CICS: Cloud–Internet Communication Security Framework for the Internet of Smart Devices

— The internet of smart devices is a network of intelligent gadgets with sensors, programs, Wi-Fi and communication network connections. These devices store the data in cloud and process data outside the device using the proposed Cloud-Internet communication framework. These devices can communicate with other devices using the proposed framework. However, there are many challenges for communication security among the internet of smart devices. The Cloud can store the device data with security, reliability, privacy and service availability. The communication Security has been raised as one of the most critical issues of cloud computing where resolving such an issue would result in a constant growth in the use and popularity of cloud computing. Our purpose of this study is to create a framework for providing the communication security among smart devices network for the internet of things using cloud computing. Our main contribution links a new study for providing communication security for the internet of smart devices using the cloud-Internet framework. This study can be helpful for communication security problem in the framework of the Internet of Things. The proposed study generates a new framework for solving the issue of communication security among internet of smart devices.


Introduction
The Internet of things (IoT) is growing exponentially in the area of telecommunication. It is expected that by 2020, the development of the internet of smart devices connected together exponentially with 50 billion smart devices [1]. This The objective of this study is to create a framework for providing the communication security among smart devices network for the internet of things using cloud computing. Our main contribution links a new study for providing communication security for the internet of smart devices using cloud and internet framework. This study can be helpful for communication security problem in the framework of the Internet of Things. Our study will generate a new framework for solving the issue of communication security among internet of smart devices.
This paper is organized into the sections. Section 1 is the Introduction, Section 2 is the literature Survey, Section 3 is "Technologies contributed to the growth of the Internet of smart devices", section 4 is "Communication Security Challenges and Threats", section 5 is "Cloud-Internet Communication Security Framework" and the last section is the conclusion.

Literature Survey
In 1994, Tristan Richardson et.al. were presented an article on X windows systems, X protocol for securing the communication between client and server [12]. In the article [13], the authors represented System Software for Ubiquitous Computing for the integration of different kinds of network, also create a connection among the devices in different types of network. In 2002 D. Estrin et.al. were published an article on connecting the Physical World with Pervasive Networks, in this article they address the communication in physical world using embedded technologies [14].
The cloud computing came as a consequence of continues development of computing paradigms [15]. In 2009, Evan Welbourne et al. were published an article on RFID-based services for the IoT [16]. In 2010, Gerd Kortuem et al. were presented the development of a new flow-based programming paradigm for smart objects and the Internet of Things [17]. In 2011, Ahmed Rahmati et al. were published an article on the context-based network estimation and provide ubiquitous energy efficient wireless connectivity [18]. In the article [19] researchers presented Wi-Fi based sensors for the internet of things, they focused on measurement the range performance.
In May 2014, Lihong Jiang et al published an article on data storage in IoT and integration of both structured and unstructured data [20]. In the article [21], introduced the IoT ecosystem and key technologies to support IoT communications. In 2016, Maria Rita Palattella et al published an article entitled "Internet of Things in the 5G Era: Enablers, Architecture, and Business Models", in this article they presented 5G technologies for the IoT, by considering both the technological and standardization aspects [22]. Technologies contributed to the growth of the Internet of smart devices There are three technologies that contributed to the internet of things growths. i) The ubiquitous computation that has the capacity of intelligent physical objects that execute on the computation framework.
ii) Internet Protocol (IPV6) using ubiquitous computing that covers the area of network and support talking of machine to machine [23]. IPv4 internet has a drawback to adding billions of smart gadgets together, but it is possible in IPv6 internet because it enables internet of things to connect billions of smart gadgets together securely.
iii) Connection using ubiquitous computing that uses the fixed cell network or mobility with using sensor connectivity [24]. These technologies must be enhanced and progressive so that it allows the progress of internet of smart devices including multi-sensor framework to store, computation, analyze and process capability with smaller in size and lowest energies required [25]. The main contribution of this article is solely on the communication security viewpoint among smart gadgets in the area of the internet of things. The security idea depends on three main points in the designing of the internet of things architecture.

1.
It is not easy to manage data getting from millions of sensors in a centralized framework of smart devices collection.

2.
It is not easy to manage and schedule network resources [26] in a large network that can collect environment information from the centralized framework.

3.
It is very hard to manage sensors that execute the same kind of data parallel and store on the centralized framework.
Most researcher move to the growth of internet of things using the advancement of wireless sensor technology with satellites, mobility, gadgets industrialize, computation and storage in cloud etc. [27,28,29] this technology provide the opportunities for reducing the operation cost and people physical work [30,31]. The distribution of intelligent capacity is called fog computation. Fog computation is an architecture that is designed for processing the information by smart devices to the centralized cloud system. Computation, storage, and networking resources are the building blocks of both the Cloud and the Fog computing [32]. Cloud computing has been regarded as one of the most popularized computing paradigms [33]. It came likewise an outcome for developments done past computing paradigms which incorporate parallel computing, grid computing, disseminated computing also other computing paradigms [34,35,36]. Cloud computing gives its customers three essential administration models: SaaS, PaaS, and IaaS [38]. Software as a service (SaaS) is the service that is mainly intended to end users who need to use the software as a part of their daily activities [39]. Platform as a service (PaaS) is mainly intended for application developers who need platforms to develop their software or application. Infrastructure as a service (IaaS) is mainly intended to network architects who need infrastructure capabilities [40]. Nowadays increasing numbers of sensors and sensor networks are being connected to the Internet and the World Wide Web [41].

Communication Security Challenges And Threats
The communication security challenges and threats for communicating in cloud perspective internet of smart devices are the most important aspect. The first challenge is Service disruption due to attacks. In recent times, external attacks can be held responsible for major security breaches in a cloud environment. This can be illustrated in the case of Adobe systems, where it cooperates databases were hacked and data was stolen. It was reported that around 130 million consumer records got leaked. Therefore, the cloud provider must step up preventive measures to diminish the severity of these attacks. The second challenge is Denial of service attacks. It is provisioned as unique, frequent and simple attacks. Their characteristics make them unpredictable and difficult to be intercepted.

Cloud-Internet Communication Security Framework
For the most part speaking, security will be a limitless issue to take care of viewpoint about perspective. Different gatherings included inside the cloud standard bring different destinations. Therefore, they might differ their worries in regard to threats and vulnerabilities in the cloud environment. Moreover, these worries might be eased or intensified depending on the implemented deployment model. In the realism of the internet, security has been perceived as a prominent inhibitor of embracing the cloud paradigm. Since the cloud environment is a distributed architecture, which its resource storage and management may lay in any place of the world, many concerns have been raised over its vulnerabilities, security threats and challenges. The involvement of various parties has widened these concerns based on each party perspective and objective. It has been determined that there are three dominant parties which participate in the cloud environment.
✓ Service providers: Their concerns may intensify over public and hybrid cloud where issues related to unauthorized access and cyber-attacks may jeopardize the service availability. ✓ Service consumers: Their concerns may focus on issues related to data privacy and quality of service. Besides, their concerns regard service availability and interoperability. ✓ Service regulators: Their concerns may focus on issues related to service. It is fair to say that all previously mentioned party concerns might be correlated and associated with other parties.
In cloud computing, several deployment models can be deployed on the previously mentioned service models. These various deployment models can be utilized based on their distribution nature which depends on cloud service location as follows: Public cloud: All services are been provided in a public environment where consumers can access a pool of resources which are managed by a hosted organization. Due to its nature, this type of environment may raise critical concerns over security problems. II.
Private cloud: Services are been provided by a third party vendor which separates it from public access. Consequently, it is safer than the previous development model due to the fact that it prevents unauthorized access. III.
Community cloud: Services are been provided to a specified community where all members have an equal right of accessing the shared resources.

IV.
Hybrid cloud: Services are provided as combustion of more than one cloud (public cloud, private cloud, and community cloud). It could inherit any type of vulnerability or risk that resides within the previously mentioned parties.
There are various initiatives which try to establish standardization projects. Broadly speaking, these projects primarily empathized on standardizing four prominent cloud interoperability use cases which are the following: I. User authentication: it can be standardized according to OpenID or protocols depend on Oath. II.
Workload migration: it can be standardized based on VM image file formats. III.
Data migration: it can be standardized by addressing APIs differences. IV.
Workload management: it can be standardized by unifying workload management standards across various providers.
The proposed framework has four layers, the first is the presentation layer acts on the smart device side. The second layer is the communication security layer that provides communication security in the network using encryption/decryption management. The third layer is the ubiquitous network layer. The fourth layer is the Cloud layer. This layer is the key layer in this framework. The cloud collects the encrypted data, process data, and store in the cloud. The information can be sent to the smart device in encrypted form. The proposed framework shows the framework elements with their functionality. This is a complex architecture. So that it is divided into several parts in each layer. The communication security layer is responsible to collect and aggregate data with encryption techniques also identify, classify, filter and process the data packets and send to the ubiquitous network. The packets are securely transferred to the cloud. The cloud received the light weighted packets in an encrypted format. It processes the packets and store in a cloud. This layer uses the programming with intelligence to process data packets received from the smart devices that are on the border of the coverage area. The communication security layer in the proposed framework applies the algorithm to monitor the attacks using deep learning or Petri Nets or artificial intelligence models. This layer also has the latest viruses or attacks information. It can be updated online automatically to adopt the new threat definitions.

Conclusion
The communication security threats and challenges that rely on behind the lure of cloud computing. Since the cloud paradigm is based on a distributed architecture, then it is inherited some risks and vulnerabilities that are related to distributed paradigms. However, several of these risks have intensified over the cloud paradigm. In this article, the issues related to the causes of information unavailability been discussed. To overcome it, a cloud provider and consumers should agree on the service level agreement. While the causes of interoperability have been discussed. The article primarily focused on communication security, one of these threats related to service disruption which can result due to attacks such as denial of service attacks, service hijackings, and VM-level attacks. We analyzed the security requirements and challenges for communication security among all smart devices in cloud computing environment. The fundamental functions of this study have been introduced to the ubiquitous network layer. The study showed successfully and expectation for a future scope in this area. The proposed framework has been presented a layered architecture for secure communication among internet of smart devices. We explained the possible layers and techniques used in the framework.