Open Access Open Access  Restricted Access Subscription Access

A Comprehensive Survey of IoT- Based Cloud Computing Cyber Security


Affiliations
1 Lincoln University, Malaysia
 

The flexible architecture offered by cloud computing allows for the dispersion of resources and data over numerous places, making it possible to access them from a variety of industrial settings. The use, storage, and sharing of resources such as data, services, and industrial applications have all changed as a result of cloud computing. In the past ten years, companies have quickly shifted to cloud computing in order to benefit from increased performance, lower costs, and more extensive access. Additionally, the internet of things (IoT) has significantly improved when cloud computing was incorporated. However, this quick shift to the cloud brought up a number of security concerns and challenges. Traditional security measures don't immediately apply to cloud-based systems and are occasionally inadequate. Despite the widespread use and proliferation of various cyber weapons, cloud platform issues and security concerns have been addressed over the last three years.Deep learning's (DL) quick development in the field of artificial intelligence (AI) has produced a number of advantages that can be used to cloud-based industrial security concerns. The following are some of the research's findings, We provide a detailed evaluation of the structure, services, configurations, and security fashions that enable cloud-primarily based IoT. We additionally classify cloud protection dangers in IoT into four foremost areas (records, network and carrier, programs, and gadgets). We discuss the technological issues raised in the literature before identifying key research gaps. In each class, describe the boundaries using a popular, artificial intelligence, and in-depth studying attitude. and security concerns relating to individuals), which are fully covered, we find and analyze the most recent cloud-primarily based IoT attack innovations, we identify, talk, and verify key safety challenges show the regulations from a standard, synthetic intelligence, and deep learning perspective in every class angle, we first present the technological difficulties identified in the literature before identifyingIoT-based cloud infrastructure has significant research gaps which should be highlighted for future research orientations. Cloud computing and cyber security.


Keywords

Cloud Configuration; Cyber Security; Cloud Computing; Deep Gaining Knowledge; Forensic as a Service; Gadget Studying (Faas); Improvement as a Carrier (Daas); Infrastructure as a Service (Iaas); IoT Safety; Platform as a Provider (Paas), Software Program
User
Notifications
Font Size

  • Rizwan, M., Shabbir, M., Nebhen, J., Javed, A.R., Chakraborty, C., Mohiyuddin, A. Using an Adaptive Neuro-Fuzzy Inference System, secure cloud storage is provided for medical IoT data. Int. J. Fuzzy Syst. 2021, 1–13
  • Taleb-Bendiab, A., Baker, T., and Karam, Y. Support for intention-driven elastic cloud computing in terms of security. The Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation was held in Malta, Malta, from November 14–16, 2012; proceedings are available online.
  • Rizwan, M., Jalil, Z., Anajemba, J.H., and Biamba; Abid, R.; Iwendi, C.; Javed, A.R. a homomorphic CRT-RSA technique that has been optimised for speed and security. Ubiquitous Computing 2021, 1–14. Pers.
  • Mobile Cloud Computing Framework for Securing Data by Ikram, A.A., Javed, A.R., Rizwan, M., Abid, R., Crichigno, J., and Srivastava, G. Brno, Czech Republic, 26–28 July 2021; Proceedings of the 2021 44th International Conference on Telecommunications and Signal Processing (TSP); pp. 309–315
  • The Top 10 Strategic Technology Trends for 2020 from Gartner. The top 10 strategic technology trends for 2020 are accessible online at https://www.gartner.com/ smarterwithgartner/. (viewed on August 8, 2020). Who First Coined Cloud Computing?
  • Regalado ,A. 2011-10-31, MIT Technology Review. Online at: https://www. technologyreview.com/2011/10/31/257406/ who-coined-cloud-computing (viewed on August 8, 2020).
  • Announcing Amazon Elastic Compute Cloud (Amazon EC2)—Beta. 2006. AmazonWeb Services, Inc. Announcing Amazon Elastic Compute Cloud and Amazon EC2 Beta is available online at https://aws.amazon. com/about-aws/whats-new/2006/08/24/ (viewed on August 8, 2020).
  • Blogspot.com for Google App Engine. Welcome to Our New Blog + Google App Engine. 2008. https://googleappengine. blogspot.com/2008/04/introducing-google- app-engine-our-new.html (viewed on August 8, 2020).
  • Elmroth, E., D. Henriksson, and L. Larsson scheduling and observing of services that are internally organised in cloud federations. The 2011 IEEE Symposium on Computers and Communications (ISCC), held in Kerkyra, Greece, from June 28 to July 1, was published in the proceedings at pages 173–178.
  • Hauger, D.; Microsoft News Center Staff; Editor of the Microsoft Blog. Windows Azure is now generally accessible. Microsoft's official blog, February 1, 2020. The following link is available online: http://blogs.microsoft.com/ blog/2010/02/01/windows-azure-general- availability(viewed on August 8, 2020).
  • Dzone.com is Which Is Better: Open Stack vs. Apache Cloud Stack? Cloud DZone. 2016. Online at: https://dzone.com/articles/apache- cloudstack-vs-openstack-which-is-the-best (accessed on 8 August 2020).
  • The National Institute of Standards and Technology, Gaithersburg, Maryland, USA, Special Publication (NIST SP) Series, The NIST Definition of Cloud Computing, P. Mell and T. Grance, 2011.
  • Baker, T., Ghobaei-Arani, M., Souri, A., and Hussien ControCity: An autonomous method for managing buffers in a cloud computing environment to control elasticity. 2019 IEEE Access 7, 106912–106924
  • M. Shabbir, A. Shabbir, C. Iwendi, M. Rizwan, N. Herencsar, and J. C. W. Lin. improving the security of health information utilising mobile cloud computing's modular encryption standard. 8820–8834 IEEE Access 2021, 9.
  • Taleb-Bendiab, A., Mackay, M., Randles, T. Support for runtime adaptive autonomic cloud-based applications through intention- oriented programming. 2013, 39, 2400–2412, Comput. Electr. Eng. [CrossRef]
  • M. Al-Khafajiy; T. Baker; M. Asim; Z. Guo; R. Ranjan; A. Longo; D. Puthal; and M. Taylor A fog computing approach to trust management. 2020, 137, J. Parallel Distributed Computing.
  • Xia, T., Washikaki, H., Fukazawa, Y., Kaiya, H., Ogata, S., Fernandez, E.B., Kato, T., Kanuka, H., Okubo, T., Yoshioka, N., et al CSPM stands for Cloud Service Product Metamodel for Handling Security and Privacy Knowledge. Int. J. Syst. Softw. Secur. Prot. (IJSSSP) 2021, 12, 68-85. [CrossRef]
  • Cloud Security and Privacy, by Mather, Kumaraswamy, and Latif; published 2009; Sebastopol, California, USA: OReilly Media Inc.
  • Four Trends Affecting Cloud Adoption by 2020. Online at: https://www.gartner.com/ smarterwithgartner/4-trendsimpacting-cloud- adoption-in-2020/ (found at 8 August 2020). Why Cloud Computing Cyber Security Risks Are Growing: Report
  • Su. J Why Cloud Computing Cyber Security Risks Are Growing: Report, 2019 July 25 Forbes. You can access it online at https://www. forbes.com/sites/jeanbaptiste/2019/07/25/ why-cloud-computing-cyber-security-risks- are-on-the-rise-report/ #13a36bfc5621 (accessed on 8 August 2020).

Abstract Views: 110

PDF Views: 1




  • A Comprehensive Survey of IoT- Based Cloud Computing Cyber Security

Abstract Views: 110  |  PDF Views: 1

Authors

SHIPRA YADAV
Lincoln University, Malaysia

Abstract


The flexible architecture offered by cloud computing allows for the dispersion of resources and data over numerous places, making it possible to access them from a variety of industrial settings. The use, storage, and sharing of resources such as data, services, and industrial applications have all changed as a result of cloud computing. In the past ten years, companies have quickly shifted to cloud computing in order to benefit from increased performance, lower costs, and more extensive access. Additionally, the internet of things (IoT) has significantly improved when cloud computing was incorporated. However, this quick shift to the cloud brought up a number of security concerns and challenges. Traditional security measures don't immediately apply to cloud-based systems and are occasionally inadequate. Despite the widespread use and proliferation of various cyber weapons, cloud platform issues and security concerns have been addressed over the last three years.Deep learning's (DL) quick development in the field of artificial intelligence (AI) has produced a number of advantages that can be used to cloud-based industrial security concerns. The following are some of the research's findings, We provide a detailed evaluation of the structure, services, configurations, and security fashions that enable cloud-primarily based IoT. We additionally classify cloud protection dangers in IoT into four foremost areas (records, network and carrier, programs, and gadgets). We discuss the technological issues raised in the literature before identifying key research gaps. In each class, describe the boundaries using a popular, artificial intelligence, and in-depth studying attitude. and security concerns relating to individuals), which are fully covered, we find and analyze the most recent cloud-primarily based IoT attack innovations, we identify, talk, and verify key safety challenges show the regulations from a standard, synthetic intelligence, and deep learning perspective in every class angle, we first present the technological difficulties identified in the literature before identifyingIoT-based cloud infrastructure has significant research gaps which should be highlighted for future research orientations. Cloud computing and cyber security.


Keywords


Cloud Configuration; Cyber Security; Cloud Computing; Deep Gaining Knowledge; Forensic as a Service; Gadget Studying (Faas); Improvement as a Carrier (Daas); Infrastructure as a Service (Iaas); IoT Safety; Platform as a Provider (Paas), Software Program

References





DOI: https://doi.org/10.13005/ojcst15.010203.04