{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T16:28:07Z","timestamp":1767976087773,"version":"3.49.0"},"reference-count":0,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,1,1]]},"abstract":"<p>The Internet of Things (IoT) is expected to interconnect billions (around 50 by 2020) of heterogeneous sensor\/actuator-equipped devices denoted as \u201cSmart Objects\u201d (SOs), characterized by constrained resources in terms of memory, processing, and communication reliability. Several IoT applications have real-time and low-latency requirements and must rely on architectures specifically designed to manage gigantic streams of information (in terms of number of data sources and transmission data rate). We refer to \u201cBig Stream\u201d as the paradigm which best fits the selected IoT scenario, in contrast to the traditional \u201cBig Data\u201d concept, which does not consider real-time constraints. Moreover, there are many security concerns related to IoT devices and to the Cloud. In this paper, we analyze security aspects in a novel Cloud architecture for Big Stream applications, which efficiently handles Big Stream data through a Graph-based platform and delivers processed data to consumers, with low latency. The authors detail each module defined in the system architecture, describing all refinements required to make the platform able to secure large data streams. An experimentation is also conducted in order to evaluate the performance of the proposed architecture when integrating security mechanisms.<\/p>","DOI":"10.4018\/ijdst.2016010103","type":"journal-article","created":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T05:49:32Z","timestamp":1452750572000},"page":"37-58","source":"Crossref","is-referenced-by-count":17,"title":["Applying Security to a Big Stream Cloud Architecture for the Internet of Things"],"prefix":"10.4018","volume":"7","author":[{"given":"Laura","family":"Belli","sequence":"first","affiliation":[{"name":"University of Parma, Parma, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Simone","family":"Cirani","sequence":"additional","affiliation":[{"name":"University of Parma, Parma, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Luca","family":"Davoli","sequence":"additional","affiliation":[{"name":"University of Parma, Parma, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Gianluigi","family":"Ferrari","sequence":"additional","affiliation":[{"name":"University of Parma, Parma, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Lorenzo","family":"Melegari","sequence":"additional","affiliation":[{"name":"University of Parma, Parma, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Marco","family":"Picone","sequence":"additional","affiliation":[{"name":"University of Parma, Parma, Italy"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"2432","container-title":["International Journal of Distributed Systems and Technologies"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=143902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T14:48:02Z","timestamp":1654094882000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDST.2016010103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2016,1,1]]},"references-count":0,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdst.2016010103","relation":{},"ISSN":["1947-3532","1947-3540"],"issn-type":[{"value":"1947-3532","type":"print"},{"value":"1947-3540","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,1]]}}}