Skip to content
2000
Volume 19, Issue 1
  • ISSN: 2666-2558
  • E-ISSN: 2666-2566

Abstract

The Internet of Things (IoT) is a revolutionary technology being used in many different industries to improve productivity, automation, and comfort of the user in the cloud and distributed computing settings. Cloud computing is essential because it makes data management and storage more effective by automatically storing and examining the enormous amounts of data generated by Internet of Things applications. End users, companies, and government data are consequently migrating to the cloud at an increasing rate. A survey of the literature, however, reveals a variety of issues, including data integrity, confidentiality, authentication, and threat identification, that must be resolved to improve data security and privacy. To effectively address contemporary data security concerns, the existing approaches need to be improved. Ensuring secure end-to-end data transmission in a cloud-IoT situation requires innovative and dependable protocol architecture. New technologies that address some of the issues related to cloud data include edge computing, fog, blockchain, and machine learning. This paper provides a thorough examination of security risks, classifying them and suggesting possible defenses to safeguard cloud-IoT data. It also highlights innovative approaches, such as blockchain technology and machine learning, applied to privacy and data security. The paper also explores existing issues with respect to data privacy and security in today's cloud-IoT environments. It suggests possible future directions, including the need for end-user authentication, enhanced security, and procedures for recovering data in the event of an attack.

Loading

Article metrics loading...

/content/journals/rascs/10.2174/0126662558319054241003054922
2024-10-16
2025-12-14
Loading full text...

Full text loading...

References

  1. KumarS. TiwariP. ZymblerM. Internet of Things is a revolutionary approach for future technology enhancement: a review.J. Big Data20196111110.1186/s40537‑019‑0268‑2
    [Google Scholar]
  2. AlbugmiA. AlassafiM.O. WaltersR. WillsG. Data security in cloud computing.Fifth International Conference on Future Generation Communication Technologies (FGCT),London, UK, 2016, pp. 55-59.10.1109/FGCT.2016.7605062
    [Google Scholar]
  3. SumithraR. ParameswariR. Data privacy and data protection security algorithms for big data in cloud.Int. J. Health Sci.20226S27613762110.53730/ijhs.v6nS2.6834
    [Google Scholar]
  4. SchillerE. AidooA. FuhrerJ. Landscape of IoT security.Comput. Sci. Rev.202244110046710.1016/j.cosrev.2022.100467
    [Google Scholar]
  5. SunP.J. Privacy protection and data security in cloud computing: a survey, challenges, and solutions.IEEE Access2019714742014745210.1109/ACCESS.2019.2946185
    [Google Scholar]
  6. KumarP.R. RajP.H. JelcianaP. Exploring data security issues and solutions in cloud computing.Procedia Comput. Sci.201812569169710.1016/j.procs.2017.12.089
    [Google Scholar]
  7. ZhangJ. ChenB. ZhaoY. ChengX. HuF. Data security and privacy-preserving in edge computing paradigm: Survey and open issues.IEEE Access20186182091823710.1109/ACCESS.2018.2820162
    [Google Scholar]
  8. TranH.Y. HuJ. Privacy-preserving big data analytics a comprehensive survey.J. Parallel Distrib. Comput.201913420721810.1016/j.jpdc.2019.08.007
    [Google Scholar]
  9. DutkiewiczL. Privacy-preserving techniques for trustworthy data sharing: Opportunities and challenges for future research.Data Spaces.ChamE. Curry, S. Scerri, and T. Tuikka, Eds., Springer202231933510.1007/978‑3‑030‑98636‑0_15
    [Google Scholar]
  10. Ram Mohan RaoP. Murali KrishnaS. Siva KumarA.P. Privacy preservation techniques in big data analytics: A survey.J. Big Data2018513310.1186/s40537‑018‑0141‑8
    [Google Scholar]
  11. KaanicheN. LaurentM. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms.Comput. Commun.201711112014110.1016/j.comcom.2017.07.006
    [Google Scholar]
  12. AbouelmehdiK. Beni-HessaneA. KhaloufiH. Big healthcare data: Preserving security and privacy.J. Big Data201851110.1186/s40537‑017‑0110‑7
    [Google Scholar]
  13. YinH. ChenE. ZhuY. ZhaoC. FengR. YauS. S. Attribute-based private data sharing with script-driven programmable ciphertext and decentralized key management in blockchain internet of things.IEEE Internet Things J.2022913106251063910.1109/JIOT.2021.3124016
    [Google Scholar]
  14. MishraKN. BhattacharjeeV. SaketS. MishraSP. Cloud and big data security system’s review principles: A decisive investigation.Wirel. Pers. Commun.1261013105010.1007/s11277‑022‑09781‑0
    [Google Scholar]
  15. YaoH. Data storage security system based on cloud computing.IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI),Changchun, China, 2022, pp. 1220-1223.10.1109/ICETCI55101.2022.9832390
    [Google Scholar]
  16. ZaidA. RETRACTED: Cloud data security mechanism using the lightweight cryptography.Optik202227117008410.1016/j.ijleo.2022.170084
    [Google Scholar]
  17. PandeyN.K. KumarK. SainiG. MishraAK. Security issues and challenges in cloud of things-based applications for industrial automation.Ann. Oper. Res.202312010.1007/s10479‑023‑05285‑7
    [Google Scholar]
  18. RaySM. MishraKN. DuttaS. Big data security issues from the perspective of IoT and cloud computing: A review.Recent Adv. Comput. Sci. Commun.20201210.2174/2666255813666200224092717
    [Google Scholar]
  19. BediRK. SinghJ. GuptaSK. An efficient and secure privacy preserving multi-cloud storage framework for mobile devices.435202147248210.1080/1206212X.2019.1572847
    [Google Scholar]
  20. MihailescuM.I. NitaS.L. AsalomiaB.L. RogobeteM.G. RacuciuC. Customized authorization process for cloud computing and iot using attribute-based encryption.14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI),Ploiesti, Romania, 2022, pp. 1-4.10.1109/ECAI54874.2022.9847501
    [Google Scholar]
  21. HenzeM. WoltersB. MatzuttR. ZimmermannT. WehrleK. Distributed configuration, authorization and management in the cloud-based internet of things.IEEE Trustcom/BigDataSE/ICESS,Sydney, NSW, Australia, 2017, pp. 185-19210.1109/Trustcom/BigDataSE/ICESS.2017.236
    [Google Scholar]
  22. SimsekI. Zero-knowledge and identity-based authentication, authorization, access control, and key exchange for publish/subscribe in internet of things.6th Conference on Cloud and Internet of Things (CIoT),Lisbon, Portugal, 2023, pp. 47-54.10.1109/CIoT57267.2023.10084902
    [Google Scholar]
  23. ShinS. KwonT. A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5g-integrated internet of things.IEEE Access20208675556757110.1109/ACCESS.2020.2985719
    [Google Scholar]
  24. StergiouC. PsannisK.E. XifilidisT. PlagerasA.P. GuptaB.B. Security and privacy of big data for social networking services in cloud.IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Honolulu, HI, USA, 2018, pp. 438-443.10.1109/INFCOMW.2018.8406831
    [Google Scholar]
  25. WangH. Research on risk and supervision of financial big data application based on cloud computing.IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA),Dalian, China, 2021, pp. 507-510.10.1109/AEECA52519.2021.9574292
    [Google Scholar]
  26. JavidT. FarisM. BeenishH. FahadM. Cybersecurity and data privacy in the cloudlet for preliminary healthcare big data analyticsInternational Conference on Computing and Information Technology (ICCIT-1441),Tabuk, Saudi Arabia, 2020, pp. 1-4.10.1109/ICCIT‑144147971.2020.9213712
    [Google Scholar]
  27. GaiK. QiuM. ZhaoH. Privacy-preserving data encryption strategy for big data in mobile cloud computing.IEEE Trans. Big Data202174678688
    [Google Scholar]
  28. ShuklaR.S. IoT based designing of secure data storage system in distributed cloud system with big data using cryptography algorithm.11th International Conference on System Modeling & Advancement in Research Trends (SMART),Moradabad, India, 2022, pp. 264-270.10.1109/SMART55829.2022.10047177
    [Google Scholar]
  29. Gnana SophiaS. Secure storage and accessing the data in cloud using optimized homomorphic encryption.J. Control Decis.2023101909810.1080/23307706.2022.2078436
    [Google Scholar]
  30. YahuzaM. IdrisM.Y.I.B. WahabA.W.B.A. HoA.T.S. KhanS. MusaS.N.B. TahaA.Z.B. Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities.IEEE Access20208765417656710.1109/ACCESS.2020.2989456
    [Google Scholar]
  31. SharmaY. GuptaH. KhatriS.K. A security model for the enhancement of data privacy in cloud computing.Amity International Conference on Artificial Intelligence (AICAI),Dubai, United Arab Emirates, 2019, pp. 898-902.10.1109/AICAI.2019.8701398
    [Google Scholar]
  32. SilvaL.V. BarbosaP. MarinhoR. BritoA. Security and privacy aware data aggregation on cloud computing.J. Internet Serv. Appl.201891610.1186/s13174‑018‑0078‑3
    [Google Scholar]
  33. BertinoE. Big data security and privacy.A Comprehensive Guide Through the Italian Database Research Over the Last 25 YearsSpringerCham201642543910.1109/BigData.2016.7840581
    [Google Scholar]
  34. ZhaoX.P. JiangR. Distributed machine learning oriented data integrity verification scheme in cloud computing environment.IEEE Access20208263722638410.1109/ACCESS.2020.2971519
    [Google Scholar]
  35. YuY. AuM.H. AtenieseG. HuangX. SusiloW. DaiY. MinG. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage.IEEE Trans. Inf. Forensics Secur.201712476777810.1109/TIFS.2016.2615853
    [Google Scholar]
  36. SookhakM. YuF.R. ZomayaA.Y. Auditing big data storage in cloud computing using divide and conquer tables.IEEE Trans. Parallel Distrib. Syst.2018295999101210.1109/TPDS.2017.2784423
    [Google Scholar]
  37. AkmalM. SyangtanB. AlchouemiA. Enhancing the security of data in cloud computing environments using remote data auditing.6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA),Sydney, Australia, 2021, pp. 1-10.10.1109/CITISIA53721.2021.9719899
    [Google Scholar]
  38. AwayshehF.M. AladwanM.N. AlazabM. AlawadiS. CabaleiroJ.C. PenaT.F. Security by design for big data frameworks over cloud computing.IEEE Trans. Eng. Manage.20226963676369310.1109/TEM.2020.3045661
    [Google Scholar]
  39. TangZ. A preliminary study on data security technology in big data cloud computing environment.International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE),Bangkok, Thailand, 2020, pp. 27-30.10.1109/ICBASE51474.2020.00013
    [Google Scholar]
  40. ShiY. Data security and privacy protection in public cloud.IEEE International Conference on Big Data (Big Data),Seattle, WA, USA, 2018, pp. 4812-4819.10.1109/BigData.2018.8622531
    [Google Scholar]
  41. AlouffiB. HasnainM. AlharbiA. AlosaimiW. AlyamiH. AyazM. A systematic literature review on cloud computing security: Threats and mitigation strategies.IEEE Access20219577925780710.1109/ACCESS.2021.3073203
    [Google Scholar]
  42. Hamzah AmlakGMH. Al-SaediKHK. Data mining techniques for cloud privacy preservation.Int. J. Intell. Syst. Appl. Eng.2023116S246256
    [Google Scholar]
  43. YuK. TanL. YangC. A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings.IEEE Internet Things J.20229118154816710.1109/JIOT.2021.3125190
    [Google Scholar]
  44. GuptaI SinghAK LeeCN BuyyaR Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions.IEEE Access202210712477127710.1109/ACCESS.2022.3188110
    [Google Scholar]
  45. YangC. HuangQ. LiZ. LiuK. HuF. Big data and cloud computing: Innovation opportunities and challenges.Int. J. Digit. Earth20171011353
    [Google Scholar]
  46. WangF. WangH. XueL. Research on data security in big data cloud computing environment.IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC),Chongqing, China, 2021, pp. 1446-1450.10.1109/IAEAC50856.2021.9391025
    [Google Scholar]
  47. ReddyY. Big data security in cloud environment.IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS),Omaha, NE, USA, 2018, pp. 100-106.10.1109/BDS/HPSC/IDS18.2018.00033
    [Google Scholar]
  48. HiremathS. KunteS. A novel data auditing approach to achieve data privacy and data integrity in cloud computing.International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT),Mysuru, India, 2017, pp. 306-310.10.1109/ICEECCOT.2017.8284517
    [Google Scholar]
  49. YanH. GuiW. Efficient identity-based public integrity auditing of shared data in cloud storage with user privacy preserving.IEEE Access20219458224583110.1109/ACCESS.2021.3066497
    [Google Scholar]
  50. LiY. ZhangF. An efficient certificate-based data integrity auditing protocol for cloud-assisted WBANs.IEEE Internet Things J.2022913115131152310.1109/JIOT.2021.3130291
    [Google Scholar]
  51. KumarA. Framework for data security using DNA cryptography and HMAC technique in cloud computingSecond International Conference on Electronics and Sustainable Communication Systems (ICESC)Coimbatore, India, 2021, pp. 898-90310.1109/ICESC51422.2021.9532950
    [Google Scholar]
  52. DuanH. ZhengY. WangC. YuanX. Treasure collection on foggy islands: building secure network archives for internet of things.IEEE Internet Things J.2019622637265010.1109/JIOT.2018.2872461
    [Google Scholar]
  53. PawlickiM. PawlickaA. KozikR. ChoraśM. The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT.Neurocomputing202355112653310.1016/j.neucom.2023.126533
    [Google Scholar]
  54. ChentharaS. AhmedK. WangH. WhittakerF. Security and privacy-preserving challenges of e-health solutions in cloud computing.IEEE Access20197743617438210.1109/ACCESS.2019.2919982
    [Google Scholar]
  55. HouY. GargS. HuiL. JayakodyD.N.K. JinR. HossainM.S. A data security enhanced access control mechanism in mobile edge computing.IEEE Access2020813611913613010.1109/ACCESS.2020.3011477
    [Google Scholar]
  56. IshaqA. QadeerB. ShahM.A. BariN. A comparative study on securing electronic health records (EHR) in cloud computing.6th International Conference on Automation and Computing (ICAC),Portsmouth, United Kingdom, 2021, pp. 1-7.10.23919/ICAC50006.2021.9594178
    [Google Scholar]
  57. JusakJ. MahmoudS.S. LaurensR. AlsulamiM. FangQ. A new approach for secure cloud-based electronic health record and its experimental testbed.IEEE Access2022101082109510.1109/ACCESS.2021.3138135
    [Google Scholar]
  58. BinjubeirM. AhmedA.A. IsmailM.A.B. SadiqA.S. Khurram KhanM. Comprehensive survey on big data privacy protection.IEEE Access20208200672007910.1109/ACCESS.2019.2962368
    [Google Scholar]
  59. NandaP. HeX. YangL.T. Security, trust and privacy in cyber (STPCyber): Future trends and challenges.Future Gener. Comput. Syst.202010944644910.1016/j.future.2020.02.010
    [Google Scholar]
  60. HimeurY. SohailSS. BensaaliF. Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives.Comput. Secur. J.202211810274610.1016/j.cose.2022.102746
    [Google Scholar]
  61. YeC. CaoW. ChenS. Security challenges of blockchain in internet of things: Systematic literature review.Trans. Emerg. Telecommun. Technol.2020328e417710.1002/ett.4177
    [Google Scholar]
  62. JainP. GyanchandaniM. KhareN. Big data privacy: A technological perspective and review.J. Big Data2016312510.1186/s40537‑016‑0059‑y
    [Google Scholar]
  63. LuX. PanZ. XianH. An efficient and secure data sharing scheme for mobile devices in cloud computing.J. Cloud Comput. (Heidelb.)2020916010.1186/s13677‑020‑00207‑5
    [Google Scholar]
  64. MuzammalS.M. ShahM.A. KhattakH.A. JabbarS. AhmedG. KhalidS. HussainS. HanK. Counter measuring conceivable security threats on smart healthcare devices.IEEE Access20186207222073310.1109/ACCESS.2018.2826225
    [Google Scholar]
  65. GhaffarZ. AhmedS. MahmoodK. IslamS.H. HassanM.M. FortinoG. An improved authentication scheme for remote data access and sharing over cloud storage in cyber-physical-social-systems.IEEE Access20208471444716010.1109/ACCESS.2020.2977264
    [Google Scholar]
  66. JiangQ KumarN. MaJ. A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.Int. J. Netw. Manag.2016273e1937
    [Google Scholar]
  67. AhmedW. RasoolA. JavedA.R. KumarN. GadekalluT.R. JalilZ. KryvinskaN. Security in next generation mobile payment systems: A comprehensive survey.IEEE Access2021911593211595010.1109/ACCESS.2021.3105450
    [Google Scholar]
  68. WangP. ChenC.M. KumariS. ShojafarM. TafazolliR. LiuY.N. HDMA: Hybrid D2D message authentication scheme for 5G-enabled VANETs.IEEE Trans. Intell. Transp. Syst.20212285071508010.1109/TITS.2020.3013928
    [Google Scholar]
  69. UllahF. NaeemH. JabbarS. KhalidS. LatifM.A. Al-turjmanF. MostardaL. Cyber security threats detection in internet of things using deep learning approach.IEEE Access2019712437912438910.1109/ACCESS.2019.2937347
    [Google Scholar]
  70. JahromiA.N. KarimipourH. DehghantanhaA. ChooK.K.R. Toward detection and at In tribution of cyber-attacks in IoT-enabled cyber–physical systems.IEEE Internet Things J.2021817137121372210.1109/JIOT.2021.3067667
    [Google Scholar]
  71. ZhangW. JinS. Research and application of data privacy protection technology in cloud computing environment based on attribute encryption.IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS),Shenyang, China, 2020, pp. 994-996.10.1109/ICPICS50287.2020.9202055
    [Google Scholar]
  72. KhanH.K. PradhanR. In ChandavarkarB.R. Hybrid cryptography for cloud computing.2nd International Conference for Emerging Technology (INCET), Belagavi, India, 2021, pp. 1-5.10.1109/INCET51464.2021.9456210
    [Google Scholar]
  73. AbdulsalamY.S. HedabouM. Decentralized data integrity scheme for preserving privacy in cloud computing.International Conference on Security, Pattern Analysis, and Cybernetics(SPAC),Chengdu, China, 2021, pp. 607-612.10.1109/SPAC53836.2021.9539946
    [Google Scholar]
  74. JeongJ. JooJ.W.J. LeeY. SonY. Secure cloud storage service using bloom filters for the internet of things.IEEE Access20197608976090710.1109/ACCESS.2019.2915576
    [Google Scholar]
  75. ZhuH. YuanY. ChenY. ZhaY. XiW. JiaB. XinY. A secure and efficient data integrity verification scheme for cloud-IoT based on short signature.IEEE Access20197900369004410.1109/ACCESS.2019.2924486
    [Google Scholar]
  76. AlrasheedS.H. AiedalhaririM. AdubaykhiS.A. El KhediriS. Cloud computing security and challenges: Issues, threats, and solutions.5th Conference on Cloud and Internet of Things (CIoT),Marrakech, Morocco, 2022, pp. 166-172.10.1109/CIoT53061.2022.9766571
    [Google Scholar]
  77. MishraJK. JanarthananM. Cloud computing security: Machine and deep learning models analysis.Macromol. Symp.20234071210052110.1002/masy.202100521
    [Google Scholar]
  78. KumarV. Mohammed Ali Al-TameemiA. KumariA. AhmadM. FalahM.W. Abd El-LatifA.A. PSEBVC: Provably secure ECC and biometric based authentication framework using smartphone for vehicular cloud environment.IEEE Access202210847768478910.1109/ACCESS.2022.3195807
    [Google Scholar]
  79. WyldeV. RawindaranN. LawrenceJ. BalasubramanianR. PrakashE. JayalA. KhanI. HewageC. PlattsJ. Cybersecurity, data privacy and blockchain: A review.SN Comput. Sci.20223212710.1007/s42979‑022‑01020‑435036930
    [Google Scholar]
  80. Al HamidH.A. RahmanS.M.M. HossainM.S. AlmogrenA. AlamriA. A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography.IEEE Access20175223132232810.1109/ACCESS.2017.2757844
    [Google Scholar]
  81. AbedAK. AnupamA. Review of security issues in Internet of Things and artificial intelligence-driven solutions.Secur. Priv.202363e28510.1002/spy2.285
    [Google Scholar]
  82. UnalE. Sen-BaidyaS. HewettR. Towards prediction of security attacks on software defined networks: A big data analytic approach.IEEE International Conference on Big Data (Big Data),Seattle, WA, USA, 2018, pp. 4582-4588.10.1109/BigData.2018.8622524
    [Google Scholar]
  83. MoriokaE. SharbafM.S. Digital forensics research on cloud computing: An investigation of cloud forensics solutions.IEEE Symposium on Technologies for Homeland Security (HST),Waltham, MA, USA, 2016, pp. 1-6.10.1109/THS.2016.7568909
    [Google Scholar]
  84. Al-DhaqmA. IkuesanRA. KebandeVR. Digital forensics subdomains: The state of the art and future directions.IEEE Access202115247615250210.1109/ACCESS.2021.3124262
    [Google Scholar]
  85. MahrousW.A. FaroukM. DarwishS.M. An enhanced blockchain-based IoT digital forensics architecture using fuzzy hash.IEEE Access2021915132715133610.1109/ACCESS.2021.3126715
    [Google Scholar]
  86. AliJ. RohB-h. LeeB. OhJ. AdilM. A machine learning framework for prevention of software-defined networking controller from DDoS attacks and dimensionality reduction of big data.International Conference on Information and Communication Technology Convergence (ICTC),Jeju, Korea (South), 2020, pp. 515-519.10.1109/ICTC49870.2020.9289504
    [Google Scholar]
  87. Safaei YarazizM. JaliliA. GheisariM. LiuY. Recent trends towards privacy‐preservation in Internet of Things, its challenges and future directions.IET Circuits Dev. Syst.2023172536110.1049/cds2.12138
    [Google Scholar]
  88. Navin PrasadS. RekhaC. Block chain based IAS protocol to enhance security and privacy in cloud computing,Measurement.Sensors, Elsevier.202328100813
    [Google Scholar]
  89. SicariS. RizzardiA. Coen-PorisiniA. Insights into security and privacy towards fog computing evolution.Comput. Secur.202212010282210.1016/j.cose.2022.102822
    [Google Scholar]
  90. PathakM. MishraK.N. SinghS.P. MishraA. An automated smart centralised vehicle security system for controlling the vehicle thefts/hacking using IOT and facial recognition.International Conference on Computational Intelligence and Knowledge Economy (ICCIKE),Dubai, United Arab Emirates, 2023, pp. 516-521.10.1109/ICCIKE58312.2023.10131765
    [Google Scholar]
  91. HossainMS. MuhammadG. AbdulW. SongB. GuptaBB. Cloud-assisted secure video transmission and sharing framework for smart cities.Future Gener. Comput. Syst.20188359660610.1016/j.future.2017.03.029
    [Google Scholar]
  92. ChenJ. RamanathanL. AlazabM. Holistic big data integrated artificial intelligent modeling to improve privacy and security in data management of smart cities.Microprocess. Microsyst.20218110372210.1016/j.micpro.2020.103722
    [Google Scholar]
  93. AroraA. KhannaA. RastogiA. AgarwalA. Cloud security ecosystem for data security and privacy. 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence,Noida, India, 2017, pp. 288-292.10.1109/CONFLUENCE.2017.7943164
    [Google Scholar]
  94. TianY. KaleemullahM.M. RodhaanM.A. SongB. Al-DhelaanA. MaT. A privacy preserving location service for cloud-of-things system.J. Parallel Distrib. Comput.201912321522210.1016/j.jpdc.2018.09.005
    [Google Scholar]
  95. RahmanS.M.M. HossainM.A. HassanM.M. AlamriA. AlghamdiA. PathanM. Secure privacy vault design for distributed multimedia surveillance system.Future Gener. Comput. Syst.20165534435210.1016/j.future.2014.10.019
    [Google Scholar]
  96. OgunniyeG. KokciyanN. A survey on understanding and representing privacy requirements in the Internet-of-Things.J. Artif. Intell. Res.20237616319210.1613/jair.1.14000
    [Google Scholar]
  97. MajeedA. KhanS. HwangS.O. Toward privacy preservation using clustering based anonymization: Recent advances and future research outlook.IEEE Access202210530665309710.1109/ACCESS.2022.3175219
    [Google Scholar]
  98. CamposE.M. SauraP.F. González-VidalA. Hernández-RamosJ.L. BernabéJ.B. BaldiniG. SkarmetaA. Evaluating federated learning for intrusion detection in internet of things: Review and challenges.Comput. Netw.202220310866110.1016/j.comnet.2021.108661
    [Google Scholar]
  99. ChenQ. WuL. JiangC. ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture.J. Cloud Comput. (Heidelb.)20221112010.1186/s13677‑022‑00295‑5
    [Google Scholar]
  100. WilliamsP. DuttaIK. DaoudH. BayoumiM. A survey on security in internet of things with a focus on the impact of emerging technologies.Internet Things J.20221910056410.1016/j.iot.2022.100564
    [Google Scholar]
  101. KarieN.M. SahriN.M. YangW. ValliC. KebandeV.R. A review of security standards and frameworks for IoT-based smart environments.IEEE Access2021912197512199510.1109/ACCESS.2021.3109886
    [Google Scholar]
  102. ButphengC. YehK.H. XiongH. Security and privacy in IoT-cloud-based e-health systems — A comprehensive review.Symmetry (Basel)2020127119110.3390/sym12071191
    [Google Scholar]
  103. WazidM. DasA.K. HussainR. SucciG. RodriguesJ.J.P.C. Authentication in cloud-driven IoT-based big data environment: Survey and outlook.J. Systems Archit.20199718519610.1016/j.sysarc.2018.12.005
    [Google Scholar]
  104. Nadian-GhomshehA. FarahaniB. KavianM. A hierarchical privacy-preserving IoT architecture for vision-based hand rehabilitation assessment.Multimedia Tools Appl.20218020313573138010.1007/s11042‑021‑10563‑233613083
    [Google Scholar]
  105. ZhouJ. CaoZ. DongX. VasilakosA.V. Security and privacy for cloud-based IoT: Challenges.IEEE Commun. Mag.2017551263310.1109/MCOM.2017.1600363CM
    [Google Scholar]
  106. MishraA. JabarT.S. AlzoubiY.I. MishraK.N. Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework.Concurr. Comput.20233526e783110.1002/cpe.7831
    [Google Scholar]
  107. ChoudhuryT. GuptaA. PradhanS. KumarP. RathoreY.S. Privacy and security of cloud-based internet of things (IoT.20173rd International Conference on Computational Intelligence and Networks (CINE),Odisha, India, 2017, pp. 40-45.10.1109/CINE.2017.28
    [Google Scholar]
  108. AhmadW. RasoolA. JavedA.R. BakerT. JalilZ. Cyber security in IoT-based cloud computing: A comprehensive survey.Electronics (Basel)20211111610.3390/electronics11010016
    [Google Scholar]
  109. RachitB. BhattS. RagiriP.R. Security trends in Internet of Things: A survey.SN Appl. Sci.20213112110.1007/s42452‑021‑04156‑9
    [Google Scholar]
  110. HurrahN.N. ParahS.A. SheikhJ.A. Al-TurjmanF. MuhammadK. Secure data transmission framework for confidentiality in IoTs.Ad Hoc Netw.20199510198910.1016/j.adhoc.2019.101989
    [Google Scholar]
  111. KumarA. KhanS.B. PandeyS.K. ShankarA. MapleC. MashatA. MalibariA.A. Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities.J. Cloud Comput. (Heidelb.)20231219210.1186/s13677‑023‑00469‑9
    [Google Scholar]
  112. QuachS. ThaichonP. MartinK.D. WeavenS. PalmatierR.W. Digital technologies: Teensions in privacy and data.J. Acad. Mark. Sci.20225061299132310.1007/s11747‑022‑00845‑y35281634
    [Google Scholar]
  113. WaheedN. HeX. IkramM. UsmanM. HashmiS.S. UsmanM. Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures.ACM Comput. Surv.202053613710.1145/3417987
    [Google Scholar]
  114. KhanS. ParkinsonS. QinY. Fog computing security: A review of current applications and security solutions.J. Cloud Comput. (Heidelb.)2017611910.1186/s13677‑017‑0090‑3
    [Google Scholar]
  115. Radoglou GrammatikisP.I. SarigiannidisP.G. MoscholiosI.D. Securing the Internet of Things: Challenges, threats and solutions.Internet Things J.20195417010.1016/j.iot.2018.11.003
    [Google Scholar]
  116. LinJ. YuW. ZhangN. YangX. ZhangH. ZhaoW. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications.IEEE Internet Things J.2017451125114210.1109/JIOT.2017.2683200
    [Google Scholar]
  117. LoneA.N. MustajabS. AlamM. A comprehensive study on cybersecurity challenges and opportunities in the IoT world.Secur. Priv.202366e31810.1002/spy2.318
    [Google Scholar]
  118. SadhuP.K. YanambakaV.P. AbdelgawadA. Internet of Things: Security and solutions survey.Sensors (Basel)20222219743310.3390/s2219743336236531
    [Google Scholar]
  119. JainS.K. KesswaniN. A noise-based privacy preserving model for internet of things.Complex Intell. Syst.2023943655367910.1007/s40747‑021‑00489‑5
    [Google Scholar]
  120. AndrewJ. KarthikeyanJ. Privacy-preserving internet of things: Techniques and applications.Int. J. Eng. Adv. Technol.2019863229323410.35940/ijeat.F8830.088619
    [Google Scholar]
  121. SarwarK. YongchareonS. YuJ. RehmanS.U. A survey on privacy preservation in fog-enabled internet of thingsACM Comput. Surv.202155113910.1145/3474554
    [Google Scholar]
  122. MeiR. YanH.B. HeY. WangQ. ZhuS. WenW. Considerations on evaluation of practical cloud data protection.Cyber SecuritySingaporeSpringer2022516910.1007/978‑981‑19‑8285‑9_4
    [Google Scholar]
  123. HassijaV. ChamolaV. SaxenaV. JainD. GoyalP. SikdarB. A survey on IoT security: Application areas, security threats, and solution architectures.IEEE Access20197827218274310.1109/ACCESS.2019.2924045
    [Google Scholar]
  124. Amiri-ZarandiM. DaraR.A. FraserE. A survey of machine learning-based solutions to protect privacy in the Internet of Things.Comput. Secur.20209610192110.1016/j.cose.2020.101921
    [Google Scholar]
  125. RodríguezE. OteroB. CanalR. A survey of machine and deep learning methods for privacy protection in the internet of things.Sensors (Basel)2023233125210.3390/s2303125236772292
    [Google Scholar]
  126. MoqurrabS.A. TariqN. AnjumA. AsheralievaA. MalikS.U.R. MalikH. PervaizH. GillS.S. A deep learning-based privacy-preserving model for smart healthcare in internet of medical things using fog computing.Wirel. Pers. Commun.202212632379240110.1007/s11277‑021‑09323‑036059591
    [Google Scholar]
  127. NasiraeeH. Ashouri-TaloukiM. Privacy-preserving distributed data access control for CloudIoT.IEEE Trans. Dependable Secure Comput.20221942476248710.1109/TDSC.2021.3060337
    [Google Scholar]
  128. ChaS.C. HsuT.Y. XiangY. YehK.H. Privacy enhancing technologies in the internet of things: perspectives and challenges.IEEE Internet Things J.2019622159218710.1109/JIOT.2018.2878658
    [Google Scholar]
  129. TawalbehLA. SaldamliG. Reconsidering big data security and privacy in cloud and mobile cloud systems.J. King Saud Univ. - Comput. Inf. Sci.202133781081910.1016/j.jksuci.2019.05.007
    [Google Scholar]
  130. SinghN. SinghA.K. Data privacy protection mechanisms in cloud.Data Sci. Eng.201831243910.1007/s41019‑017‑0046‑0
    [Google Scholar]
  131. AlabdulatifA. ThilakarathneN.N. KalinakiK. A novel cloud enabled access control model for preserving the security and privacy of medical big data.Electronics (Basel)20231212264610.3390/electronics12122646
    [Google Scholar]
  132. KrishnarajN. SangeethaS. A study of data privacy in internet of things using privacy preserving techniques with its management.Int. J. Eng. Trends Technol.20227035465
    [Google Scholar]
  133. Al KabirA. MohammedE. WaelS. Securing IoT devices against emerging security threats: Challenges and mitigation techniques.J. Cyber Secur.20237419922310.1080/23742917.2023.2228053
    [Google Scholar]
  134. AlzoubiY.I. AhmadA.A.A.L. JaradatA. Fog computing security and privacy issues, open challenges, and blockchain solution: An overview.Int. J. Electr. Comput. Eng.202111650815088
    [Google Scholar]
  135. ZamanS. AlhazmiK. AseeriM.A. AhmedM.R. KhanR.T. KaiserM.S. MahmudM. Security threats and artificial intelligence based countermeasures for internet of things networks: A comprehensive survey.IEEE Access20219946689469010.1109/ACCESS.2021.3089681
    [Google Scholar]
  136. SelvarajanS. SrivastavaG. KhadidosA.O. KhadidosA.O. BazaM. AlshehriA. LinJ.C.W. An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems.J. Cloud Comput. (Heidelb.)20231213810.1186/s13677‑023‑00412‑y36937654
    [Google Scholar]
  137. AlnaimA.K. AlwakeelA.M. machine-learning-based IoT–edge computing healthcare solutions.electronics2023121027
    [Google Scholar]
  138. XiaoY. JiaY. LiuC. ChengX. YuJ. LvW. Edge computing security: State of the art and challenges.Proc. IEEE201910781608163110.1109/JPROC.2019.2918437
    [Google Scholar]
  139. TahirkheliA.I. ShirazM. HayatB. IdreesM. SajidA. UllahR. AyubN. KimK.I. A survey on modern cloud computing security over smart city networks: Threats, vulnerabilities, consequences, countermeasures, and challenges.Electronics (Basel)20211015181110.3390/electronics10151811
    [Google Scholar]
  140. AtiewiS. Al-RahayfehA. AlmianiM. YussofS. AlfandiO. AbugabahA. JararwehY. Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography.IEEE Access2020811349811351110.1109/ACCESS.2020.3002815
    [Google Scholar]
  141. Roslin DayanaK. Shobha RaniP. Secure cloud data storage solution with better data accessibility and time efficiency.Automatika202364751758
    [Google Scholar]
  142. ThabitF. AlhomdyS. JagtapS. A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions.Int. J. Intell. Netw.202121833
    [Google Scholar]
  143. JainP. GyanchandaniM. KhareN. Enhanced secured map reduce layer for big data privacy and security.J. Big Data2019613010.1186/s40537‑019‑0193‑4
    [Google Scholar]
  144. AzeezN.A. der VyverC.V. Security and privacy issues in e-health cloud-based system: A comprehensive content analysis.Egypt. Inform. J.20192029710810.1016/j.eij.2018.12.001
    [Google Scholar]
  145. RejinPR. PaulRD. AlaviAH. Verification of data integrity and co-operative loss recovery for secure data storage in cloud computing.Cogent Eng.20196110.1080/23311916.2019.1654694
    [Google Scholar]
  146. XieQ. ZhangC. JiaX. Security-aware and efficient data deduplication for edge-assisted cloud storage systems.IEEE Trans. Serv. Comput.2023160321912202
    [Google Scholar]
  147. KaurK. SyedA. MohammadA. HalgamugeM.N. Review: An evaluation of major threats in cloud computing associated with big data.IEEE 2nd International Conference on Big Data Analysis (ICBDA),Beijing, China, 2017, pp. 368-372.201710.1109/ICBDA.2017.8078842
    [Google Scholar]
  148. NiuL. WangF. LiJ. Development of agricultural internet of things monitoring system combining cloud computing and wechat technology.IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC),Chongqing, China, 2019, pp. 1457-1460.10.1109/ITAIC.2019.8785884
    [Google Scholar]
  149. WangY. NiK. WangX. ZhuJ. Design of automatic weather monitoring and forecasting system based on internet of things and big data.2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS),Erode, India, 2022, pp. 979-982.10.1109/ICSCDS53736.2022.9761041
    [Google Scholar]
  150. Al-MekhlafiZ.G. Al-ShareedaM.A. ManickamS. MohammedB.A. QtaishA. Lattice-based lightweight quantum resistant scheme in 5G-enabled vehicular networks.Mathematics202311239910.3390/math11020399
    [Google Scholar]
  151. Al-MekhlafiZ.G. Al-ShareedaM.A. ManickamS. MohammedB.A. AlreshidiA. AlazmiM. AlshudukhiJ.S. AlsaffarM. AlsewariA. Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks.Electronics (Basel)202312487210.3390/electronics12040872
    [Google Scholar]
  152. Al-ShareedaM.A. ManickamS. COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing.Int. J. Environ. Res. Public Health202219231561810.3390/ijerph19231561836497709
    [Google Scholar]
  153. PathakM. MishraK.N. SinghS.P. Securing data and preserving privacy in Cloud IoT-based technologies: An analysis of assessing threats and developing effective safeguards.Artif. Intell. Rev.2024133
    [Google Scholar]
  154. AliA. JosephN. NadafT.A. Blockchain segmentation: An industrial solution for large scale data.Soft Computing and Its Engineering ApplicationsK.K. Patel, K. Santosh, A. Patel, and A. Ghosh, Eds., Vol. 2030. SpringerCham202410.1007/978‑3‑031‑53731‑8_15
    [Google Scholar]
  155. MahapatroR.K. AliA. RamakrishnanN. Blockchain segmentation: A storage optimization technique for large data.8th International Conference on Communication and Electronics Systems (ICCES),Coimbatore, India, 2023, pp. 499-504.202310.1109/ICCES57224.2023.10192631
    [Google Scholar]
  156. LiH. GeL. TianL. Survey: Federated learning data security and privacy-preserving in edge-Internet of Things.Artif. Intell. Rev.202457513010.1007/s10462‑024‑10774‑7
    [Google Scholar]
  157. NamakshenasD. YazdinejadA. DehghantanhaA. SrivastavaG. Federated quantum-based privacy-preserving threat detection model for consumer internet of things.IEEE Trans. Consum. Electron.202410.1109/TCE.2024.3377550
    [Google Scholar]
  158. AllamA.H. GomaaI. ZayedH.H. TahaM. IoT-based eHealth using blockchain technology: A survey.Cluster Comput.202410.1007/s10586‑024‑04357‑y
    [Google Scholar]
  159. YazdinejadA. DehghantanhaA. SrivastavaG. AP2FL: Auditable privacy-preserving federated learning framework for electronics in healthcare.IEEE Trans. Consum. Electron.20247012527253510.1109/TCE.2023.3318509
    [Google Scholar]
/content/journals/rascs/10.2174/0126662558319054241003054922
Loading
/content/journals/rascs/10.2174/0126662558319054241003054922
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test