Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions

In recent years, cloud computing has gained massive popularity in information technology and the industrial Internet of things. It provides facilities to the users over the wireless channel. Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components. Therefore, they fail to provide the techniques with their specialities as well as the previously available literature review is outdated. This paper presents the security for cloud computing models with a new aspect. Unlike the previously existing surveys, the literature review of this paper includes the latest research papers in the field of cloud security. Also, different classifications are made for cloud computing security on the basis of different cloud components that are used to secure the cloud models. Furthermore, a total of eleven (11) classifications are considered, which includes cloud components to secure the cloud systems. These classifications help the researchers to find out the desired technique used in a specific component to secure the cloud model. Moreover, the shortcoming of each component enables the researchers to design an optimal algorithm. Finally, future directions are given to highlight future research challenges that give paths to researchers.

[1]  ChatterjeeKakali,et al.  Cloud security issues and challenges , 2017 .

[2]  Abdellah Ezzati,et al.  Cloud security and privacy model for providing secure cloud services , 2016, 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech).

[3]  Muthu Ramachandran,et al.  Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .

[4]  Jin B. Hong,et al.  Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud , 2018, 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS).

[5]  Jeremy M. Kaplan,et al.  Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds , 2017, IEEE Transactions on Cloud Computing.

[6]  G Likitha Reddy,et al.  Survey of Cloud Computing and its Application , 2018 .

[7]  Surajit Dasgupta,et al.  Cloud computing security analysis: Challenges and possible solutions , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[8]  Sunil B. Mane,et al.  An analysis on data Accountability and Security in cloud , 2015, 2015 International Conference on Industrial Instrumentation and Control (ICIC).

[9]  RajaniKanth Aluvalu,et al.  A Survey on Access Control Models in Cloud Computing , 2015 .

[10]  Bin Xia,et al.  A Security Reputation Model for IoT Health Data Using S-AlexNet and Dynamic Game Theory in Cloud Computing Environment , 2019, IEEE Access.

[11]  Christoph Meinel,et al.  Leveraging Cloud Native Design Patterns for Security-as-a-Service Applications , 2017, 2017 IEEE International Conference on Smart Cloud (SmartCloud).

[12]  Valentina Casola,et al.  Cloud Security: From Per-Provider to Per-Service Security SLAs , 2016, 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS).

[13]  Deepak H. Sharma,et al.  Implementing Intrusion Management as Security-as-a-service from cloud , 2016, 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS).

[14]  Pengtao Liu Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing , 2020, IEEE Access.

[15]  Christopher Leckie,et al.  Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing , 2017, IEEE Transactions on Dependable and Secure Computing.

[16]  Hamidreza Navidi,et al.  Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model , 2017, The Journal of Supercomputing.

[17]  Rahul Rathore,et al.  SECURE: DYNAMIC DISTRIBUTED LOAD BALANCING TECHNIQUE IN CLOUD COMPUTING , 2018 .

[18]  Jin B. Hong,et al.  Systematic identification of threats in the cloud: A survey , 2019, Comput. Networks.

[19]  Habib Ullah Khan,et al.  Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review , 2020, IEEE Access.

[20]  Abhirup Khanna,et al.  Cloud security ecosystem for data security and privacy , 2017, 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence.

[21]  Napoleon Paxton,et al.  Cloud Security: A Review of Current Issues and Proposed Solutions , 2016, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC).

[22]  Nada Golmie,et al.  A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective , 2018, IEEE Access.

[23]  Habib Ullah Khan,et al.  Towards Energy-Efficient Framework for IoT Big Data Healthcare Solutions , 2020, Sci. Program..

[24]  O. Lindqvist,et al.  Osmotic interrelationship between blood and gut fluid in the isopod Porcellio scaber Latr. (Crustacea). , 1976, Comparative biochemistry and physiology. A, Comparative physiology.

[25]  Aitor Urbieta,et al.  Analysis of CoAP implementations for industrial Internet of Things: a survey , 2019, J. Ambient Intell. Humaniz. Comput..

[26]  Sachin Shetty,et al.  Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

[27]  Bing Xue,et al.  More Sustainability in Industry through Industrial Internet of Things , 2018 .

[28]  LiGuo Huang,et al.  A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds , 2016, Future Gener. Comput. Syst..

[29]  Hanqing Zhang,et al.  Research on Job Security Scheduling Strategy in Cloud Computing Model , 2015, 2015 International Conference on Intelligent Transportation, Big Data and Smart City.

[30]  Ahthasham Qureshi,et al.  Security Challenges over Cloud Environment from Service Provider Prospective , 2020 .

[31]  Sachin Shetty,et al.  An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks , 2017, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD).

[32]  Xiaotong Sun,et al.  Critical Security Issues in Cloud Computing: A Survey , 2018, 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS).

[33]  ChangVictor,et al.  Cloud computing adoption framework , 2016 .

[34]  Seungmin Kang,et al.  A Security-Aware Data Placement Mechanism for Big Data Cloud Storage Systems , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[35]  Yongqiang Lyu,et al.  Cloud storage security assessment through equilibrium analysis , 2019, Tsinghua Science and Technology.

[36]  Hu Zhengbing,et al.  Anomaly Detection System in Secure Cloud Computing Environment , 2017 .

[37]  Habib Ullah Khan,et al.  A Systematic Review on Cloud Storage Mechanisms Concerning e-Healthcare Systems , 2020, Sensors.

[38]  Francesco Palmieri,et al.  Non-deterministic security driven meta scheduler for distributed cloud organizations , 2017, Simul. Model. Pract. Theory.

[39]  Tzi-cker Chiueh,et al.  Security considerations in ITRI cloud OS , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).

[40]  Dusit Niyato,et al.  Joint pricing and security investment for cloud-insurance: A security interdependency perspective , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[41]  Jelena V. Misic,et al.  Security and Privacy of Connected Vehicular Cloud Computing , 2018, IEEE Netw..

[42]  T. Fatayer,et al.  MLSCPC: Multi-level security using covert channel to achieve privacy through cloud computing , 2015, 2015 World Symposium on Computer Networks and Information Security (WSCNIS).

[43]  Prachi,et al.  Cloud Computing Security: Amazon Web Service , 2015, 2015 Fifth International Conference on Advanced Computing & Communication Technologies.

[44]  Ervin Kusuma Dewi,et al.  Data security in cloud computing using AES under HEROKU cloud , 2018, 2018 27th Wireless and Optical Communication Conference (WOCC).

[45]  Adrian Graur,et al.  Security assessment of OpenStack cloud using outside and inside software tools , 2018, 2018 International Conference on Development and Application Systems (DAS).

[46]  Diao Zhe,et al.  Study on Data Security Policy Based on Cloud Storage , 2017, 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS).

[47]  Young Soo Kim,et al.  Toward the SIEM architecture for cloud-based security services , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[48]  Changhoon Lee,et al.  A Security Protection Framework for Cloud Computing , 2016, J. Inf. Process. Syst..

[49]  Changyong Liang,et al.  Openness and Security in Cloud Computing Services: Assessment Methods and Investment Strategies Analysis , 2019, IEEE Access.

[50]  Aitor Urbieta,et al.  Analysis of CoAP implementations for industrial Internet of Things: a survey , 2019, ANT/SEIT.

[51]  Ali Ibrahim El-Desouky,et al.  Enhanced QoS-Based Model for Trust Assessment in Cloud Computing Environment , 2020, IEEE Access.

[52]  Wang Weihong,et al.  Secure big data storage and sharing scheme for cloud tenants , 2015, China Communications.

[53]  Yang Li,et al.  Cloud service reliability modelling and optimal task scheduling , 2017, IET Commun..

[54]  Muthu Ramachandran,et al.  Towards performance evaluation of cloud service providers for cloud data security , 2016, Int. J. Inf. Manag..

[55]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[56]  Xiangjian He,et al.  Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..

[57]  Liu Qing,et al.  Research on key technology of network security situation awareness of private cloud in enterprises , 2018, 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA).

[58]  Theodosis Dimitrakos,et al.  Managed security service distribution model , 2016, 2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS).

[59]  Peng-Yu Wang,et al.  A Secure Management Scheme Designed in Cloud , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[60]  Ernesto Damiani,et al.  A Security Benchmark for OpenStack , 2017, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD).

[61]  Muthu Ramachandran,et al.  Towards Achieving Data Security with the Cloud Computing Adoption Framework , 2016, IEEE Transactions on Services Computing.

[62]  Issa M. Khalil,et al.  Cloud Computing Security: A Survey , 2014, Comput..

[63]  Kakali Chatterjee,et al.  Cloud security issues and challenges: A survey , 2017, J. Netw. Comput. Appl..

[64]  Jagroop Kaur,et al.  Cloud computing security issues and its solution: A review , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).

[65]  Mohsine Eleuldj,et al.  Vulnerabilities and storage security in cloud computing , 2015, 2015 International Conference on Cloud Technologies and Applications (CloudTech).

[66]  Keping Yu,et al.  AuthPrivacyChain: A Blockchain-Based Access Control Framework With Privacy Protection in Cloud , 2020, IEEE Access.

[67]  Jayashree Agarkhed,et al.  An efficient auditing scheme for data storage security in cloud , 2017, 2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT).

[68]  Fahd M. Al-Dosari,et al.  A Secure Cloud Computing Model based on Data Classification , 2015, ANT/SEIT.

[69]  Neeraj Suri,et al.  Quantitative Reasoning about Cloud Security Using Service Level Agreements , 2017, IEEE Transactions on Cloud Computing.