Loading…

Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions

In recent years, cloud computing has gained massive popularity in information technology and the industrial Internet of things. It provides facilities to the users over the wireless channel. Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify t...

Full description

Saved in:
Bibliographic Details
Published in:Scientific programming 2020, Vol.2020 (2020), p.1-31
Main Authors: Khan, Muazzam A., Deng, Lianwen, Ali, Ihsan, Almogren, Ahmad, Khan, Mahnoor, Shah, Sahar, Luo, Heng
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c360t-8f90964a4741053bb3d0163f3b99212022601163aac3779223e989eb4db33c563
cites cdi_FETCH-LOGICAL-c360t-8f90964a4741053bb3d0163f3b99212022601163aac3779223e989eb4db33c563
container_end_page 31
container_issue 2020
container_start_page 1
container_title Scientific programming
container_volume 2020
creator Khan, Muazzam A.
Deng, Lianwen
Ali, Ihsan
Almogren, Ahmad
Khan, Mahnoor
Shah, Sahar
Luo, Heng
description In recent years, cloud computing has gained massive popularity in information technology and the industrial Internet of things. It provides facilities to the users over the wireless channel. Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components. Therefore, they fail to provide the techniques with their specialities as well as the previously available literature review is outdated. This paper presents the security for cloud computing models with a new aspect. Unlike the previously existing surveys, the literature review of this paper includes the latest research papers in the field of cloud security. Also, different classifications are made for cloud computing security on the basis of different cloud components that are used to secure the cloud models. Furthermore, a total of eleven (11) classifications are considered, which includes cloud components to secure the cloud systems. These classifications help the researchers to find out the desired technique used in a specific component to secure the cloud model. Moreover, the shortcoming of each component enables the researchers to design an optimal algorithm. Finally, future directions are given to highlight future research challenges that give paths to researchers.
doi_str_mv 10.1155/2020/8871315
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2458477145</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2458477145</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-8f90964a4741053bb3d0163f3b99212022601163aac3779223e989eb4db33c563</originalsourceid><addsrcrecordid>eNqF0E1LwzAYB_AiCs7pzbMEPLq6vLVNvEl1OpgoOMFbSdvUZaxJTVLnvr0ZFTx6ykP48bz8o-gcwWuEkmSKIYZTxjJEUHIQjRDLkpgj_n4YapiwmGNKj6MT59YQIoYgHEXdq6x6q_wOPEnheitbqT1QGsx13TtvldiAuVmCrfIrkG9MX4PctF3vlf4AL9K6TlZefckbsBTfRpt2NwFz53rpJkDoGsx6H5qCO2X3zmh3Gh01YuPk2e87jt5m98v8MV48P8zz20VckRT6mDUc8pQKmtGwOilLUkOUkoaUnGMUDsUpROFDiIpkGceYSM64LGldElIlKRlHl0PfzprPsI4v1qa3OowsME0YzTJEk6Amg6qscc7KpuisaoXdFQgW-0yLfabFb6aBXw18pXQttuo_fTFoGYxsxJ_GkOOMkR-DuH9V</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2458477145</pqid></control><display><type>article</type><title>Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions</title><source>Open Access: Wiley-Blackwell Open Access Journals</source><creator>Khan, Muazzam A. ; Deng, Lianwen ; Ali, Ihsan ; Almogren, Ahmad ; Khan, Mahnoor ; Shah, Sahar ; Luo, Heng</creator><contributor>Nazir, Shah ; Shah Nazir</contributor><creatorcontrib>Khan, Muazzam A. ; Deng, Lianwen ; Ali, Ihsan ; Almogren, Ahmad ; Khan, Mahnoor ; Shah, Sahar ; Luo, Heng ; Nazir, Shah ; Shah Nazir</creatorcontrib><description>In recent years, cloud computing has gained massive popularity in information technology and the industrial Internet of things. It provides facilities to the users over the wireless channel. Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components. Therefore, they fail to provide the techniques with their specialities as well as the previously available literature review is outdated. This paper presents the security for cloud computing models with a new aspect. Unlike the previously existing surveys, the literature review of this paper includes the latest research papers in the field of cloud security. Also, different classifications are made for cloud computing security on the basis of different cloud components that are used to secure the cloud models. Furthermore, a total of eleven (11) classifications are considered, which includes cloud components to secure the cloud systems. These classifications help the researchers to find out the desired technique used in a specific component to secure the cloud model. Moreover, the shortcoming of each component enables the researchers to design an optimal algorithm. Finally, future directions are given to highlight future research challenges that give paths to researchers.</description><identifier>ISSN: 1058-9244</identifier><identifier>EISSN: 1875-919X</identifier><identifier>DOI: 10.1155/2020/8871315</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Access control ; Algorithms ; Artificial intelligence ; Classification ; Cloud computing ; Industrial applications ; Internet of Things ; Literature reviews ; Privacy ; Scientific papers ; Security ; Software services ; Taxonomy</subject><ispartof>Scientific programming, 2020, Vol.2020 (2020), p.1-31</ispartof><rights>Copyright © 2020 Sahar Shah et al.</rights><rights>Copyright © 2020 Sahar Shah et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-8f90964a4741053bb3d0163f3b99212022601163aac3779223e989eb4db33c563</citedby><cites>FETCH-LOGICAL-c360t-8f90964a4741053bb3d0163f3b99212022601163aac3779223e989eb4db33c563</cites><orcidid>0000-0002-8253-9709 ; 0000-0002-9549-2540</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,4024,27923,27924,27925</link.rule.ids></links><search><contributor>Nazir, Shah</contributor><contributor>Shah Nazir</contributor><creatorcontrib>Khan, Muazzam A.</creatorcontrib><creatorcontrib>Deng, Lianwen</creatorcontrib><creatorcontrib>Ali, Ihsan</creatorcontrib><creatorcontrib>Almogren, Ahmad</creatorcontrib><creatorcontrib>Khan, Mahnoor</creatorcontrib><creatorcontrib>Shah, Sahar</creatorcontrib><creatorcontrib>Luo, Heng</creatorcontrib><title>Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions</title><title>Scientific programming</title><description>In recent years, cloud computing has gained massive popularity in information technology and the industrial Internet of things. It provides facilities to the users over the wireless channel. Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components. Therefore, they fail to provide the techniques with their specialities as well as the previously available literature review is outdated. This paper presents the security for cloud computing models with a new aspect. Unlike the previously existing surveys, the literature review of this paper includes the latest research papers in the field of cloud security. Also, different classifications are made for cloud computing security on the basis of different cloud components that are used to secure the cloud models. Furthermore, a total of eleven (11) classifications are considered, which includes cloud components to secure the cloud systems. These classifications help the researchers to find out the desired technique used in a specific component to secure the cloud model. Moreover, the shortcoming of each component enables the researchers to design an optimal algorithm. Finally, future directions are given to highlight future research challenges that give paths to researchers.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Classification</subject><subject>Cloud computing</subject><subject>Industrial applications</subject><subject>Internet of Things</subject><subject>Literature reviews</subject><subject>Privacy</subject><subject>Scientific papers</subject><subject>Security</subject><subject>Software services</subject><subject>Taxonomy</subject><issn>1058-9244</issn><issn>1875-919X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNqF0E1LwzAYB_AiCs7pzbMEPLq6vLVNvEl1OpgoOMFbSdvUZaxJTVLnvr0ZFTx6ykP48bz8o-gcwWuEkmSKIYZTxjJEUHIQjRDLkpgj_n4YapiwmGNKj6MT59YQIoYgHEXdq6x6q_wOPEnheitbqT1QGsx13TtvldiAuVmCrfIrkG9MX4PctF3vlf4AL9K6TlZefckbsBTfRpt2NwFz53rpJkDoGsx6H5qCO2X3zmh3Gh01YuPk2e87jt5m98v8MV48P8zz20VckRT6mDUc8pQKmtGwOilLUkOUkoaUnGMUDsUpROFDiIpkGceYSM64LGldElIlKRlHl0PfzprPsI4v1qa3OowsME0YzTJEk6Amg6qscc7KpuisaoXdFQgW-0yLfabFb6aBXw18pXQttuo_fTFoGYxsxJ_GkOOMkR-DuH9V</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Khan, Muazzam A.</creator><creator>Deng, Lianwen</creator><creator>Ali, Ihsan</creator><creator>Almogren, Ahmad</creator><creator>Khan, Mahnoor</creator><creator>Shah, Sahar</creator><creator>Luo, Heng</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-8253-9709</orcidid><orcidid>https://orcid.org/0000-0002-9549-2540</orcidid></search><sort><creationdate>2020</creationdate><title>Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions</title><author>Khan, Muazzam A. ; Deng, Lianwen ; Ali, Ihsan ; Almogren, Ahmad ; Khan, Mahnoor ; Shah, Sahar ; Luo, Heng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-8f90964a4741053bb3d0163f3b99212022601163aac3779223e989eb4db33c563</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Classification</topic><topic>Cloud computing</topic><topic>Industrial applications</topic><topic>Internet of Things</topic><topic>Literature reviews</topic><topic>Privacy</topic><topic>Scientific papers</topic><topic>Security</topic><topic>Software services</topic><topic>Taxonomy</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Khan, Muazzam A.</creatorcontrib><creatorcontrib>Deng, Lianwen</creatorcontrib><creatorcontrib>Ali, Ihsan</creatorcontrib><creatorcontrib>Almogren, Ahmad</creatorcontrib><creatorcontrib>Khan, Mahnoor</creatorcontrib><creatorcontrib>Shah, Sahar</creatorcontrib><creatorcontrib>Luo, Heng</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Scientific programming</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Khan, Muazzam A.</au><au>Deng, Lianwen</au><au>Ali, Ihsan</au><au>Almogren, Ahmad</au><au>Khan, Mahnoor</au><au>Shah, Sahar</au><au>Luo, Heng</au><au>Nazir, Shah</au><au>Shah Nazir</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions</atitle><jtitle>Scientific programming</jtitle><date>2020</date><risdate>2020</risdate><volume>2020</volume><issue>2020</issue><spage>1</spage><epage>31</epage><pages>1-31</pages><issn>1058-9244</issn><eissn>1875-919X</eissn><abstract>In recent years, cloud computing has gained massive popularity in information technology and the industrial Internet of things. It provides facilities to the users over the wireless channel. Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components. Therefore, they fail to provide the techniques with their specialities as well as the previously available literature review is outdated. This paper presents the security for cloud computing models with a new aspect. Unlike the previously existing surveys, the literature review of this paper includes the latest research papers in the field of cloud security. Also, different classifications are made for cloud computing security on the basis of different cloud components that are used to secure the cloud models. Furthermore, a total of eleven (11) classifications are considered, which includes cloud components to secure the cloud systems. These classifications help the researchers to find out the desired technique used in a specific component to secure the cloud model. Moreover, the shortcoming of each component enables the researchers to design an optimal algorithm. Finally, future directions are given to highlight future research challenges that give paths to researchers.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2020/8871315</doi><tpages>31</tpages><orcidid>https://orcid.org/0000-0002-8253-9709</orcidid><orcidid>https://orcid.org/0000-0002-9549-2540</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1058-9244
ispartof Scientific programming, 2020, Vol.2020 (2020), p.1-31
issn 1058-9244
1875-919X
language eng
recordid cdi_proquest_journals_2458477145
source Open Access: Wiley-Blackwell Open Access Journals
subjects Access control
Algorithms
Artificial intelligence
Classification
Cloud computing
Industrial applications
Internet of Things
Literature reviews
Privacy
Scientific papers
Security
Software services
Taxonomy
title Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T11%3A10%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Measurement%20in%20Industrial%20IoT%20with%20Cloud%20Computing%20Perspective:%20Taxonomy,%20Issues,%20and%20Future%20Directions&rft.jtitle=Scientific%20programming&rft.au=Khan,%20Muazzam%20A.&rft.date=2020&rft.volume=2020&rft.issue=2020&rft.spage=1&rft.epage=31&rft.pages=1-31&rft.issn=1058-9244&rft.eissn=1875-919X&rft_id=info:doi/10.1155/2020/8871315&rft_dat=%3Cproquest_cross%3E2458477145%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c360t-8f90964a4741053bb3d0163f3b99212022601163aac3779223e989eb4db33c563%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2458477145&rft_id=info:pmid/&rfr_iscdi=true