A cloud based conceptual identity management model for secured Internet of Things operation

Abubakar Bello, Venkatesh Mahadevan

Research output: Contribution to journalArticle (journal)peer-review

5 Citations (Scopus)


An era ago, projecting artificial intelligence as the pillar of next-generation technology would have been technically difficult. Today, machines are getting smarter, sparking a new wave of technology that resulted to Internet of Things (IoT). With IoT in play, individuals are able to connect more electronic devices other than smartphones and computers to the Internet. The vision is to create the possibility to manage electronic appliances via the Internet with the most minimal human intervention. IoT promises the application of computing to anything anywhere, and anyone at any time. Thus, it has been estimated that over 100 billion devices will be running the IoT model - drawing the power of cloud processing to create a massive network of devices that are bound to change the essential facets of life in various dimensions. However, several obstacles remain to fulfill this vision, among them is security concerns from an Identity of Things (IDoT) management perspective. IoT devices and users are already under cyber attacks, and any lapse in identity management will propagate these attacks. This paper examined how identity management for IoT is likely to play out in a world where the Internet and cloud technologies are expected to take center stage in the running of day-to-day activities. The paper analyses the identity of things challenges in IoT, followed by a proposal of cloud identity management model for IoT.
Original languageEnglish
Pages (from-to)53-74
Number of pages22
JournalJournal of Cyber Security and Mobility
Issue number1
Publication statusPublished - 1 Jan 2019


  • Cloud IoT
  • Identity Management
  • Identity of Things
  • Internet of Things
  • IoT Security
  • Authentication
  • Cloud security
  • Cybersecurity
  • Network security
  • Cloud internet of thing
  • Cloud-based
  • Electronic appliances
  • Generation technologies
  • Human intervention
  • Identity management
  • Identity of thing
  • Internet of thing security
  • Management Model
  • Smart phones
  • Internet of things


Dive into the research topics of 'A cloud based conceptual identity management model for secured Internet of Things operation'. Together they form a unique fingerprint.

Cite this