Javascript must be enabled to continue!
Cloud Security in Middleware Architecture
View through CrossRef
The new Internet of Things (IoT) has increased the need for computing, connectivity, and storage capacities as the amount of sensitive data grows. Since it provides on-demand access to a common pool of resources such as processors, storage, software, and services, cloud computing can seem to be a convenient solution. However, there is a cost, as excessive communications burden not only the core network, but also the cloud data centre. As a result, it’s critical to consider appropriate approaches and security middleware solutions. In this chapter, we define a middleware architecture to address security concerns and explore the general concept of cloud to achieve a higher level of security. Since it is designed to pre-process data at the network’s edge, this security middleware functions as a smart gateway. Data can be processed and stored locally on fog or sent to the cloud for further processing, depending on the information obtained. Furthermore, the devices communicate via middleware, which gives them access to more computing power and improved security capabilities, allowing them to conduct safe communications. We discuss these concepts in detail, and explain how this is effective to cope with some of the most relevant security challenges.
Title: Cloud Security in Middleware Architecture
Description:
The new Internet of Things (IoT) has increased the need for computing, connectivity, and storage capacities as the amount of sensitive data grows.
Since it provides on-demand access to a common pool of resources such as processors, storage, software, and services, cloud computing can seem to be a convenient solution.
However, there is a cost, as excessive communications burden not only the core network, but also the cloud data centre.
As a result, it’s critical to consider appropriate approaches and security middleware solutions.
In this chapter, we define a middleware architecture to address security concerns and explore the general concept of cloud to achieve a higher level of security.
Since it is designed to pre-process data at the network’s edge, this security middleware functions as a smart gateway.
Data can be processed and stored locally on fog or sent to the cloud for further processing, depending on the information obtained.
Furthermore, the devices communicate via middleware, which gives them access to more computing power and improved security capabilities, allowing them to conduct safe communications.
We discuss these concepts in detail, and explain how this is effective to cope with some of the most relevant security challenges.
Related Results
CLOUD COMPUTING - NAVIGATING THE DIGITAL SKY
CLOUD COMPUTING - NAVIGATING THE DIGITAL SKY
“Cloud Computing – Navigating the Digital Sky” is an extensive guide designed to provide a thorough understanding of cloud computing, an essential technology in today’s digital age...
Context-specific middleware specialization techniques for optimizing software product-line architectures
Context-specific middleware specialization techniques for optimizing software product-line architectures
Product-line architectures (PLAs) are an emerging paradigm for developing software families for distributed real-time and embedded (DRE) systems by customizing reusable artifacts, ...
Middleware Technologies for Ubiquitous Computing
Middleware Technologies for Ubiquitous Computing
Middleware handles many important functionalities for ubiquitous computing. The authors distinguish various middleware technologies providing key elements for all applications‘ req...
The architecture of differences
The architecture of differences
Following in the footsteps of the protagonists of the Italian architectural debate is a mark of culture and proactivity. The synthesis deriving from the artistic-humanistic factors...
A survey of secure middleware for the Internet of Things
A survey of secure middleware for the Internet of Things
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This pap...
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...
SECURITY THREATS AND COUNTERMEASURES IN CLOUD
SECURITY THREATS AND COUNTERMEASURES IN CLOUD
Cloud computing refers to the continuous availability of computer infrastructure technology, enabling the handling and storage of information without direct client management. Peop...
A Survey on Hybrid and Multi-Cloud Environments: Integration Strategies, Challenges, and Future Directions
A Survey on Hybrid and Multi-Cloud Environments: Integration Strategies, Challenges, and Future Directions
The rapid evolution of cloud computing has led organizations to adopt hybrid and multi-cloud environments to meet increasing demands for scalability, flexibility, and resilience. W...

