Possibilities of authorization and protection of user data during the development of cloud web applications for IoT

Keywords: authorization, authentication, data security, Internet of Things, mobile applications

Abstract

The article examines the security and information protection problems created by the spread of the Internet of Things. Various approaches and technologies are being explored for implementing reliable and secure device authorization protocols and preserving confidential user data. Based on the considered technologies and protocols, the system architecture for controlling a smart IoT device was designed and developed

References

1. Rose K. The internet of things: An overview / K. Rose, S. Eldridge, L. Chapin., 2015. – 53 с.
2. Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends / K.Abid, A. Awais, A. Mansoor, S. Jadran., 2022. – (8).
3. Systematic Review of Authentication and Authorization Advancements for the Internet of Things / M.Trnka, A. S. Abdelfattah, A. Shrestha, M. Coffey., 2022.
4. Mohammad A. User Authentication and Authorization Framework in IoT Protocols / A. Mohammad, H. Al-Refai, A. A. Alawneh., 2022. – 147 с.
5. James A. Challenges for Database Management in the Internet of Things / A. James, C. Joshua., 2014. – 320 с. – (5).

Abstract views: 0
PDF Downloads: 0
Published
2023-09-24
How to Cite
Polishchuk , M., Semenyuk , O., Polishchuk, L., & Lomakin, M. (2023). Possibilities of authorization and protection of user data during the development of cloud web applications for IoT. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (52), 94-103. https://doi.org/10.36910/6775-2524-0560-2023-52-12
Section
Computer science and computer engineering