Loading…
Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions
In recent years, cloud computing has gained massive popularity in information technology and the industrial Internet of things. It provides facilities to the users over the wireless channel. Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify t...
Saved in:
Published in: | Scientific programming 2020, Vol.2020 (2020), p.1-31 |
---|---|
Main Authors: | , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c360t-8f90964a4741053bb3d0163f3b99212022601163aac3779223e989eb4db33c563 |
---|---|
cites | cdi_FETCH-LOGICAL-c360t-8f90964a4741053bb3d0163f3b99212022601163aac3779223e989eb4db33c563 |
container_end_page | 31 |
container_issue | 2020 |
container_start_page | 1 |
container_title | Scientific programming |
container_volume | 2020 |
creator | Khan, Muazzam A. Deng, Lianwen Ali, Ihsan Almogren, Ahmad Khan, Mahnoor Shah, Sahar Luo, Heng |
description | In recent years, cloud computing has gained massive popularity in information technology and the industrial Internet of things. It provides facilities to the users over the wireless channel. Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components. Therefore, they fail to provide the techniques with their specialities as well as the previously available literature review is outdated. This paper presents the security for cloud computing models with a new aspect. Unlike the previously existing surveys, the literature review of this paper includes the latest research papers in the field of cloud security. Also, different classifications are made for cloud computing security on the basis of different cloud components that are used to secure the cloud models. Furthermore, a total of eleven (11) classifications are considered, which includes cloud components to secure the cloud systems. These classifications help the researchers to find out the desired technique used in a specific component to secure the cloud model. Moreover, the shortcoming of each component enables the researchers to design an optimal algorithm. Finally, future directions are given to highlight future research challenges that give paths to researchers. |
doi_str_mv | 10.1155/2020/8871315 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2458477145</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2458477145</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-8f90964a4741053bb3d0163f3b99212022601163aac3779223e989eb4db33c563</originalsourceid><addsrcrecordid>eNqF0E1LwzAYB_AiCs7pzbMEPLq6vLVNvEl1OpgoOMFbSdvUZaxJTVLnvr0ZFTx6ykP48bz8o-gcwWuEkmSKIYZTxjJEUHIQjRDLkpgj_n4YapiwmGNKj6MT59YQIoYgHEXdq6x6q_wOPEnheitbqT1QGsx13TtvldiAuVmCrfIrkG9MX4PctF3vlf4AL9K6TlZefckbsBTfRpt2NwFz53rpJkDoGsx6H5qCO2X3zmh3Gh01YuPk2e87jt5m98v8MV48P8zz20VckRT6mDUc8pQKmtGwOilLUkOUkoaUnGMUDsUpROFDiIpkGceYSM64LGldElIlKRlHl0PfzprPsI4v1qa3OowsME0YzTJEk6Amg6qscc7KpuisaoXdFQgW-0yLfabFb6aBXw18pXQttuo_fTFoGYxsxJ_GkOOMkR-DuH9V</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2458477145</pqid></control><display><type>article</type><title>Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions</title><source>Open Access: Wiley-Blackwell Open Access Journals</source><creator>Khan, Muazzam A. ; Deng, Lianwen ; Ali, Ihsan ; Almogren, Ahmad ; Khan, Mahnoor ; Shah, Sahar ; Luo, Heng</creator><contributor>Nazir, Shah ; Shah Nazir</contributor><creatorcontrib>Khan, Muazzam A. ; Deng, Lianwen ; Ali, Ihsan ; Almogren, Ahmad ; Khan, Mahnoor ; Shah, Sahar ; Luo, Heng ; Nazir, Shah ; Shah Nazir</creatorcontrib><description>In recent years, cloud computing has gained massive popularity in information technology and the industrial Internet of things. It provides facilities to the users over the wireless channel. Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components. Therefore, they fail to provide the techniques with their specialities as well as the previously available literature review is outdated. This paper presents the security for cloud computing models with a new aspect. Unlike the previously existing surveys, the literature review of this paper includes the latest research papers in the field of cloud security. Also, different classifications are made for cloud computing security on the basis of different cloud components that are used to secure the cloud models. Furthermore, a total of eleven (11) classifications are considered, which includes cloud components to secure the cloud systems. These classifications help the researchers to find out the desired technique used in a specific component to secure the cloud model. Moreover, the shortcoming of each component enables the researchers to design an optimal algorithm. Finally, future directions are given to highlight future research challenges that give paths to researchers.</description><identifier>ISSN: 1058-9244</identifier><identifier>EISSN: 1875-919X</identifier><identifier>DOI: 10.1155/2020/8871315</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Access control ; Algorithms ; Artificial intelligence ; Classification ; Cloud computing ; Industrial applications ; Internet of Things ; Literature reviews ; Privacy ; Scientific papers ; Security ; Software services ; Taxonomy</subject><ispartof>Scientific programming, 2020, Vol.2020 (2020), p.1-31</ispartof><rights>Copyright © 2020 Sahar Shah et al.</rights><rights>Copyright © 2020 Sahar Shah et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-8f90964a4741053bb3d0163f3b99212022601163aac3779223e989eb4db33c563</citedby><cites>FETCH-LOGICAL-c360t-8f90964a4741053bb3d0163f3b99212022601163aac3779223e989eb4db33c563</cites><orcidid>0000-0002-8253-9709 ; 0000-0002-9549-2540</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,4024,27923,27924,27925</link.rule.ids></links><search><contributor>Nazir, Shah</contributor><contributor>Shah Nazir</contributor><creatorcontrib>Khan, Muazzam A.</creatorcontrib><creatorcontrib>Deng, Lianwen</creatorcontrib><creatorcontrib>Ali, Ihsan</creatorcontrib><creatorcontrib>Almogren, Ahmad</creatorcontrib><creatorcontrib>Khan, Mahnoor</creatorcontrib><creatorcontrib>Shah, Sahar</creatorcontrib><creatorcontrib>Luo, Heng</creatorcontrib><title>Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions</title><title>Scientific programming</title><description>In recent years, cloud computing has gained massive popularity in information technology and the industrial Internet of things. It provides facilities to the users over the wireless channel. Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components. Therefore, they fail to provide the techniques with their specialities as well as the previously available literature review is outdated. This paper presents the security for cloud computing models with a new aspect. Unlike the previously existing surveys, the literature review of this paper includes the latest research papers in the field of cloud security. Also, different classifications are made for cloud computing security on the basis of different cloud components that are used to secure the cloud models. Furthermore, a total of eleven (11) classifications are considered, which includes cloud components to secure the cloud systems. These classifications help the researchers to find out the desired technique used in a specific component to secure the cloud model. Moreover, the shortcoming of each component enables the researchers to design an optimal algorithm. Finally, future directions are given to highlight future research challenges that give paths to researchers.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Classification</subject><subject>Cloud computing</subject><subject>Industrial applications</subject><subject>Internet of Things</subject><subject>Literature reviews</subject><subject>Privacy</subject><subject>Scientific papers</subject><subject>Security</subject><subject>Software services</subject><subject>Taxonomy</subject><issn>1058-9244</issn><issn>1875-919X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNqF0E1LwzAYB_AiCs7pzbMEPLq6vLVNvEl1OpgoOMFbSdvUZaxJTVLnvr0ZFTx6ykP48bz8o-gcwWuEkmSKIYZTxjJEUHIQjRDLkpgj_n4YapiwmGNKj6MT59YQIoYgHEXdq6x6q_wOPEnheitbqT1QGsx13TtvldiAuVmCrfIrkG9MX4PctF3vlf4AL9K6TlZefckbsBTfRpt2NwFz53rpJkDoGsx6H5qCO2X3zmh3Gh01YuPk2e87jt5m98v8MV48P8zz20VckRT6mDUc8pQKmtGwOilLUkOUkoaUnGMUDsUpROFDiIpkGceYSM64LGldElIlKRlHl0PfzprPsI4v1qa3OowsME0YzTJEk6Amg6qscc7KpuisaoXdFQgW-0yLfabFb6aBXw18pXQttuo_fTFoGYxsxJ_GkOOMkR-DuH9V</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Khan, Muazzam A.</creator><creator>Deng, Lianwen</creator><creator>Ali, Ihsan</creator><creator>Almogren, Ahmad</creator><creator>Khan, Mahnoor</creator><creator>Shah, Sahar</creator><creator>Luo, Heng</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-8253-9709</orcidid><orcidid>https://orcid.org/0000-0002-9549-2540</orcidid></search><sort><creationdate>2020</creationdate><title>Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions</title><author>Khan, Muazzam A. ; Deng, Lianwen ; Ali, Ihsan ; Almogren, Ahmad ; Khan, Mahnoor ; Shah, Sahar ; Luo, Heng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-8f90964a4741053bb3d0163f3b99212022601163aac3779223e989eb4db33c563</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Classification</topic><topic>Cloud computing</topic><topic>Industrial applications</topic><topic>Internet of Things</topic><topic>Literature reviews</topic><topic>Privacy</topic><topic>Scientific papers</topic><topic>Security</topic><topic>Software services</topic><topic>Taxonomy</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Khan, Muazzam A.</creatorcontrib><creatorcontrib>Deng, Lianwen</creatorcontrib><creatorcontrib>Ali, Ihsan</creatorcontrib><creatorcontrib>Almogren, Ahmad</creatorcontrib><creatorcontrib>Khan, Mahnoor</creatorcontrib><creatorcontrib>Shah, Sahar</creatorcontrib><creatorcontrib>Luo, Heng</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Scientific programming</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Khan, Muazzam A.</au><au>Deng, Lianwen</au><au>Ali, Ihsan</au><au>Almogren, Ahmad</au><au>Khan, Mahnoor</au><au>Shah, Sahar</au><au>Luo, Heng</au><au>Nazir, Shah</au><au>Shah Nazir</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions</atitle><jtitle>Scientific programming</jtitle><date>2020</date><risdate>2020</risdate><volume>2020</volume><issue>2020</issue><spage>1</spage><epage>31</epage><pages>1-31</pages><issn>1058-9244</issn><eissn>1875-919X</eissn><abstract>In recent years, cloud computing has gained massive popularity in information technology and the industrial Internet of things. It provides facilities to the users over the wireless channel. Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components. Therefore, they fail to provide the techniques with their specialities as well as the previously available literature review is outdated. This paper presents the security for cloud computing models with a new aspect. Unlike the previously existing surveys, the literature review of this paper includes the latest research papers in the field of cloud security. Also, different classifications are made for cloud computing security on the basis of different cloud components that are used to secure the cloud models. Furthermore, a total of eleven (11) classifications are considered, which includes cloud components to secure the cloud systems. These classifications help the researchers to find out the desired technique used in a specific component to secure the cloud model. Moreover, the shortcoming of each component enables the researchers to design an optimal algorithm. Finally, future directions are given to highlight future research challenges that give paths to researchers.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2020/8871315</doi><tpages>31</tpages><orcidid>https://orcid.org/0000-0002-8253-9709</orcidid><orcidid>https://orcid.org/0000-0002-9549-2540</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1058-9244 |
ispartof | Scientific programming, 2020, Vol.2020 (2020), p.1-31 |
issn | 1058-9244 1875-919X |
language | eng |
recordid | cdi_proquest_journals_2458477145 |
source | Open Access: Wiley-Blackwell Open Access Journals |
subjects | Access control Algorithms Artificial intelligence Classification Cloud computing Industrial applications Internet of Things Literature reviews Privacy Scientific papers Security Software services Taxonomy |
title | Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T11%3A10%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Measurement%20in%20Industrial%20IoT%20with%20Cloud%20Computing%20Perspective:%20Taxonomy,%20Issues,%20and%20Future%20Directions&rft.jtitle=Scientific%20programming&rft.au=Khan,%20Muazzam%20A.&rft.date=2020&rft.volume=2020&rft.issue=2020&rft.spage=1&rft.epage=31&rft.pages=1-31&rft.issn=1058-9244&rft.eissn=1875-919X&rft_id=info:doi/10.1155/2020/8871315&rft_dat=%3Cproquest_cross%3E2458477145%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c360t-8f90964a4741053bb3d0163f3b99212022601163aac3779223e989eb4db33c563%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2458477145&rft_id=info:pmid/&rfr_iscdi=true |