Abstract
Advancements in information technology, and transfer of data online leading to the vulnerabilities and giving an invitation to cyber threats. Security and privacy are important issues in cloud storage and networking fields. Cloud computing created an environment that facilitates the internet of things. The cloud computing technology consisted of servers, applications, and other storage devices, relying on the virtual connection. The stored information in clouds can be manipulated without the need for extensive physical activities. The internet of things devices provide information and services through information and communication technology, these end-node IoT devices are not very intelligent and resource-constrained thus they are vulnerable to cyber threats. It posed an issue of insecurity as malicious individuals learned ways of intruding these systems and causing intellectual and physical losses. The study proposes numerous solutions for the challenges of privacy and security in the cloud and IoT. The paper provides an in-depth examination of security challenges in cloud computing and IoT. The methodology uses the interpretive technique. The results depict the importance of the machine and deep learning in cyber-attack and mitigation. Analysis of variance (ANOVA) test statistics is used to test the reliability of the study.
References (37)
- Zamora-Izquierdo, M. A., Santa, J., Martínez, J. A., Martínez, V., & Skarmeta, A. F. (2019). Smart farming IoT platform based on edge and cloud computing. Biosystems engineering, 177, 4-17.
- Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K., Jalali, F., Niakanlahiji, A., ... & Jue, J. P. (2019). All one needs to know about fog computing and related edge computing paradigms: A complete survey. Journal of Systems Architecture, 98, 289-330.
- Albdour, L., Manaseer, S., & Sharieh, A. (2020). IoT Crawler with Behavior Analyzer at Fog layer for Detecting Malicious Nodes. Int. J. Commun. Networks Inf. Secur., 12(1).
- Kumari, P. L. S. (2020). Big Data: Challenges and Solutions. In Security, Privacy, and Forensics Issues in Big Data (pp. 24-65). IGI Global.
- S. Mishra, S. K. Sharma and M. A.Alowaidi, "Analysis of security issues of cloud-based web applications," Journal of Ambient Intelligence and Humanized Computing, https://doi.org/10.1007/s12652-020-02370-8, 2020.
- Gozman, D., & Willcocks, L. (2019). The emerging Cloud Dilemma: Balancing innovation with cross-border privacy and outsourcing regulations. Journal of Business Research, 97, 235-256.
- Shah, J. L., Bhat, H. F., & Khan, A. I. (2019). Cloud IoT: Towards Seamless and Secure Integration of Cloud Computing With Internet of Things. International Journal of Digital Crime and Forensics (IJDCF), 11(3), 1- 22.
- Cheng, B. H., Doherty, B., Polanco, N., & Pasco, M. (2019, September). Security Patterns for Automotive Systems. In 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C) (pp. 54-63). IEEE.
- Rychwalska, A., Goodell, G., & Roszczynska-Kurasinska, M. (2019). Data management for platform- mediated public services: Challenges and best practices. Available at SSRN 3455123.
- Cusumano, M. A. (2019). The cloud as an innovation platform for software development. Communications of the ACM, 62(10), 20-22.
- Dizdarevic, J., Carpio, F., Jukan, A., & Masip-Bruin, X. (2019). A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration. ACM Computing Surveys (CSUR), 51(6), 1-29.
- Jouini, M., & Rabai, L. B. A. (2019). A security framework for secure cloud computing environments. In Cloud security: Concepts, methodologies, tools, and applications (pp. 249-263). IGI Global.
- Tewari, A., & Gupta, B. B. (2020). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future generation computer systems, 108, 909-920.
- Ahmed, A. I. A., Ab Hamid, S. H., Gani, A., & Khan, M. K. (2019). Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges. Journal of Network and Computer Applications, 145, 102409.
- Norouzi, N., Bruder, G., Belna, B., Mutter, S., Turgut, D., & Welch, G. (2019). A systematic review of the convergence of augmented reality, intelligent virtual agents, and the internet of things. In Artificial Intelligence in IoT (pp. 1-24). Springer, Cham.
- Jamali, M. A. J., Bahrami, B., Heidari, A., Allahverdizadeh, P., & Norouzi, F. (2020). IoT Security. In Towards the Internet of Things (pp. 33-83). Springer, Cham.
- Singh, V., & Pandey, S. K. (2020). Cloud Computing: Vulnerability and Threat Indications. In Performance Management of Integrated Systems and its Applications in Software Engineering (pp. 11-20). Springer, Singapore.
- Domingo-Ferrer, J., Farràs, O., Ribes-González, J., & Sánchez, D. (2019). Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Computer Communications, 140, 38-60.
- Jalali, M. S., Kaiser, J. P., Siegel, M., & Madnick, S. (2019). The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products. IEEE Security & Privacy, 17(2), 39-48.
- Darwish, A., Hassanien, A. E., Elhoseny, M., Sangaiah, A. K., & Muhammad, K. (2019). The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. Journal of Ambient Intelligence and Humanized Computing, 10(10), 4151-4166.
- Shim, J. P., Avital, M., Dennis, A. R., Rossi, M., Sørensen, C., & French, A. (2019). The transformative effect of the internet of things on business and society. Communications of the Association for Information Systems, 44(1), 5.
- Barralon, P., Charrat, B., Chartier, I., Chirie, V., Fico, G., Guillen, S., & Peine, A. (2019). IoT for smart living environments: recommendations for healthy ageing solutions.
- Sanin, C., Haoxi, Z., Shafiq, I., Waris, M. M., de Oliveira, C. S., & Szczerbicki, E. (2019). Experience based knowledge representation for Internet of Things and Cyber Physical Systems with case studies. Future Generation Computer Systems, 92, 604-616.
- Jamali, M. A. J., Bahrami, B., Heidari, A., Allahverdizadeh, P., & Norouzi, F. (2020). IoT Security. In Towards the Internet of Things (pp. 33-83). Springer, Cham.
- Brenner, B., & Weippl, E. (2019). Security Analysis and Improvement of Data Logistics in AutomationML- Based Engineering Networks. In Security and Quality in Cyber-Physical Systems Engineering (pp. 305-334). Springer, Cham.
- Brenner, B., & Weippl, E. (2019). Security Analysis and Improvement of Data Logistics. Security and Quality in Cyber-Physical Systems Engineering: With Forewords by Robert M. Lee and Tom Gilb, 305.
- Jia, M., Komeily, A., Wang, Y., & Srinivasan, R. S. (2019). Adopting Internet of Things for the development of smart buildings: A review of enabling technologies and applications. Automation in Construction, 101, 111-126.
- Attaran, M., & Woods, J. (2019). Cloud computing technology: improving small business performance using the Internet. Journal of Small Business & Entrepreneurship, 31(6), 495-519.
- Appio, F. P., Lima, M., & Paroutis, S. (2019). Understanding Smart Cities: Innovation ecosystems, technological advancements, and societal challenges. Technological Forecasting and Social Change, 142, 1- 14.
- Varga, P., Peto, J., Franko, A., Balla, D., Haja, D., Janky, F., ...
- & Toka, L. (2020). 5g support for industrial iot applications-challenges, solutions, and research gaps. Sensors, 20(3), 828.
- Costin, A., Wehle, A., & Adibfar, A. (2019). Leading indicators-a conceptual IoT-based framework to produce active leading indicators for construction safety. Safety, 5(4), 86.
- NCSS,2020) NCSS: Statistical Software (www.ncss.com) /accessed on 6 March 2020.
- Qu, W., Liu, H., & Zhang, Z. (2019). A method of generating multivariate non-normal random numbers with desired multivariate skewness and kurtosis. Behavior Research Methods, 1-8.
- Bono, R., Arnau, J., Alarcón, R., & Blanca, M. J. (2020). Bias, precision, and accuracy of skewness and kurtosis estimators for frequently used continuous distributions. Symmetry, 12(1), 19.
- Mishra, S., & Singh, M. (2019). A Conceptual framework for effective M-Governance. Journal of Engineering Science and Technology, 14(6), 3514-3535.
- Kong, Y., Wang, Y., Hajli, S., & Featherman, M. (2019). In sharing economy we trust: Examining the effect of social and technical enablers on millennials' trust in sharing commerce. Computers in Human Behavior, 105993.