A Secure IoT-Based Cloud Platform Selection Using Entropy Distance Approach and Fuzzy Set Theory

With the growing emergence of the Internet connectivity in this era of Gen Z, several IoT solutions have come into existence for exchanging large scale of data securely, backed up by their own unique cloud service providers (CSPs). It has, therefore, generated the need for customers to decide the IoT cloud platform to suit their vivid and volatile demands in terms of attributes like security and privacy of data, performance efficiency, cost optimization, and other individualistic properties as per unique user. In spite of the existence of many software solutions for this decision-making problem, they have been proved to be inadequate considering the distinct attributes unique to individual user. This paper proposes a framework to represent the selection of IoT cloud platform as a MCDM problem, thereby providing a solution of optimal efficacy with a particular focus in user-specific priorities to create a unique solution for volatile user demands and agile market trends and needs using optimized distance-based approach (DBA) aided by Fuzzy Set Theory.

[1]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[2]  Farookh Khadeer Hussain,et al.  Parallel Cloud Service Selection and Ranking Based on QoS History , 2014, International Journal of Parallel Programming.

[3]  Martin Pelikan,et al.  An introduction and survey of estimation of distribution algorithms , 2011, Swarm Evol. Comput..

[4]  Pankaj Ganguly Selecting the right IoT cloud platform , 2016, 2016 International Conference on Internet of Things and Applications (IOTA).

[5]  Pradeep Yadav,et al.  A Survey on IOT enabled cloud platforms , 2020, 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT).

[6]  Laszlo Toka,et al.  5G support for Industrial IoT Applications— Challenges, Solutions, and Research gaps , 2020, Sensors.

[7]  Xiang Li,et al.  Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach , 2019, IEEE Access.

[8]  Riqing Chen,et al.  Evaluating IoT Platforms Using Integrated Probabilistic Linguistic MCDM Method , 2020, IEEE Internet of Things Journal.

[9]  Ahmad Kamil Mahmood,et al.  Trust -Based Service Selection in Public Cloud Computing Using Fuzzy Modified VIKOR Method , 2013 .

[10]  Shiju Satyadevan,et al.  Security, Trust and Implementation Limitations of Prominent IoT Platforms , 2014, FICTA.

[11]  Valery V. Korotaev,et al.  In.IoT—A New Middleware for Internet of Things , 2021, IEEE Internet of Things Journal.

[12]  Twenty-One Key Factors to Choose an IoT Platform: Theoretical Framework and Its Applications , 2020, IEEE Internet of Things Journal.

[13]  João Paulo Papa,et al.  Internet of Things: A survey on machine learning-based intrusion detection approaches , 2019, Comput. Networks.

[14]  Rakesh D. Raut,et al.  To identify the determinants of the CloudIoT technologies adoption in the Indian MSMEs: structural equation modelling approach , 2019, Int. J. Bus. Inf. Syst..

[15]  Xiaolei Dong,et al.  Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.

[16]  Smriti Bhatt,et al.  Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases , 2019, 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC).

[17]  Ahmad Almogren,et al.  Security Challenges and Strategies for the IoT in Cloud Computing , 2020, 2020 11th International Conference on Information and Communication Systems (ICICS).

[18]  Ahmed E. Youssef An Integrated MCDM Approach for Cloud Service Selection Based on TOPSIS and BWM , 2020, IEEE Access.

[19]  Salahaldeen Duraibi,et al.  The Security Issues in IoT - Cloud: A Review , 2020, 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA).

[20]  Nirvana Meratnia,et al.  Comparing Apples and Oranges in IoT Context: A Deep Dive Into Methods for Comparing IoT Platforms , 2020, IEEE Internet of Things Journal.

[21]  Mohammad Mehedi Hassan,et al.  A Robust Deep-Learning-Enabled Trust-Boundary Protection for Adversarial Industrial IoT Environment , 2021, IEEE Internet of Things Journal.

[22]  Xun Xu,et al.  IoT-enabled cloud-based additive manufacturing platform to support rapid product development , 2018, Int. J. Prod. Res..