A Review on Cyber Security Issues in IOT-Based Cloud Computing
Keywords:
Cloud computing, IoT, security, cybersecurity, authenticationAbstract
With the flexible architecture that cloud computing provides, data along with resources may be distributed across numerous diverse places as well as accessed by different industries. As well, the internet of things (IoT) has pointedly upgraded since cloud computing was combined. Cloud computing is becoming a viable technological and financial option for supporting both real-time along with non-real-time data in an IoT environment. However, the cloud rapid shift brought up a several security issues. Old security actions don't instantly spread over to cloud-rooted systems along with can be inadequate. The online monitoring of security attacks is addressed in this work, and several machines learning along with deep learning algorithms. Additionally, a few cryptographic-related authentication methods are explored. This paper identifies key research needs in the IoT-based cloud architecture after presenting the technological obstacles noted in the earlier studies. This paper presents future research prospects to avoid and mitigate cybersecurity risks in cloud computing based on the review completed.
Downloads
References
Stergiou, Christos L., Elisavet Bompoli, and Konstantinos E. Psannis. "Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario." Applied Sciences 13, no. 2 (2023): 758.
Almolhis, Nawaf, Abdullah Mujawib Alashjaee, Salahaldeen Duraibi, Fahad Alqahtani, and Ahmed Nour Moussa. "The security issues in IoT-cloud: a review." In 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), pp. 191-196. IEEE, 2020.
Kimani, Kenneth, Vitalice Oduol, and Kibet Langat. "Cyber security challenges for IoT-based smart grid networks." International journal of critical infrastructure protection 25 (2019): 36-49.
Ahmad, Waqas, Aamir Rasool, Abdul Rehman Javed, Thar Baker, and Zunera Jalil. "Cyber security in IoT-based cloud computing: A comprehensive survey." Electronics 11, no. 1 (2021): 16.
Ding, Li, Zhongsheng Wang, Xiaodong Wang, and Dong Wu. "Security information transmission algorithms for IoT based on cloud computing." Computer Communications 155 (2020): 32-39.
Chaudhry, Shehzad Ashraf, Khalid Yahya, Fadi Al-Turjman, and Ming-Hour Yang. "A secure and reliable device access control scheme for IoT based sensor cloud systems." IEEE Access 8 (2020): 139244-139254.
Naeem, Humaira. "Analysis of Network Security in IoT-based Cloud Computing Using Machine Learning." International Journal for Electronic Crime Investigation 7, no. 2 (2023).
Chakraborty, Alakananda, Muskan Jindal, Mohammad R. Khosravi, Prabhishek Singh, Achyut Shankar, and Manoj Diwakar. "A secure IoT-based cloud platform selection using entropy distance approach and fuzzy set theory." Wireless Communications and Mobile Computing 2021 (2021): 1-11.
Yu, Yicheng, Liang Hu, and Jianfeng Chu. "A secure authentication and key agreement schaeme for IoT-based cloud computing environment." Symmetry 12, no. 1 (2020): 150.
Zhou, Lu, Xiong Li, Kuo-Hui Yeh, Chunhua Su, and Wayne Chiu. "Lightweight IoT-based authentication scheme in cloud computing circumstance." Future generation computer systems 91 (2019): 244-251.
Wang, Feifei, Guosheng Xu, Guoai Xu, Yuejie Wang, and Junhao Peng. "A robust IoT-based three-factor authentication scheme for cloud computing resistant to session key exposure." Wireless Communications and Mobile Computing 2020 (2020): 1-15.
Martínez-Peláez, Rafael, Homero Toral-Cruz, Jorge R. Parra-Michel, Vicente García, Luis J. Mena, Vanessa G. Félix, and Alberto Ochoa-Brust. "An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances." Sensors 19, no. 9 (2019): 2098.
Salim, Mikail Mohammed, Shailendra Rathore, and Jong Hyuk Park. "Distributed denial of service attacks and its defenses in IoT: a survey." The Journal of Supercomputing 76 (2020): 5320-5363.
Syed, Naeem Firdous, Zubair Baig, Ahmed Ibrahim, and Craig Valli. "Denial of service attack detection through machine learning for the IoT." Journal of Information and Telecommunication 4, no. 4 (2020): 482-503.
Velliangiri, S., P. Karthikeyan, and V. Vinoth Kumar. "Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks." Journal of Experimental & Theoretical Artificial Intelligence 33, no. 3 (2021): 405-424.
Ogini, Nicholas Oluwole, Wilfred Adigwe, and Noah Oghenefego Ogwara. "Distributed Denial Of Service Attack Detection And Prevention Model For Iot-Based Computing Environment Using Ensemble Machine Learning Approach." (2022).
Zaguia, Atef. "Personal Healthcare Data Records Analysis and Monitoring using The Internet of Things and Cloud Computing." Avicenna 2023, no. 1 (2023): 4.
Gayathri, Rajakumaran, Shola Usharani, Miroslav Mahdal, Rajasekharan Vezhavendhan, Rajiv Vincent, Murugesan Rajesh, and Muniyandy Elangovan. "Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques." Sensors 23, no. 3 (2023): 1708.
Khan, Habib Ullah, Muhammad Sohail, Farhad Ali, Shah Nazir, Yazeed Yasin Ghadi, and Inam Ullah. "Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices." Physical Communication 59 (2023): 102084.
Shafiq, Muhammad, Zhaoquan Gu, Omar Cheikhrouhou, Wajdi Alhakami, and Habib Hamam. "The rise of “Internet of Things”: review and open research issues related to detection and prevention of IoT-based security attacks." Wireless Communications and Mobile Computing 2022 (2022): 1-12.
Moubayed, Abdallah, Ahmed Refaey, and Abdallah Shami. "Software-defined perimeter (sdp): State of the art secure solution for modern networks." IEEE network 33, no. 5 (2019): 226-233.
Eskandari, Mojtaba, Zaffar Haider Janjua, Massimo Vecchio, and Fabio Antonelli. "Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices." IEEE Internet of Things Journal 7, no. 8 (2020): 6882-6897.
Rachit, Shobha Bhatt, and Prakash Rao Ragiri. "Security trends in Internet of Things: A survey." SN Applied Sciences 3 (2021): 1-14.
Rashid, Md Mamunur, Joarder Kamruzzaman, Mohammad Mehedi Hassan, Tasadduq Imam, and Steven Gordon. "Cyberattacks detection in iot-based smart city applications using machine learning techniques." International Journal of environmental research and public health 17, no. 24 (2020): 9347.
Tzagkarakis, Christos, Nikolaos Petroulakis, and Sotiris Ioannidis. "Botnet attack detection at the IoT edge based on sparse representation." In 2019 Global IoT Summit (GIoTS), pp. 1-6. IEEE, 2019.
Meidan, Yair, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Asaf Shabtai, Dominik Breitenbacher, and Yuval Elovici. "N-baiot—network-based detection of iot botnet attacks using deep autoencoders." IEEE Pervasive Computing 17, no. 3 (2018): 12-22.
Hosseinpour, Farhoud, Payam Vahdani Amoli, Juha Plosila, Timo Hämäläinen, and Hannu Tenhunen. "An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach." International Journal of Digital Content Technology and its Applications 10, no. 5 (2016).
Snehi, Manish, and Abhinav Bhandari. "Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks." Computer Science Review 40 (2021): 100371.
Sajid, Faiqa, Muhammad Abul Hassan, Ayaz Ali Khan, Muhammad Rizwan, Natalia Kryvinska, Karovič Vincent, and Inam Ullah Khan. "Secure and efficient data storage operations by using intelligent classification technique and RSA algorithm in IoT-based cloud computing." Scientific Programming 2022 (2022): 1-10.
Refaee, Eshrag, Shabana Parveen, Khan Mohamed Jarina Begum, Fatima Parveen, M. Chithik Raja, Shashi Kant Gupta, and Santhosh Krishnan. "Secure and scalable healthcare data transmission in IoT based on optimized routing protocols for mobile computing applications." Wireless Communications and Mobile Computing 2022 (2022): 1-12.
Patil, Rupali S., Amina Kotwal, And Swati S. Patil. "Efficient Iot-Based Cloud Computing Framework For Secure Data Storage Using Machine Learning Algorithm." Journal Of Theoretical And Applied Information Technology 101, No. 10 (2023).
Deepika, J., C. Rajan, and T. Senthil. "Security and privacy of cloud-and IoT-based medical image diagnosis using fuzzy convolutional neural network." Computational Intelligence and Neuroscience 2021 (2021): 1-17.
Ahmed, Afsheen, Rabia Latif, Seemab Latif, Haider Abbas, and Farrukh Aslam Khan. "Malicious insiders attack in IoT based multi-cloud e-healthcare environment: a systematic literature review." Multimedia Tools and Applications 77 (2018): 21947-21965.
Zhu, Hongliang, Ying Yuan, Yuling Chen, Yaxing Zha, Wanying Xi, Bin Jia, and Yang Xin. "A secure and efficient data integrity verification scheme for cloud-IoT based on short signature." IEEE Access 7 (2019): 90036-90044.
Kaur, Gaganjot, and Prinima Gupta. "Detection of distributed denial of service attacks for IoT-based healthcare systems." Computer Assisted Methods in Engineering and Science 30, no. 2 (2022): 167-186.
Syed, Naeem Firdous. "IoT-MQTT based denial of service attack modelling and detection." (2020).
Abdullayeva, Fargana J. "Distributed denial of service attack detection in E-government cloud via data clustering." Array 15 (2022): 100229.
Hussain, Altaf, Amir Hussain, Shah Marjan, Mehmood Baryalai, Zubair Zaland, Abdul Wahid, and Shumaila Hussain. "Cyber Security Challenges and Attacks and Countermeasures for IoT-Based Smart Home." Journal of Applied and Emerging Sciences 12, no. 2 (2022): 166-172.
Alkhamisi, Khalid. "An Analysis of Security Attacks on IoT Applications." International Journal of Information Systems and Computer Technologies 2, no. 1 (2023).
Aboti, Chiragkumar D. "Studies of Challenges to Mitigating Cyber Risks in IoT-Based Commercial Aviation." International Journal for Scientific Research and Development 7 (2020): 133-139.
Jadhav, Ravi, and Harshad Ithape. "Security Challenges observed in IoT-Enabled Cloud Infrastructure: A Review."
Pothuganti, Swathi. "Overview on security issues in cloud computing." (2020).
Nasir, Muhammad Hassan, Junaid Arshad, and Muhammad Mubashir Khan. "Collaborative device-level botnet detection for internet of things." Computers & Security 129 (2023): 103172.
Kalidindi, Archana, and Mahesh Babu Arrama. "Enhancing IoT Security with Deep Stack Encoder using Various Optimizers for Botnet Attack Prediction." International Journal of Advanced Computer Science and Applications 14, no. 6 (2023).
Ganapathy, Sannasi. "A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications." Computer Networks 151 (2019): 181-190.
Wang, Mingzhe, and Qiuliang Zhang. "Optimized data storage algorithm of IoT based on cloud computing in distributed system." Computer Communications 157 (2020): 124-131.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.