Tendencias tecnológicas y desafíos de la seguridad informática
Resumen
En la última década tecnologías como Internet de las cosas, Computación en la nube, Bitcoin, han ganado popularidad debido a los desafíos de seguridad que representan. La Computación en la Nube, permite externalizar los requisitos de computación y almacenamiento a los proveedores públicos y pagar por los servicios utilizados. El Internet de las cosas por sus siglas en inglés (IoT) Internet of Things, es un paradigma donde los objetos cotidianos pueden estar equipados con múltiples capacidades, permitiéndoles interconectarse con otros dispositivos mediante Internet para cumplir un propósito. El Bitcoin o la famosa Criptomoneda, revolucionó el campo de las monedas digitales, además de atraer una economía de mil millones de dólares. Otro hito de la evolución es la Seguridad Cognitiva, basaba en inteligencia en seguridad y Big Data, la Seguridad Cognitiva se caracteriza por su tecnología capaz de comprender, razonar y aprender. Todas estas tendencias tecnológicas presentan nuevos desafíos desde la perspectiva de la seguridad informática para el manejo, corrección y aseguramiento de los datos confidenciales de los usuarios. Este documento tiene como objetivo determinar los problemas asociados a estas tecnologías, las ventajas y desventajas, además se discute sobre los desafíos que presenta en el tema de seguridad informática.
Palabras clave
Texto completo:
PDFReferencias
F. Tschorsch and B. Scheuermann, “Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies,” IEEE Commun. Surv. Tutorials, vol. 18, no. 3, pp. 2084–2123, 2016.
Y. M. Kow and C. Lustig, “Imaginaries and Crystallization Processes in Bitcoin Infrastructuring,” Comput. Support. Coop. Work, pp. 1–24, Oct. 2017.
F. J. FaheemZafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Adeel Anjum, Majid Iqbal Khan, Nadeem Javed, Masoom Alam, “A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends,” Comput. Secur., vol. 65, pp. 29–49, Mar. 2017.
I. Yaqoob et al., “Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges,” IEEE Wirel. Commun., vol. 24, no. 3, pp. 10–16, 2017.
A. A. Faheem Zafar, Abid Khan, Saba Suhail, Idrees Ahmed, Khizar Hameed, Hayat Mohammad Khan, Farhana Jabeen, “Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes,” J. Netw. Comput. Appl., vol. 94, pp. 50–68, Sep. 2017.
S. Sengupta, V. Kaulgud, and V. S. Sharma, “Cloud Computing Security--Trends and Research Directions,” in 2011 IEEE World Congress on Services, 2011, pp. 524–531.
A. Whitmore, A. Agarwal, and L. Da Xu, “The Internet of Things—A survey of topics and trends,” Inf. Syst. Front., vol. 17, no. 2, pp. 261–274, Apr. 2015.
L. Van Der Horst, K.-K. R. Choo, and N.-A. Le-Khac, “Process Memory Investigation of the Bitcoin Clients Electrum and Bitcoin Core,” IEEE Access, vol. 5, pp. 22385–22398, 2017.
P. K. Kaushal, A. Bagga, and R. Sobti, “Evolution of bitcoin and security risk in bitcoin wallets,” in 2017 International Conference on Computer, Communications and Electronics (Comptelix), 2017, pp. 172–177.
A. Viswam and G. Darsan, “An efficient bitcoin fraud detection in social media networks,” in 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), 2017, pp. 1–4.
Z. H. Ali, H. A. Ali, and M. M. Badawy, “A New Proposed the Internet of Things (IoT) Virtualization Framework Based on Sensor-as-a-Service Concept,” Wirel. Pers. Commun., vol. 97, no. 1, pp. 1419–1443, Nov. 2017.
S. Iraji, P. Mogensen, and R. Ratasuk, “Recent Advances in M2M Communications and Internet of Things (IoT),” Int. J. Wirel. Inf. Networks, vol. 24, no. 3, pp. 240–242, Sep. 2017.
Y.-C. Liu, Y.-T. Ma, H.-S. Zhang, D.-Y. Li, and G.-S. Chen, “A method for trust management in cloud computing: Data coloring by cloud watermarking,” Int. J. Autom. Comput., vol. 8, no. 3, pp. 280–285, Aug. 2011.
N. Shi, “A new proof-of-work mechanism for bitcoin,” Financ. Innov., vol. 2, no. 1, p. 31, Dec. 2016.
S. Shokrollahi and F. Shams, “Rich Device-Services (RDS): A Service-Oriented Approach to the Internet of Things (IoT),” Wirel. Pers. Commun., vol. 97, no. 2, pp. 3183–3201, Nov. 2017.
T. Yang, H. Pen, W. Li, D. Yuan, and A. Y. Zomaya, “An Energy-Efficient Storage Strategy for Cloud Datacenters Based on Variable K-Coverage of a Hypergraph,” IEEE Trans. Parallel Distrib. Syst., vol. 28, no. 12, pp. 3344–3355, Dec. 2017.
X. Zhou, Q. Wu, B. Qin, X. Huang, and J. Liu, “Distributed Bitcoin Account Management,” in 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, pp. 105–112.
Y. Zhu, D. Dickinson, and J. Li, “Analysis on the influence factors of Bitcoin’s price based on VEC model,” Financ. Innov., vol. 3, no. 1, p. 3, Dec. 2017.
J. G. Fraser and A. Bouridane, “Have the security flaws surrounding BITCOIN effected the currency’s value?,” in 2017 Seventh International Conference on Emerging Security Technologies (EST), 2017, pp. 50–55.
S. Al-Sarawi, M. Anbar, K. Alieyan, and M. Alzubaidi, “Internet of Things (IoT) communication protocols: Review,” in 2017 8th International Conference on Information Technology (ICIT), 2017, pp. 685–690.
H. N. Saha et al., “Pollution control using Internet of Things (IoT),” in 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), 2017, pp. 65–68.
H. N. Saha et al., “Waste management using Internet of Things (IoT),” in 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), 2017, pp. 359–363.
W. Abderrahim and Z. Choukair, “The three-dimensional model for dependability integration in cloud computing,” Ann. Telecommun., vol. 72, no. 5–6, pp. 371–384, Jun. 2017.
S. Kethineni, Y. Cao, and C. Dodge, “Use of Bitcoin in Darknet Markets: Examining Facilitative Factors on Bitcoin-Related Crimes,” Am. J. Crim. Justice, pp. 1–17, May 2017.
I. Sohn, S. W. Yoon, and S. H. Lee, “Distributed scheduling using belief propagation for internet-of-things (IoT) networks,” Peer-to-Peer Netw. Appl., pp. 1–10, Oct. 2016.
G. Yao, Y. Ding, and K. Hao, “Using Imbalance Characteristic for Fault-Tolerant Workflow Scheduling in Cloud Systems,” IEEE Trans. Parallel Distrib. Syst., vol. 28, no. 12, pp. 3671–3683, Dec. 2017.
Y. Zhang and J. Wen, “The IoT electric business model: Using blockchain technology for the internet of things,” Peer-to-Peer Netw. Appl., vol. 10, no. 4, pp. 983–994, Jul. 2017.
W. Kinsner, “Towards cognitive security systems,” in 2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing, 2012, pp. 539–539.
J. M. Chang et al., “Capturing cognitive fingerprints from keystroke dynamics,” IT Prof., vol. 15, no. 4, pp. 24–28, 2013.
D. Krawczyk, J. Bartlett, M. Kantarcioglu, K. Hamlen, and B. Thuraisingham, “Measuring expertise and bias in cyber security using cognitive and neuroscience approaches,” in 2013 IEEE International Conference on Intelligence and Security Informatics, 2013, pp. 364–367.
L. Ogiela and M. R. Ogiela, Advances in cognitive information systems, vol. 17. Springer Science & Business Media, 2012.
IBM, “Cognitive_Security,” in IBM security, Estados Unidos, 2016, p. 11.
L. Ogiela and M. R. Ogiela, “Cognitive Systems and Artificial Brains,” Springer, Berlin, Heidelberg, 2012, pp. 99–106.
M. Radovan and B. Golub, “Trends in IoT security,” in 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017, pp. 1302–1308.
W. Hlaing, S. Thepphaeng, V. Nontaboot, N. Tangsunantham, T. Sangsuwan, and C. Pira, “Implementation of WiFi-based single phase smart meter for Internet of Things (IoT),” in 2017 International Electrical Engineering Congress (iEECON), 2017, pp. 1–4.
L. Ogiela and M. R. Ogiela, “Cognitive Information Systems,” Springer, Berlin, Heidelberg, 2012, pp. 51–60.
L. Ogiela and M. R. Ogiela, “Intelligent Cognitive Data Analysis Systems of the UBMSS Type as an Example of Cognitive Categorisation Systems,” Springer, Berlin, Heidelberg, 2012, pp. 61–73.
T. Yamauchi, “The Semantic Web and Human Inference: A Lesson from Cognitive Science,” Springer, Berlin, Heidelberg, 2007, pp. 609–622.
H. Zhang, A. Hussain, D. Liu, and Z. Wang, Eds., Advances in Brain Inspired Cognitive Systems, vol. 7366. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
C. Stary, “Special issue on recent advances in cognitive engineering,” J. Interact. Sci., vol. 3, no. 1, p. 4, Dec. 2015.
L. Ogiela and M. R. Ogiela, “Towards cognitive service management and semantic information sharing in the Cloud,” Multimed. Tools Appl., pp. 1–11, Oct. 2017.
Y. Wu and I. Niemegeers, “A Cognitive Architecture for Personal Networks,” Springer, Berlin, Heidelberg, 2006, pp. 12–24.
A.-M. Horcher and G. P. Tejay, “Building a better password: The role of cognitive load in information security training,” in 2009 IEEE International Conference on Intelligence and Security Informatics, 2009, pp. 113–118.
T. E. Carroll, F. L. Greitzer, and A. D. Roberts, “Security informatics research challenges for mitigating cyber friendly fire,” Secur. Inform., vol. 3, no. 1, p. 13, Dec. 2014.
G. Cybenko, A. Giani, and P. Thompson, “Cognitive hacking,” Adv. Comput., vol. 60, pp. 35–73, 2004.
A. D. W. Sumari and A. S. Ahmad, “Cogitive Artificial Intelligence: The fusion of Artificial Intelligence and information fusion,” in Electronics and Smart Devices (ISESD), International Symposium on, 2016, pp. 1–6.
L. Ogiela and M. R. Ogiela, “Towards cognitive cryptography,” J. Internet Serv. Inf. Secur., vol. 4, no. 1, pp. 58–63, 2014.
K. G. Kroeck, P. J. Kirs, and A. M. Fiedler, “Cognitive biasing effects in information systems: implications for linking real world information with human judgment,” in System Sciences, 1989. Vol. III: Decision Support and Knowledge Based Systems Track, Proceedings of the Twenty-Second Annual Hawaii International Conference on, 1989, vol. 3, pp. 517–524.
A. M. Gamundani, “An impact review on internet of things attacks,” in 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), 2015, pp. 114–118.
A. Ukil, J. Sen, and S. Koilakonda, “Embedded security for Internet of Things,” in 2011 2nd National Conference on Emerging Trends and Applications in Computer Science, 2011, pp. 1–6.
S. Alanazi et al., “On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications,” in 2015 17th International Conference on E-health Networking, Application & Services (HealthCom), 2015, pp. 205–210.
E. Ronen and A. Shamir, “Extended Functionality Attacks on IoT Devices: The Case of Smart Lights,” in 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 2016, pp. 3–12.
I. E. Baciu, “Advantages and Disadvantages of Cloud Computing Services, from the Employee’s Point of View.” 2015.
K. Dahbur, B. Mohammad, and A. B. Tarakji, “A survey of risks, threats and vulnerabilities in cloud computing,” in Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications - ISWSA ’11, 2011, pp. 1–6.
M. Bedford Taylor, “The Evolution of Bitcoin Hardware,” Computer (Long. Beach. Calif). vol. 50, no. 9, pp. 58–66, 2017.
D. Bradbury, “The problem with Bitcoin,” Comput. Fraud Secur., vol. 2013, no. 11, pp. 5–8, Nov. 2013.
.
DOI: https://doi.org/10.23857/pc.v3i5.640
Enlaces de Referencia
- Por el momento, no existen enlaces de referencia
Polo del Conocimiento
Revista Científico-Académica Multidisciplinaria
ISSN: 2550-682X
Casa Editora del Polo
Manta - Ecuador
Dirección: Ciudadela El Palmar, II Etapa, Manta - Manabí - Ecuador.
Código Postal: 130801
Teléfonos: 056051775/0991871420
Email: polodelconocimientorevista@gmail.com / director@polodelconocimiento.com
URL: https://www.polodelconocimiento.com/