The Community for Technology Leaders
Green Image
Issue No. 04 - April (2018 vol. 51)
ISSN: 0018-9162
pp: 20-27
Sulabh Bhattarai , Dakota State University
Yong Wang , Dakota State University
ABSTRACT
Many Internet of Things (IoT) devices utilize the cloud to store data and synchronize with one another. Because data breaches can occur anywhere en route to the cloud, ensuring end-to-end trust and security for IoT applications is critical. The authors propose a novel 3D threat model for the IoT and discuss nine security and privacy challenges as well as several ways to mitigate risks.
INDEX TERMS
data privacy, Internet of Things, security of data, trusted computing
CITATION

S. Bhattarai and Y. Wang, "End-to-End Trust and Security for Internet of Things Applications," in Computer, vol. 51, no. 4, pp. 20-27, 2018.
doi:10.1109/MC.2018.2141038
88 ms
(Ver 3.3 (11022016))