses will also be able to monitor heart rate, blood pressure, temperature and other conditions of patients inside or outside the premises of hospital.Therearemanymedical emergencies suchascardiac arrest but ambulances take some time to reach patient, Drone Ambulances are already in the market which can y to the scene with theemergencykitsoduetopropermonitoring,doctorswillbeabl e to track the patients and can send in the drone to provide quick medical care until the ambulance arrive.
Fig 10: Smart Hosipital
Fig 8: Smart Environment
IoT will also provide DIY solutions for Home Automation with which one will be able to remotely control appliances as per ones need. Proper monitoring of utility meters, energy and water supply will help saving resources and detecting unexpected overloading, water leaks etc. There will be proper encroachment detection system which will prevent burglaries. Gardening sensors will be able to measure the light, humidity, temperature, moisture and other gardening vitals, as well as it will water the plants according to their needs.
Fig 11: Drone Ambulance
It will monitor Soil nutrition, Light, Humidity etc and improve the green housing experience by automatic adjustment of temperature to maximize the production. Accurate watering and fertilization will help improving the water quality and saving the fertilizers respectively .
Fig 12: Smart Agriculture
Smart Retailing and Supply-chain Management
IoT with RFID provides many advantages to retailers. With RFID equipped products, a retailer can easily track the stocks and detect shoplifting.Itcankeepatrackofalltheitemsinastoreandtopreve ntthemfromgoingout-of- stock,itplacesanorderautomatically.Moreover the retailer can even generate the sales chart and graphs for effective strategies.
tagcanbereadbyamiscreantreaderbutitcanevenbemodiedor possiblybedamaged.Inthiscontext,summarizedsomeofth e real life threats of RFID which includes RFID Virus, Side Channel Attack with a cell-phone and SpeedPass Hack.
6.2 Sensor-NodesSecurityBreach WSNs are vulnerable to several types of attacks because sensor nodesarethepartofa bi-directionalsensornetworkasdiscussed in section 4.2,which means otherthan the
transmissionof data, acquisition of data is also possible. described some of the possible attacks that includes Jamming, tampering, Sybil, Flooding and some other kinds of attacks, which are summarized as followed:
Jamming obstructs the entire network by interfering with the frequencies of sensor nodes.
Tampering is the form of attack in which the node data can be extracted or altered by the attacker to make a controllable node.
Sybil attack claims multiple pseudonymous identities for a node which gives it a big inuence.
Flooding is a kind of a DOS attack caused by a large amount of trafc that results in memory exhaustion.
Fig 13: Payment Process
Cloud Computing is a big network of converged servers which allow sharing of resources between each other. These shared resources can face a lot of security threats like Man-in-the-middle attack (MITM), Phishing etc. Steps must be taken to ensure the complete security of the clouding platform . Cloud Security Alliance (CSA) proposed some possible threats among which few are Malicious Insider, Data Loss, Accounts Hijacking and Monstrous use of Shared Computers etc  which are
It helps in detecting the quality of shipment conditions,
item location, storage incompatibility detection, fleet tracking etc
Fig 14: Fleet Tracking
6. SECURITY AND PRIVACY CHALLENGES
IoT makes every thingandperson locatableand addressablewhich will make our lives much easier than before; however without a lackofcondenceaboutthesecurityandprivacyoftheusersdat a, itsmoreunlikelytobeadoptedby many.Soforitsubiquitous adoption, IoT must have a strong security infrastructure. Some of the possible IoTrelated issues are as followed:
An unauthorized access to tags that contains the identication data is a major issue of IoT which can expose any kind of condential information about the user so it needs to be addressed. Not just the
summarized as followed:
Malicious Insider is a threat that someone from the inside who have an access to the users data could be involved in data manipulating.
Data Loss is a threat in which any miscreant user who has an unauthorized access to the network can modify or delete the existing data.
Man-in-the-middle (MITM) is a kind of Account Hijacking threat in which the attacker canalter or intercept messages in the communication between two parties.
Cloud computing could be used in a monstrous ways because if the attacker gets to upload any malicious software in the server e.g. using a zombie-army (botnet), it could get the attacker a control of many other connected devices.
With the incessant burgeoning of the emerging IoT technologies, the concept of Internet of Things will be inexorably developing on a very large scale. This emerging paradigm of networking will inuence every part of our lives ranging from the automated houses to smart health and environment monitoring by embedding intelligence into the objects around us. In this paper, the vision of IoT
and a well-dened architecture for its development is presented. Then there is a highlight of various enabling technologies and few of the related security threats. And nally there is discussion regarding number of applications resulting from the IoTwhich will ease our day- to-day life. Researches are already being carried out for its wide range adoption, however without addressing the challenges in its development and providing condentiality of the privacy and security to the user, its highly unlikely for it to be an
omni-present technology. The development of IoT requires strenuous efforts totackle and give solutionsfor its security and privacy threats.
M.U. Farooq, Muhammad Waseem, SadiaMazhar, AnjumKhairi, Talha Kamal, A Review on Internet of Things, International Journal of Computer Applications (0975 8887) Volume 113 – No. 1,
SomayyaMadakam, R. Ramaswamy, SiddharthTripathi , Internetof Things (IoT): A Literature Review, Journal of Computer and Communications, 2015, 3, 164-173 Published Online May 2015
JaehakByun, Sooyeop Kim, Jaehun Sa, Sangphil Kim, Yong-Tae Shin and Jong-Bae Kim,Smart City Implementation Models Based on IoT Technology, Advanced Science and Technology Letters Vol.129 (Mechanical Engineering 2016), pp.209-212 http://dx.doi.org/10.14257/astl.2016.129.41
The Only Coke Machine on the Internet,Carnegie Mellon University, School of Computer Science.
M. Weiser, The computer for the 21st century, Sci. Amer., 1991, pp.66 -755 International Journal of Computer Applications (0975 8887) Volume 113 – No. 1, March 2015
Jason Pontin, Bill Joys Six Webs, MIT Technology Review, 29 September 2005
Kevin Ashton, Internet of Things, RFID Journal, 22 June 2009
Bob Violino, Top IT Vendors reveal their IOT strategies. It can be accessed at: http://www.networkworld.com/article/2604766/int ernet-ofthings/top-it-vendors-reveal-their-iotstrategies.html
HaraldSundmaeker, Patrick Guillemin, Peter Friess, Sylvie Woelf, Vision and challenges for realising the Internet of Things,
Publications Ofce of the European Union, 2010
Gartner, Inc. It can be accessed at: http://www.gartner.com/newsroom/id/2905717
From the ARPANET to the Internet by Ronda Hauben TCP Digest (UUCP). Retrieved 2007-07-05 It can be accessed at: http://www.columbia.edu/ rp20/other/tcpdigest paper.txt
Jian An, Xiao-Lin Gui, Xin He, Study on the Architecture and Key Technologies for Internet of Things, in Advances in Biomedical Engineering, Vol.11, IERI-2012, pp. 329-335
Wang Chen, AN IBE BASED SECURITY SCHEME OF INTERNET OF THINGS, in Cloud Computing and Intelligent Systems (CCIS), 2012, pp. 1046, 1049
HuiSuo, Jiafu Wan, CaifengZou, Jianqi Liu, Security in the Internet of Things: A Review, in Computer Science and Electronics Engineering (ICCSEE), 2012, pp. 648-651
MiaoWu, Ting-lieLu, Fei-YangLing, lingSun, Hui-YingDu, Research on the architecture of Internet of things, in Advanced Computer Theory and Engineering (ICACTE), 2010, pp. 484-487
Xu Cheng, Minghui Zhang, Fuquan Sun, Architecture of internet of things and its key technology integration based-on RFID, in Fifth International Symposium on Computational Intelligence and Design, pp. 294-297, 2012
DebasisBandyopadhyay, JaydipSen, Internet of Things Applications and Challenges in Technology and StandardizationinWirelessPersonalCommunicati ons,Volume58,Issue 1, pp. 49-69
Ying Zhang, Technology Framework of the Internet of THings and Its Application, in Electrical and Control Engineering (ICECE), 2011, pp. 4109-4112
GuichengShen and Bingwu Liu, The visions, technologies, applications and security issues of Internet of Things, in E –
Business and E -Government (ICEE), 2011, pp. 1-4
H. Zhang, L. Zhu, Internet of Things: Key technology, architecture and challenging problems, in Computer Science and Automation Engineering (CSAE), 2011, Volume: 4, pp. 507512
L.Atzori, A.Iera, G.Morabito, TheInternetofThings:Asurvey, in Computer Networks – Science Direct
L.G.Guo, Y.R.Huang, J.Cai, L.G.QU, Investigation of Architecture, Key Technology and Application Strategy for the Internet of Things,in Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), 2011, Volume: 2, pp. 1196- 1199
Sohraby, K., Minoli, D., Znati, T. Wireless sensor networks: technology, protocols, and applications, John Wiley and Sons, 2007 ISBN 978-0-471-74300-2, pp. 15-18
WISP by Intel Labs; It can be accessed at: http://wisp.wikispaces.com
E. M. Tapia, S. S. Intille, and K. Larson, Portable wireless sensors for object usage sensing in the home: Challenges and practicalities, in Proceedings of the European Ambient Intelligence Conference. vol. LNCS 4794 Berlin Heidelberg: Springer-Verlag 2007
IEEE 802.15 WPAN Task Group 4. It can be accessed at: http://www.ieee802.org/15/pub/TG4.html
G.Montenegro, N.Kushalnagar, J.Hui,D. Culler, Transmission of IPv6 Packets over IEEE 802.15.4 Networks
R. Roman, C. ALcaraz, J.Lopez, N. Sklavos,Key Management Systems for Sensor Networks in the Context of the Internet of Things, Computers & Electrical Engineering, Volume: 37, Issue: 2, 2011, pp. 147-159
B.B.P. Rao, P.Saluia, N.Sharma, A.Mittal, S.V.Sharma, Cloud computing for Internet of Things & sensing based applications, in Sensing Technology (ICST), 2012 Sixth International Conference, IEEE
X.Xiaohui, Study on Security Problems and Key Technologies of The Internet of Things, Computational and Information Sciences (ICCIS), 2013, pp. 407-410
I.Akyildiz and J.Jornet, THE INTERNET OF NANOTHINGS, IEEE Wireless Communications, Volume: 17 Issue: 6, 2010, pp. 58- 63
V.M. Lubecke, Jung-ChihChiao, MEMS technologies for enabling high frequency communications circuits, in Telecommunications in Modern Satellite, Cable and Broadcasting Services, 1999, Volume: 2, pp. 382-389
Cisco 40 Gigabit Module. It can be accessed at: http://www.cisco.com/c/en/us/products/interfaces modules/40- gigabit-modules/index.html
What were driving at, Google Ofcial Blog. It can be accessed at: http://googleblog.blogspot.com/2010/10/whatwere-drivingat.html
Y.Cao, W.Li, J.Zhang, Real-time trafc information collecting and monitoring system based on the internet of things, in Pervasive Computing and Applications (ICPCA), 2011 6th International Conference, pp. 45-49
P.Fuhrer, D.Guinard, Building a Smart Hospital using RFID technologies.
F.TongKe, Smart Agriculture Based on Cloud Computing and IoT, in Journal of Convergence Information Technology (JCIT),
RFID Security Issues – Generation2 Security. It can be accessed at: http://www.thingmagic.com/index.php/rdsecurity-issues
Y.Wang, G.Attebury And B.Ramamurthy, A Survey on Security Issues in Wireless Sensor Networks, in IEEE communications Survey and Tutorials, 2nd Quarter 2006
M.Aamir, Prof. X.Hong, A.A.Wagan, M.Tahir, M.Asif, Cloud Computing Security Challenges and their Compromised Attributes, in International Journal of Scientic Engineering and Technology,
Volume 3, Issue 4, pp. 395-399
V. Ashktorab, S.R.Taghizadeh, Security Threat and Counter measures in Cloud Computing,in International Journalof Application or Innovation in Engineering and Management (IJAIEM Volume 1, Issue 2, Oct12.