{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:28:43Z","timestamp":1754108923101,"version":"3.41.2"},"reference-count":56,"publisher":"World Scientific Pub Co Pte Ltd","issue":"06","funder":[{"name":"the national key R & D research","award":["2019YFB1405500"],"award-info":[{"award-number":["2019YFB1405500"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2023,5]]},"abstract":"<jats:p> The application of artificial intelligence of things (AIoT) is becoming increasingly widespread. With its rapid development, it has raised many complex network security issues. These have brought crushing security threats and risks to all stakeholders. AIoT cloud platform in the smart home plays a vital role in the security management of devices and is the current research hotspot. This paper discusses the security of the AIoT cloud platform, represented by the smart home. The indicator system describing the protection of the smart home cloud platform is proposed, and the security risk evaluation method of the cloud service is formed. Based on the evaluation method, a lightweight security evaluation framework for smart home cloud service is designed to evaluate the typical cloud platform\u2019s security. The evaluation identifies some technical and administrative issues. Finally, to improve the security of the cloud console of AIoT and discover potential security risks in time, a security self-test model of the scalable cloud console is proposed. <\/jats:p>","DOI":"10.1142\/s0218001423510126","type":"journal-article","created":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T02:44:06Z","timestamp":1679625846000},"source":"Crossref","is-referenced-by-count":5,"title":["Security Evaluation Method of Smart Home Cloud Platform"],"prefix":"10.1142","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1573-3250","authenticated-orcid":false,"given":"Chensi","family":"Wu","sequence":"first","affiliation":[{"name":"China Electronics Standardization Institute, Digital Technology Research Center, Beijing 100007, P. R. China"}]},{"given":"Lulin","family":"Yang","sequence":"additional","affiliation":[{"name":"China Electronics Standardization Institute, Digital Technology Research Center, Beijing 100007, P. R. China"}]},{"given":"Maobin","family":"Cai","sequence":"additional","affiliation":[{"name":"Xingtang Communication Technology Co., Ltd, Beijing 100191, P. R. China"}]},{"given":"Xiaoying","family":"Zhao","sequence":"additional","affiliation":[{"name":"China Electronics Standardization Institute, Digital Technology Research Center, Beijing 100007, P. R. China"}]},{"given":"Qifeng","family":"Sun","sequence":"additional","affiliation":[{"name":"China Electronics Standardization Institute, Digital Technology Research Center, Beijing 100007, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2023,4,25]]},"reference":[{"key":"S0218001423510126BIB001","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/j.procs.2021.07.066","volume":"191","author":"Abdelouahid R. A.","year":"2021","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"S0218001423510126BIB002","first-page":"012053","volume":"767","author":"Abu M.","year":"2020","journal-title":"Mater. Sci. Eng."},{"issue":"2","key":"S0218001423510126BIB003","first-page":"722","volume":"12","author":"Affum E. A.","year":"2021","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"2","key":"S0218001423510126BIB004","first-page":"489","volume":"8","author":"Ahmed S. H.","year":"2021","journal-title":"Int. J. Contemp. Arch."},{"key":"S0218001423510126BIB005","doi-asserted-by":"crossref","first-page":"1362","DOI":"10.1109\/SP.2019.00013","volume-title":"2019 IEEE Symp. Security and Privacy (SP)","author":"Alrawi O.","year":"2019"},{"issue":"3","key":"S0218001423510126BIB006","doi-asserted-by":"crossref","first-page":"102482","DOI":"10.1016\/j.ipm.2020.102482","volume":"58","author":"Ammi M.","year":"2021","journal-title":"Inf. Process. Manag."},{"key":"S0218001423510126BIB007","doi-asserted-by":"crossref","first-page":"103301","DOI":"10.1016\/j.micpro.2020.103301","volume":"80","author":"Anuradha M.","year":"2021","journal-title":"Microprocess. Microsyst."},{"key":"S0218001423510126BIB008","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/978-3-319-68385-0_9","volume-title":"Intelligent Systems Technologies and Applications","author":"Arunkumar B.","year":"2018"},{"issue":"1","key":"S0218001423510126BIB009","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1177\/0022243720981975","volume":"59","author":"Bollinger B.","year":"2022","journal-title":"J. Market. Res."},{"issue":"1","key":"S0218001423510126BIB010","first-page":"9","volume":"13","author":"Cao L.","year":"2022","journal-title":"Int. J. Grid Utility Comput."},{"issue":"4","key":"S0218001423510126BIB011","first-page":"1","volume":"54","author":"Chen F.","year":"2021","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"S0218001423510126BIB012","first-page":"1","volume":"41","author":"Chen Y. Y.","year":"2021","journal-title":"J. Intell. Fuzzy Syst."},{"key":"S0218001423510126BIB013","doi-asserted-by":"crossref","first-page":"110510","DOI":"10.1109\/ACCESS.2019.2933859","volume":"7","author":"Choi C.","year":"2019","journal-title":"IEEE Access"},{"key":"S0218001423510126BIB014","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.comcom.2020.04.005","volume":"157","author":"Chong T. A.","year":"2020","journal-title":"Comput. Commun."},{"key":"S0218001423510126BIB015","first-page":"40","volume-title":"2017 3rd Int. Conf. Computational Intelligence and Networks (CINE)","author":"Choudhury T.","year":"2018"},{"key":"S0218001423510126BIB016","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/B978-0-12-823694-9.00028-1","volume-title":"AI, Edge and IoT-Based Smart Agriculture, Intelligent Data-Centric Systems","author":"Doshi M.","year":"2022"},{"key":"S0218001423510126BIB017","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/PRDC53464.2021.00016","volume-title":"2021 IEEE 26th Pacific Rim Int. Symp. Dependable Computing (PRDC)","author":"Duan X.","year":"2021"},{"key":"S0218001423510126BIB018","first-page":"41","volume-title":"2021 3rd Int. Conf. Information Technology and Computer Communications, ITCC 2021","author":"Duan Y.","year":"2021"},{"first-page":"447","volume-title":"2020 IEEE Symp. Security and Privacy","author":"Emami-Naeini P.","key":"S0218001423510126BIB019"},{"issue":"34","key":"S0218001423510126BIB020","first-page":"1","volume":"8","author":"Figueiredo R.","year":"2020","journal-title":"EAI Endorsed Trans. Energy Web."},{"key":"S0218001423510126BIB021","first-page":"1","volume-title":"2018 Int. Conf. Computer Communication and Informatics (ICCCI)","author":"Gai A.","year":"2018"},{"key":"S0218001423510126BIB022","doi-asserted-by":"crossref","first-page":"012121","DOI":"10.1088\/1742-6596\/978\/1\/012121","volume":"978","author":"Gunawan D.","year":"2019","journal-title":"J. Phys., Conf. Ser."},{"key":"S0218001423510126BIB023","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.future.2021.09.044","volume":"128","author":"Guo T.","year":"2022","journal-title":"Fut. Gen. Comput. Syst."},{"key":"S0218001423510126BIB024","first-page":"102768","volume":"58","author":"Gupta S.","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"S0218001423510126BIB025","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/978-1-4842-8276-2_14","volume-title":"IoT System Testing: An IoT Journey from Devices to Analytics and the Edge","author":"Hagar J. D.","year":"2022"},{"issue":"2","key":"S0218001423510126BIB026","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1088\/2632-959X\/abf3d4","volume":"2","author":"Haroun A.","year":"2021","journal-title":"Nano Express"},{"key":"S0218001423510126BIB027","first-page":"249","volume-title":"2021 Int. Conf. Intelligent Transportation, Big Data & Smart City","author":"He Q.","year":"2021"},{"issue":"3","key":"S0218001423510126BIB028","first-page":"349","volume":"13","author":"Hsu M. J.","year":"2022","journal-title":"JJ. Hosp. Tour. Technol."},{"key":"S0218001423510126BIB029","first-page":"357","volume-title":"2021 IEEE Int. Conf. Electrical Engineering and Mechatronics Technology (ICEEMT)","author":"Hu P.","year":"2021"},{"key":"S0218001423510126BIB030","first-page":"450","volume-title":"2019 IEEE 19th Int. Conf. Software Quality, Reliability and Security Companion (QRS-C)","author":"Huang Y.-L.","year":"2019"},{"key":"S0218001423510126BIB031","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3399432","volume":"1","author":"Ji X.","year":"2020","journal-title":"ACM Trans. Internet Things"},{"issue":"24","key":"S0218001423510126BIB032","first-page":"1","volume":"23","author":"Ji Y.","year":"2022","journal-title":"Int.J. Mol. Sci."},{"key":"S0218001423510126BIB033","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1109\/SP40000.2020.00051","volume-title":"2020 IEEE Symposium on Security and Privacy (SP)","author":"Jia Y.","year":"2020"},{"key":"S0218001423510126BIB034","doi-asserted-by":"crossref","first-page":"e0227800","DOI":"10.1371\/journal.pone.0227800","volume":"15","author":"Johnson S. D.","year":"2020","journal-title":"PLOS ONE"},{"key":"S0218001423510126BIB035","first-page":"1","volume":"21","author":"Lv Z.","year":"2021","journal-title":"ACM Trans. Int. Technol."},{"issue":"2","key":"S0218001423510126BIB036","doi-asserted-by":"crossref","first-page":"2095","DOI":"10.3233\/JIFS-189210","volume":"40","author":"Mao L.","year":"2021","journal-title":"J. Intel. Fuzzy Syst."},{"key":"S0218001423510126BIB037","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1109\/ICMLC51923.2020.9469571","volume-title":"2020 Int. Conf. Machine Learning and Cybernetics (ICMLC)","author":"Millar K.","year":"2020"},{"key":"S0218001423510126BIB038","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1109\/SP40000.2020.00021","volume-title":"2020 IEEE Symp. Security and Privacy","author":"Morgner P.","year":"2020"},{"key":"S0218001423510126BIB039","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/978-3-031-21435-6_19","volume-title":"Software Engineering Application in Systems Design","author":"Nemlaha E.","year":"2023"},{"issue":"5","key":"S0218001423510126BIB040","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MITP.2017.3680959","volume":"19","author":"Nurse J. R.","year":"2018","journal-title":"IT Prof."},{"issue":"4","key":"S0218001423510126BIB041","doi-asserted-by":"crossref","first-page":"3559","DOI":"10.1109\/JIOT.2020.2973176","volume":"7","author":"Ravi N.","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"S0218001423510126BIB042","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3376123","volume":"53","author":"Sequeiros J.","year":"2020","journal-title":"ACM Comput. Surv."},{"key":"S0218001423510126BIB043","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/978-981-19-1412-6_20","volume-title":"Next Generation of Internet of Things","author":"Sharma I.","year":"2023"},{"issue":"10","key":"S0218001423510126BIB044","doi-asserted-by":"crossref","first-page":"2051","DOI":"10.1002\/spe.2739","volume":"51","author":"Shi P.","year":"2021","journal-title":"Softw. Pract. Exp."},{"key":"S0218001423510126BIB045","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1109\/CSR51186.2021.9527905","volume-title":"IEEE Int. Conf. Cyber Security and Resilience (CSR)","author":"Stamou A.","year":"2021"},{"key":"S0218001423510126BIB046","first-page":"361","volume-title":"Proc. 26th USENIX Conf. on Security Symp.","author":"Tian Y.","year":"2017"},{"key":"S0218001423510126BIB048","first-page":"1","volume":"2020","author":"Wang J.","year":"2020","journal-title":"Geofluids"},{"issue":"6","key":"S0218001423510126BIB049","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TSC.2019.2904958","volume":"14","author":"Xing L.","year":"2021","journal-title":"IEEE Trans. Serv. Comput."},{"key":"S0218001423510126BIB050","first-page":"2297","volume-title":"2021 4th Int. Conf. Information Systems and Computer Aided Education","author":"Xiong W.","year":"2021"},{"key":"S0218001423510126BIB051","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.procs.2020.11.039","volume":"178","author":"Yakubu I. Z.","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"S0218001423510126BIB052","first-page":"1","volume":"197","author":"Yj A.","year":"2021","journal-title":"Mater. Des."},{"issue":"8","key":"S0218001423510126BIB053","first-page":"2160","volume":"4","author":"Zahra M.","year":"2020","journal-title":"Period. Eng. Nat. Sci."},{"issue":"8","key":"S0218001423510126BIB054","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/CC.2018.8438279","volume":"15","author":"Zeb T.","year":"2018","journal-title":"China Commun."},{"key":"S0218001423510126BIB056","first-page":"1","volume":"227","author":"Zhang L.","year":"2021","journal-title":"Energy"},{"volume-title":"The 2nd Int. Conf. Computing and Data Science, CONF-CDS 2021","year":"2021","author":"Zhang L.","key":"S0218001423510126BIB057"},{"issue":"1","key":"S0218001423510126BIB058","doi-asserted-by":"crossref","first-page":"683","DOI":"10.32604\/cmc.2020.010793","volume":"65","author":"Zuo J.","year":"2020","journal-title":"Comput. Mater. Continua"}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218001423510126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T08:04:28Z","timestamp":1685433868000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218001423510126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,25]]},"references-count":56,"journal-issue":{"issue":"06","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["10.1142\/S0218001423510126"],"URL":"https:\/\/doi.org\/10.1142\/s0218001423510126","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"type":"print","value":"0218-0014"},{"type":"electronic","value":"1793-6381"}],"subject":[],"published":{"date-parts":[[2023,4,25]]},"article-number":"2351012"}}