10-Dynamic Resource Provisioning, Security Aspects.-28-03-2024
10-Dynamic Resource Provisioning, Security Aspects.-28-03-2024
10-Dynamic Resource Provisioning, Security Aspects.-28-03-2024
28/03/24 4
Attack can be on any
of these layers –
Attack vectors.
IoT Security Architecture
•User- centric edge- based IoT security
architecture
•Device- centric edge- based IoT security
design
•End- to- end IoT security
•Firewalls implementation at the edge layer
•Intrusion detection system at the edge layer
Security and privacy for
data in motion
MOBILE/
Things
gateway CLOUD Enterprise
Data Data
Data Data
ACCESS ACCESS
Access
Access
Data in Transit
Data Security and Privacy
•IoT Devices
•Gateway
•Cloud
•Services
Data Security and Privacy
28/03/24 19
MFA(multiple Factor authentication)-AWS
Fine grained Permission to users
SafeNet -One-Time Password -Hardware
Tokens for AWS
• Strong Authentication at the
Touch of a Button
• Hand-held device with single
button
• No PIN needed
• Secure remote access
• Zero footprint - no required
software on end-user devices
Security Components in Cloud – IAM – Identity and
Access Management
authentication, authorization and verification
28/03/24 27