Big data-oriented unit and ubiquitous Internet of Things (BD-U2IoT) security

Big data-oriented unit and ubiquitous Internet of Things (BD-U2IoT) security

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Big Data-Enabled Internet of Things — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

With the abrupt increase in the number of online devices, Internet of Things (IoT) has evolved as a promising solution that comprises a large set of enabling technologies to support intercormectivity among the smart devices. A huge amount of sensing, computation, communication and storage resources involve the unit and ubiquitous things that cannot be handled by just increasing the resources. It needs a new architecture that can manage the sensing bottlenecks from physical space and appropriately grows the cyber space to meet the challenging requirements. In future IoT, social impact should also be considered in designing new architecture so as to support big data. To address huge storage and computation requirements, a cloud is considered to be the promising solution along with a set of services. Third party cloud -service providers are also managing the big data repositories for users, organization and applications. The role of unit and ubiquitous IoT (U2IoT) is essential for providing sensed data from a large number of devices to local, industrial and national-level management and data centers that are linked with cloud servers for central storage and analysis of big data. We have presented a security architecture that comprises physical security, information security and management security in the prospective of big data -oriented U2IoT.

Chapter Contents:

  • 13.1 Introduction
  • 13.2 Unit and ubiquitous Internet of Things
  • 13.2.1 Storage and resource management in U2IoT
  • Resource management in unit IoT
  • Resource management in ubiquitous IoT
  • 13.2.2 Security in big data-oriented U2IoT
  • Physical security
  • Information security
  • Management security
  • References

Inspec keywords: Big Data; Internet of Things; computer centres

Other keywords: online devices; cloud servers; big data; big data-oriented unit; IoT; management security; central storage; cyber space; information security; physical security; ubiquitous Internet of Things security; national-level management; BD-U2IoT; data centers; smart devices; storage resources; third party cloud-service providers; physical space

Subjects: Other DBMS; Ubiquitous and pervasive computing; Computer facilities

Preview this chapter:
Zoom in

Big data-oriented unit and ubiquitous Internet of Things (BD-U2IoT) security, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc025e/PBPC025E_ch13-1.gif /docserver/preview/fulltext/books/pc/pbpc025e/PBPC025E_ch13-2.gif

Related content

This is a required field
Please enter a valid email address