Skip to content
2000
image of Data Security and Privacy Preservation in Cloud-Based IoT Technologies: an Analysis of Risks and the Creation of Robust Countermeasures

Abstract

The Internet of Things (IoT) is a revolutionary technology being used in many different industries to improve productivity, automation, and comfort of the user in the cloud and distributed computing settings. Cloud computing is essential because it makes data management and storage more effective by automatically storing and examining the enormous amounts of data generated by Internet of Things applications. End users, companies, and government data are consequently migrating to the cloud at an increasing rate. A survey of the literature, however, reveals a variety of issues, including data integrity, confidentiality, authentication, and threat identification, that must be resolved to improve data security and privacy. To effectively address contemporary data security concerns, the existing approaches need to be improved. Ensuring secure end-to-end data transmission in a cloud-IoT situation requires innovative and dependable protocol architecture. New technologies that address some of the issues related to cloud data include edge computing, fog, blockchain, and machine learning. This paper provides a thorough examination of security risks, classifying them and suggesting possible defenses to safeguard cloud-IoT data. It also highlights innovative approaches, such as blockchain technology and machine learning, applied to privacy and data security. The paper also explores existing issues with respect to data privacy and security in today's cloud-IoT environments. It suggests possible future directions, including the need for end-user authentication, enhanced security, and procedures for recovering data in the event of an attack.

Loading

Article metrics loading...

/content/journals/rascs/10.2174/0126662558319054241003054922
2024-10-16
2024-11-22
Loading full text...

Full text loading...

References

  1. Kumar S. Tiwari P. Zymbler M. Internet of Things is a revolutionary approach for future technology enhancement: a review. J. Big Data 2019 6 1 111 10.1186/s40537‑019‑0268‑2
    [Google Scholar]
  2. Albugmi A. Alassafi M.O. Walters R. Wills G. Data security in cloud computing. Fifth International Conference on Future Generation Communication Technologies (FGCT), London, UK, 2016, pp. 55-59. 10.1109/FGCT.2016.7605062
    [Google Scholar]
  3. Sumithra R. Parameswari R. Data privacy and data protection security algorithms for big data in cloud. Int. J. Health Sci. 2022 6 S2 7613 7621 10.53730/ijhs.v6nS2.6834
    [Google Scholar]
  4. Schiller E. Aidoo A. Fuhrer J. Landscape of IoT security. Comput. Sci. Rev. 2022 44 1 100467 10.1016/j.cosrev.2022.100467
    [Google Scholar]
  5. Sun P.J. Privacy protection and data security in cloud computing: a survey, challenges, and solutions. IEEE Access 2019 7 147420 147452 10.1109/ACCESS.2019.2946185
    [Google Scholar]
  6. Kumar P.R. Raj P.H. Jelciana P. Exploring data security issues and solutions in cloud computing. Procedia Comput. Sci. 2018 125 691 697 10.1016/j.procs.2017.12.089
    [Google Scholar]
  7. Zhang J. Chen B. Zhao Y. Cheng X. Hu F. Data security and privacy-preserving in edge computing paradigm: Survey and open issues. IEEE Access 2018 6 18209 18237 10.1109/ACCESS.2018.2820162
    [Google Scholar]
  8. Tran H.Y. Hu J. Privacy-preserving big data analytics a comprehensive survey. J. Parallel Distrib. Comput. 2019 134 207 218 10.1016/j.jpdc.2019.08.007
    [Google Scholar]
  9. Dutkiewicz L. Privacy-preserving techniques for trustworthy data sharing: Opportunities and challenges for future research. Data Spaces Curry E. Scerri S. Tuikka T. Cham Springer 2022 319 335 10.1007/978‑3‑030‑98636‑0_15
    [Google Scholar]
  10. Ram Mohan Rao P. Murali Krishna S. Siva Kumar A.P. Privacy preservation techniques in big data analytics: A survey. J. Big Data 2018 5 1 33 [Springer open.]. 10.1186/s40537‑018‑0141‑8
    [Google Scholar]
  11. Kaaniche N. Laurent M. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput. Commun. 2017 111 120 141 10.1016/j.comcom.2017.07.006
    [Google Scholar]
  12. Abouelmehdi K. Beni-Hessane A. Khaloufi H. Big healthcare data: Preserving security and privacy. J. Big Data 2018 5 1 1 [Springeropen.]. 10.1186/s40537‑017‑0110‑7
    [Google Scholar]
  13. Yin H. Chen E. Zhu Y. Zhao C. Feng R. Yau S. S. Attribute-based private data sharing with script-driven programmable ciphertext and decentralized key management in blockchain internet of things. IEEE Internet Things J. 2022 9 13 10625 10639 10.1109/JIOT.2021.3124016
    [Google Scholar]
  14. Mishra KN. Bhattacharjee V. Saket S. Mishra SP. Cloud and big data security system’s review principles: A decisive investigation. Wirel. Pers. Commun. 126 1013 1050 10.1007/s11277‑022‑09781‑0
    [Google Scholar]
  15. Yao H. Data storage security system based on cloud computing. IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI), Changchun, China, 2022, pp. 1220-1223. 10.1109/ICETCI55101.2022.9832390
    [Google Scholar]
  16. Zaid A. RETRACTED: Cloud data security mechanism using the lightweight cryptography. Optik 2022 271 170084 10.1016/j.ijleo.2022.170084
    [Google Scholar]
  17. Pandey N.K. Kumar K. Saini G. Mishra AK. Security issues and challenges in cloud of things-based applications for industrial automation. Ann. Oper. Res. 2023 1 20 10.1007/s10479‑023‑05285‑7
    [Google Scholar]
  18. Ray SM. Mishra KN. Dutta S. Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review. Recent Adv. Comput. Sci. Commun. 2020 12 10.2174/2666255813666200224092717
    [Google Scholar]
  19. Bedi RK. Singh J. Gupta SK. An efficient and secure privacy preserving multi-cloud storage framework for mobile devices. 43 5 2021 472 482 10.1080/1206212X.2019.1572847
    [Google Scholar]
  20. Mihailescu M.I. Nita S.L. Asalomia B.L. Rogobete M.G. Racuciu C. Customized authorization process for cloud computing and iot using attribute-based encryption. 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Ploiesti, Romania, 2022, pp. 1-4. 10.1109/ECAI54874.2022.9847501
    [Google Scholar]
  21. Henze M. Wolters B. Matzutt R. Zimmermann T. Wehrle K. Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things. IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, 2017, pp. 185-192 10.1109/Trustcom/BigDataSE/ICESS.2017.236
    [Google Scholar]
  22. Simsek I. Zero-knowledge and identity-based authentication, authorization, access control, and key exchange for publish/subscribe in internet of things. 6th Conference on Cloud and Internet of Things (CIoT), Lisbon, Portugal, 2023, pp. 47-54. 10.1109/CIoT57267.2023.10084902
    [Google Scholar]
  23. Shin S. Kwon T. A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5g-integrated internet of things. IEEE Access 2020 8 67555 67571 10.1109/ACCESS.2020.2985719
    [Google Scholar]
  24. Stergiou C. Psannis K.E. Xifilidis T. Plageras A.P. Gupta B.B. Security and privacy of big data for social networking services in cloud. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Honolulu, HI, USA, 2018, pp. 438-443. 10.1109/INFCOMW.2018.8406831
    [Google Scholar]
  25. Wang H. Research on risk and supervision of financial big data application based on cloud computing. IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA), Dalian, China, 2021, pp. 507-510. 10.1109/AEECA52519.2021.9574292
    [Google Scholar]
  26. Javid T. Faris M. Beenish H. Fahad M. Cybersecurity and data privacy in the cloudlet for preliminary healthcare big data analytics International Conference on Computing and Information Technology (ICCIT-1441), Tabuk, Saudi Arabia, 2020, pp. 1-4. 10.1109/ICCIT‑144147971.2020.9213712
    [Google Scholar]
  27. Gai K. Qiu M. Zhao H. Privacy-preserving data encryption strategy for big data in mobile cloud computing. IEEE Trans. Big Data 2021 7 4 678 688
    [Google Scholar]
  28. Shukla R.S. IoT based designing of secure data storage system in distributed cloud system with big data using cryptography algorithm. 11th International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India, 2022, pp. 264-270. 10.1109/SMART55829.2022.10047177
    [Google Scholar]
  29. Gnana Sophia S. Secure storage and accessing the data in cloud using optimized homomorphic encryption. J. Control Decis. 2023 10 1 90 98 10.1080/23307706.2022.2078436
    [Google Scholar]
  30. Yahuza M. Idris M.Y.I.B. Wahab A.W.B.A. Ho A.T.S. Khan S. Musa S.N.B. Taha A.Z.B. Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities. IEEE Access 2020 8 76541 76567 10.1109/ACCESS.2020.2989456
    [Google Scholar]
  31. Sharma Y. Gupta H. Khatri S.K. A security model for the enhancement of data privacy in cloud computing. Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates, 2019, pp. 898-902. 10.1109/AICAI.2019.8701398
    [Google Scholar]
  32. Silva L.V. Barbosa P. Marinho R. Brito A. Security and privacy aware data aggregation on cloud computing. J. Internet Serv. Appl. 2018 9 1 6 [Springeropen.]. 10.1186/s13174‑018‑0078‑3
    [Google Scholar]
  33. Bertino E. Big data security and privacy. A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years Springer Cham 2016 425 439 10.1109/BigData.2016.7840581
    [Google Scholar]
  34. Zhao X.P. Jiang R. Distributed machine learning oriented data integrity verification scheme in cloud computing environment. IEEE Access 2020 8 26372 26384 10.1109/ACCESS.2020.2971519
    [Google Scholar]
  35. Yu Y. Au M.H. Ateniese G. Huang X. Susilo W. Dai Y. Min G. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 2017 12 4 767 778 10.1109/TIFS.2016.2615853
    [Google Scholar]
  36. Sookhak M. Yu F.R. Zomaya A.Y. Auditing big data storage in cloud computing using divide and conquer tables. IEEE Trans. Parallel Distrib. Syst. 2018 29 5 999 1012 10.1109/TPDS.2017.2784423
    [Google Scholar]
  37. Akmal M. Syangtan B. Alchouemi A. Enhancing the security of data in cloud computing environments using remote data auditing. 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA), Sydney, Australia, 2021, pp. 1-10. 10.1109/CITISIA53721.2021.9719899
    [Google Scholar]
  38. Awaysheh F.M. Aladwan M.N. Alazab M. Alawadi S. Cabaleiro J.C. Pena T.F. Security by design for big data frameworks over cloud computing. IEEE Trans. Eng. Manage. 2022 69 6 3676 3693 10.1109/TEM.2020.3045661
    [Google Scholar]
  39. Tang Z. A preliminary study on data security technology in big data cloud computing environment. 2020 International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE), Bangkok, Thailand, 2020, pp. 27-30. 10.1109/ICBASE51474.2020.00013
    [Google Scholar]
  40. Shi Y. Data security and privacy protection in public cloud. IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 2018, pp. 4812-4819. 10.1109/BigData.2018.8622531
    [Google Scholar]
  41. Alouffi B. Hasnain M. Alharbi A. Alosaimi W. Alyami H. Ayaz M. A systematic literature review on cloud computing security: Threats and mitigation strategies. IEEE Access 2021 9 57792 57807 10.1109/ACCESS.2021.3073203
    [Google Scholar]
  42. Hamzah Amlak GMH. Al-Saedi KHK. Data mining techniques for cloud privacy preservation. Int. J. Intell. Syst. Appl. Eng. 2023 11 6S 246 256
    [Google Scholar]
  43. Yu K. Tan L. Yang C. A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings. IEEE Internet Things J. 2022 9 11 8154 8167 10.1109/JIOT.2021.3125190
    [Google Scholar]
  44. Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions. IEEE Access 2022 10 71247 71277 10.1109/ACCESS.2022.3188110
    [Google Scholar]
  45. Yang C. Huang Q. Li Z. Liu K. Hu F. Big data and cloud computing: Innovation opportunities and challenges. Int. J. Digit. Earth 2017 10 1 13 53
    [Google Scholar]
  46. Wang F. Wang H. Xue L. Research on data security in big data cloud computing environment. IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 2021, pp. 1446-1450. 10.1109/IAEAC50856.2021.9391025
    [Google Scholar]
  47. Reddy Y. Big data security in cloud environment. IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), Omaha, NE, USA, 2018, pp. 100-106. 10.1109/BDS/HPSC/IDS18.2018.00033
    [Google Scholar]
  48. Hiremath S. Kunte S. A novel data auditing approach to achieve data privacy and data integrity in cloud computing. International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), Mysuru, India, 2017, pp. 306-310. 10.1109/ICEECCOT.2017.8284517
    [Google Scholar]
  49. Yan H. Gui W. Efficient identity-based public integrity auditing of shared data in cloud storage with user privacy preserving. IEEE Access 2021 9 45822 45831 10.1109/ACCESS.2021.3066497
    [Google Scholar]
  50. Li Y. Zhang F. An efficient certificate-based data integrity auditing protocol for cloud-assisted WBANs. IEEE Internet Things J. 2022 9 13 11513 11523 10.1109/JIOT.2021.3130291
    [Google Scholar]
  51. Kumar A. Framework for Data Security Using DNA Cryptography and HMAC Technique in Cloud Computing Second International Conference on Electronics and Sustainable Communication Systems (ICESC) Coimbatore, India, 2021, pp. 898-903 10.1109/ICESC51422.2021.9532950
    [Google Scholar]
  52. Duan H. Zheng Y. Wang C. Yuan X. Treasure collection on foggy islands: building secure network archives for internet of things. IEEE Internet Things J. 2019 6 2 2637 2650 10.1109/JIOT.2018.2872461
    [Google Scholar]
  53. Pawlicki M. Pawlicka A. Kozik R. Choraś M. The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT. Neurocomputing 2023 551 126533 10.1016/j.neucom.2023.126533
    [Google Scholar]
  54. Chenthara S. Ahmed K. Wang H. Whittaker F. Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE Access 2019 7 74361 74382 10.1109/ACCESS.2019.2919982
    [Google Scholar]
  55. Hou Y. Garg S. Hui L. Jayakody D.N.K. Jin R. Hossain M.S. A data security enhanced access control mechanism in mobile edge computing. IEEE Access 2020 8 136119 136130 10.1109/ACCESS.2020.3011477
    [Google Scholar]
  56. Ishaq A. Qadeer B. Shah M.A. Bari N. A comparative study on securing electronic health records (EHR) in cloud computing. 6th International Conference on Automation and Computing (ICAC), Portsmouth, United Kingdom, 2021, pp. 1-7. 10.23919/ICAC50006.2021.9594178
    [Google Scholar]
  57. Jusak J. Mahmoud S.S. Laurens R. Alsulami M. Fang Q. A new approach for secure cloud-based electronic health record and its experimental testbed. IEEE Access 2022 10 1082 1095 10.1109/ACCESS.2021.3138135
    [Google Scholar]
  58. Binjubeir M. Ahmed A.A. Ismail M.A.B. Sadiq A.S. Khurram Khan M. Comprehensive survey on big data privacy protection. IEEE Access 2020 8 20067 20079 10.1109/ACCESS.2019.2962368
    [Google Scholar]
  59. Nanda P. He X. Yang L.T. Security, trust and privacy in cyber (STPCyber): Future trends and challenges. Future Gener. Comput. Syst. 2020 109 446 449 10.1016/j.future.2020.02.010
    [Google Scholar]
  60. Himeur Y. Sohail SS. Bensaali F. Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives. Comput. Secur. J. 2022 118 102746 10.1016/j.cose.2022.102746
    [Google Scholar]
  61. Ye C. Cao W. Chen S. Security challenges of blockchain in internet of things: Systematic literature review. Trans. Emerg. Telecommun. Technol. 2020 32 8 e4177 10.1002/ett.4177
    [Google Scholar]
  62. Jain P. Gyanchandani M. Khare N. Big data privacy: a technological perspective and review. J. Big Data 2016 3 1 25 [Springer.]. 10.1186/s40537‑016‑0059‑y
    [Google Scholar]
  63. Lu X. Pan Z. Xian H. An efficient and secure data sharing scheme for mobile devices in cloud computing. J. Cloud Comput. (Heidelb.) 2020 9 1 60 [Springeropen.]. 10.1186/s13677‑020‑00207‑5
    [Google Scholar]
  64. Muzammal S.M. Shah M.A. Khattak H.A. Jabbar S. Ahmed G. Khalid S. Hussain S. Han K. Counter measuring conceivable security threats on smart healthcare devices. IEEE Access 2018 6 20722 20733 10.1109/ACCESS.2018.2826225
    [Google Scholar]
  65. Ghaffar Z. Ahmed S. Mahmood K. Islam S.H. Hassan M.M. Fortino G. An improved authentication scheme for remote data access and sharing over cloud storage in cyber-physical-social-systems. IEEE Access 2020 8 47144 47160 10.1109/ACCESS.2020.2977264
    [Google Scholar]
  66. Jiang Q Kumar N. Ma J. A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. Int. J. Netw. Manag. 2016 27 3 e1937
    [Google Scholar]
  67. Ahmed W. Rasool A. Javed A.R. Kumar N. Gadekallu T.R. Jalil Z. Kryvinska N. Security in next generation mobile payment systems: A comprehensive survey. IEEE Access 2021 9 115932 115950 10.1109/ACCESS.2021.3105450
    [Google Scholar]
  68. Wang P. Chen C.M. Kumari S. Shojafar M. Tafazolli R. Liu Y.N. HDMA: Hybrid D2D message authentication scheme for 5G-enabled VANETs. IEEE Trans. Intell. Transp. Syst. 2021 22 8 5071 5080 10.1109/TITS.2020.3013928
    [Google Scholar]
  69. Ullah F. Naeem H. Jabbar S. Khalid S. Latif M.A. Al-turjman F. Mostarda L. Cyber security threats detection in internet of things using deep learning approach. IEEE Access 2019 7 124379 124389 10.1109/ACCESS.2019.2937347
    [Google Scholar]
  70. Jahromi A.N. Karimipour H. Dehghantanha A. Choo K.K.R. Toward detection and attribution of cyber-attacks in IoT-enabled cyber–physical systems. IEEE Internet Things J. 2021 8 17 13712 13722 10.1109/JIOT.2021.3067667
    [Google Scholar]
  71. Zhang W. Jin S. Research and application of data privacy protection technology in cloud computing environment based on attribute encryption. IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), Shenyang, China, 2020, pp. 994-996. 10.1109/ICPICS50287.2020.9202055
    [Google Scholar]
  72. Khan H.K. Pradhan R. Chandavarkar B.R. Hybrid cryptography for cloud computing. 2nd International Conference for Emerging Technology (INCET), Belagavi, India, 2021, pp. 1-5. 10.1109/INCET51464.2021.9456210
    [Google Scholar]
  73. Abdulsalam Y.S. Hedabou M. Decentralized data integrity scheme for preserving privacy in cloud computing. International Conference on Security, Pattern Analysis, and Cybernetics(SPAC), Chengdu, China, 2021, pp. 607-612. 10.1109/SPAC53836.2021.9539946
    [Google Scholar]
  74. Jeong J. Joo J.W.J. Lee Y. Son Y. Secure cloud storage service using bloom filters for the internet of things. IEEE Access 2019 7 60897 60907 10.1109/ACCESS.2019.2915576
    [Google Scholar]
  75. Zhu H. Yuan Y. Chen Y. Zha Y. Xi W. Jia B. Xin Y. A secure and efficient data integrity verification scheme for cloud-IoT based on short signature. IEEE Access 2019 7 90036 90044 10.1109/ACCESS.2019.2924486
    [Google Scholar]
  76. Alrasheed S.H. Aiedalhariri M. Adubaykhi S.A. El Khediri S. Cloud computing security and challenges: Issues, threats, and solutions. 5th Conference on Cloud and Internet of Things (CIoT), Marrakech, Morocco, 2022, pp. 166-172. 10.1109/CIoT53061.2022.9766571
    [Google Scholar]
  77. Mishra JK. Janarthanan M. Cloud computing security: Machine and deep learning models analysis. Macromol. Symp. 2023 407 1 2100521 10.1002/masy.202100521
    [Google Scholar]
  78. Kumar V. Mohammed Ali Al-Tameemi A. Kumari A. Ahmad M. Falah M.W. Abd El-Latif A.A. PSEBVC: Provably secure ECC and biometric based authentication framework using smartphone for vehicular cloud environment. IEEE Access 2022 10 84776 84789 10.1109/ACCESS.2022.3195807
    [Google Scholar]
  79. Wylde V. Rawindaran N. Lawrence J. Balasubramanian R. Prakash E. Jayal A. Khan I. Hewage C. Platts J. Cybersecurity, data privacy and blockchain: A review. SN Comput. Sci. 2022 3 2 127 10.1007/s42979‑022‑01020‑4 35036930
    [Google Scholar]
  80. Al Hamid H.A. Rahman S.M.M. Hossain M.S. Almogren A. Alamri A. A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 2017 5 22313 22328 10.1109/ACCESS.2017.2757844
    [Google Scholar]
  81. Abed AK. Anupam A. Review of security issues in Internet of Things and artificial intelligence-driven solutions. Secur. Priv. 2023 6 3 e285 10.1002/spy2.285
    [Google Scholar]
  82. Unal E. Sen-Baidya S. Hewett R. Towards prediction of security attacks on software defined networks: A big data analytic approach. IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 2018, pp. 4582-4588. 10.1109/BigData.2018.8622524
    [Google Scholar]
  83. Morioka E. Sharbaf M.S. Digital forensics research on cloud computing: An investigation of cloud forensics solutions. IEEE Symposium on Technologies for Homeland Security (HST), Waltham, MA, USA, 2016, pp. 1-6. 10.1109/THS.2016.7568909
    [Google Scholar]
  84. Al-Dhaqm A. Ikuesan RA. Kebande VR. Digital forensics subdomains: The state of the art and future directions. IEEE Access 2021 152476 152502 10.1109/ACCESS.2021.3124262
    [Google Scholar]
  85. Mahrous W.A. Farouk M. Darwish S.M. An enhanced blockchain-based IoT digital forensics architecture using fuzzy hash. IEEE Access 2021 9 151327 151336 10.1109/ACCESS.2021.3126715
    [Google Scholar]
  86. Ali J. Roh B-h. Lee B. Oh J. Adil M. A machine learning framework for prevention of software-defined networking controller from DDoS attacks and dimensionality reduction of big data. International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea (South), 2020, pp. 515-519. 10.1109/ICTC49870.2020.9289504
    [Google Scholar]
  87. Safaei Yaraziz M. Jalili A. Gheisari M. Liu Y. Recent trends towards privacy‐preservation in Internet of Things, its challenges and future directions. IET Circuits Dev. Syst. 2023 17 2 53 61 10.1049/cds2.12138
    [Google Scholar]
  88. Navin Prasad S. Rekha C. Block chain based IAS protocol to enhance security and privacy in cloud computing,Measurement. Sensors, Elsevier. 2023 28 100813
    [Google Scholar]
  89. Sicari S. Rizzardi A. Coen-Porisini A. Insights into security and privacy towards fog computing evolution. Comput. Secur. 2022 120 102822 10.1016/j.cose.2022.102822
    [Google Scholar]
  90. Pathak M. Mishra K.N. Singh S.P. Mishra A. An automated smart centralised vehicle security system for controlling the vehicle thefts/hacking using IOT and facial recognition. International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Dubai, United Arab Emirates, 2023, pp. 516-521. 10.1109/ICCIKE58312.2023.10131765
    [Google Scholar]
  91. Hossain MS. Muhammad G. Abdul W. Song B. Gupta BB. Cloud-assisted secure video transmission and sharing framework for smart cities. Future Gener. Comput. Syst. 2018 83 596 606 10.1016/j.future.2017.03.029
    [Google Scholar]
  92. Chen J. Ramanathan L. Alazab M. Holistic big data integrated artificial intelligent modeling to improve privacy and security in data management of smart cities. Microprocess. Microsyst. 2021 81 103722 10.1016/j.micpro.2020.103722
    [Google Scholar]
  93. Arora A. Khanna A. Rastogi A. Agarwal A. Cloud security ecosystem for data security and privacy. 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence, Noida, India, 2017, pp. 288-292. 10.1109/CONFLUENCE.2017.7943164
    [Google Scholar]
  94. Tian Y. Kaleemullah M.M. Rodhaan M.A. Song B. Al-Dhelaan A. Ma T. A privacy preserving location service for cloud-of-things system. J. Parallel Distrib. Comput. 2019 123 215 222 10.1016/j.jpdc.2018.09.005
    [Google Scholar]
  95. Rahman S.M.M. Hossain M.A. Hassan M.M. Alamri A. Alghamdi A. Pathan M. Secure privacy vault design for distributed multimedia surveillance system. Future Gener. Comput. Syst. 2016 55 344 352 10.1016/j.future.2014.10.019
    [Google Scholar]
  96. Ogunniye G. Kokciyan N. A survey on understanding and representing privacy requirements in the Internet-of-Things. J. Artif. Intell. Res. 2023 76 163 192 10.1613/jair.1.14000
    [Google Scholar]
  97. Majeed A. Khan S. Hwang S.O. Toward privacy preservation using clustering based anonymization: Recent advances and future research outlook. IEEE Access 2022 10 53066 53097 10.1109/ACCESS.2022.3175219
    [Google Scholar]
  98. Campos E.M. Saura P.F. González-Vidal A. Hernández-Ramos J.L. Bernabé J.B. Baldini G. Skarmeta A. Evaluating federated learning for intrusion detection in internet of things: Review and challenges. Comput. Netw. 2022 203 108661 10.1016/j.comnet.2021.108661
    [Google Scholar]
  99. Chen Q. Wu L. Jiang C. ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture. J. Cloud Comput. (Heidelb.) 2022 11 1 20 [Springer.]. 10.1186/s13677‑022‑00295‑5
    [Google Scholar]
  100. Williams P. Dutta IK. Daoud H. Bayoumi M. A survey on security in internet of things with a focus on the impact of emerging technologies. Internet Things J. 2022 19 100564 10.1016/j.iot.2022.100564
    [Google Scholar]
  101. Karie N.M. Sahri N.M. Yang W. Valli C. Kebande V.R. A review of security standards and frameworks for IoT-based smart environments. IEEE Access 2021 9 121975 121995 10.1109/ACCESS.2021.3109886
    [Google Scholar]
  102. Butpheng C. Yeh K.H. Xiong H. Security and privacy in IoT-cloud-based e-health systems — A comprehensive review. Symmetry (Basel) 2020 12 7 1191 10.3390/sym12071191
    [Google Scholar]
  103. Wazid M. Das A.K. Hussain R. Succi G. Rodrigues J.J.P.C. Authentication in cloud-driven IoT-based big data environment: Survey and outlook. J. Systems Archit. 2019 97 185 196 10.1016/j.sysarc.2018.12.005
    [Google Scholar]
  104. Nadian-Ghomsheh A. Farahani B. Kavian M. A hierarchical privacy-preserving IoT architecture for vision-based hand rehabilitation assessment. Multimedia Tools Appl. 2021 80 20 31357 31380 10.1007/s11042‑021‑10563‑2 33613083
    [Google Scholar]
  105. Zhou J. Cao Z. Dong X. Vasilakos A.V. Security and privacy for cloud-based IoT: Challenges. IEEE Commun. Mag. 2017 55 1 26 33 10.1109/MCOM.2017.1600363CM
    [Google Scholar]
  106. Mishra A. Jabar T.S. Alzoubi Y.I. Mishra K.N. Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework. Concurr. Comput. 2023 35 26 e7831 10.1002/cpe.7831
    [Google Scholar]
  107. Choudhury T. Gupta A. Pradhan S. Kumar P. Rathore Y.S. Privacy and security of cloud-based internet of things (IoT. 2017 3rd International Conference on Computational Intelligence and Networks (CINE), Odisha, India, 2017, pp. 40-45. 10.1109/CINE.2017.28
    [Google Scholar]
  108. Ahmad W. Rasool A. Javed A.R. Baker T. Jalil Z. Cyber security in IoT-based cloud computing: A comprehensive survey. Electronics (Basel) 2021 11 1 16 10.3390/electronics11010016
    [Google Scholar]
  109. Rachit B. Bhatt S. Ragiri P.R. Security trends in Internet of Things: A survey. SN Appl. Sci. 2021 3 1 121 10.1007/s42452‑021‑04156‑9
    [Google Scholar]
  110. Hurrah N.N. Parah S.A. Sheikh J.A. Al-Turjman F. Muhammad K. Secure data transmission framework for confidentiality in IoTs. Ad Hoc Netw. 2019 95 101989 10.1016/j.adhoc.2019.101989
    [Google Scholar]
  111. Kumar A. Khan S.B. Pandey S.K. Shankar A. Maple C. Mashat A. Malibari A.A. Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities. J. Cloud Comput. (Heidelb.) 2023 12 1 92 10.1186/s13677‑023‑00469‑9
    [Google Scholar]
  112. Quach S. Thaichon P. Martin K.D. Weaven S. Palmatier R.W. Digital technologies: Teensions in privacy and data. J. Acad. Mark. Sci. 2022 50 6 1299 1323 10.1007/s11747‑022‑00845‑y 35281634
    [Google Scholar]
  113. Waheed N. He X. Ikram M. Usman M. Hashmi S.S. Usman M. Security and privacy in iot using machine learning and blockchain: Threats and countermeasures. ACM Comput. Surv. 2020 53 6 1 37 10.1145/3417987
    [Google Scholar]
  114. Khan S. Parkinson S. Qin Y. Fog computing security: A review of current applications and security solutions. J. Cloud Comput. (Heidelb.) 2017 6 1 19 10.1186/s13677‑017‑0090‑3
    [Google Scholar]
  115. Radoglou Grammatikis P.I. Sarigiannidis P.G. Moscholios I.D. Securing the Internet of Things: Challenges, threats and solutions. Internet Things J. 2019 5 41 70 10.1016/j.iot.2018.11.003
    [Google Scholar]
  116. Lin J. Yu W. Zhang N. Yang X. Zhang H. Zhao W. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 2017 4 5 1125 1142 10.1109/JIOT.2017.2683200
    [Google Scholar]
  117. Lone A.N. Mustajab S. Alam M. A comprehensive study on cybersecurity challenges and opportunities in the IoT world. Secur. Priv. 2023 6 6 e318 10.1002/spy2.318
    [Google Scholar]
  118. Sadhu P.K. Yanambaka V.P. Abdelgawad A. Internet of Things: Security and solutions survey. Sensors (Basel) 2022 22 19 7433 10.3390/s22197433 36236531
    [Google Scholar]
  119. Jain S.K. Kesswani N. A noise-based privacy preserving model for internet of things. Complex Intell. Syst. 2023 9 4 3655 3679 10.1007/s40747‑021‑00489‑5
    [Google Scholar]
  120. Andrew J. Karthikeyan J. Privacy-preserving internet of things: Techniques and applications. Int. J. Eng. Adv. Technol. 2019 8 6 3229 3234 10.35940/ijeat.F8830.088619
    [Google Scholar]
  121. Sarwar K. Yongchareon S. Yu J. Rehman S.U. 2021 A survey on privacy preservation in fog-enabled internet of things ACM Comput. Surv. 55 1 1 39 10.1145/3474554
    [Google Scholar]
  122. Mei R. Yan H.B. He Y. Wang Q. Zhu S. Wen W. Considerations on evaluation of practical cloud data protection. Cyber Security Singapore Springer 2022 51 69 10.1007/978‑981‑19‑8285‑9_4
    [Google Scholar]
  123. Hassija V. Chamola V. Saxena V. Jain D. Goyal P. Sikdar B. A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 2019 7 82721 82743 10.1109/ACCESS.2019.2924045
    [Google Scholar]
  124. Amiri-Zarandi M. Dara R.A. Fraser E. A survey of machine learning-based solutions to protect privacy in the Internet of Things. Comput. Secur. 2020 96 101921 10.1016/j.cose.2020.101921
    [Google Scholar]
  125. Rodríguez E. Otero B. Canal R. A survey of machine and deep learning methods for privacy protection in the internet of things. Sensors (Basel) 2023 23 3 1252 10.3390/s23031252 36772292
    [Google Scholar]
  126. Moqurrab S.A. Tariq N. Anjum A. Asheralieva A. Malik S.U.R. Malik H. Pervaiz H. Gill S.S. A deep learning-based privacy-preserving model for smart healthcare in internet of medical things using fog computing. Wirel. Pers. Commun. 2022 126 3 2379 2401 10.1007/s11277‑021‑09323‑0 36059591
    [Google Scholar]
  127. Nasiraee H. Ashouri-Talouki M. Privacy-preserving distributed data access control for CloudIoT. IEEE Trans. Dependable Secure Comput. 2022 19 4 2476 2487 10.1109/TDSC.2021.3060337
    [Google Scholar]
  128. Cha S.C. Hsu T.Y. Xiang Y. Yeh K.H. Privacy enhancing technologies in the internet of things: perspectives and challenges. IEEE Internet Things J. 2019 6 2 2159 2187 10.1109/JIOT.2018.2878658
    [Google Scholar]
  129. Tawalbeh LA. Saldamli G. Reconsidering big data security and privacy in cloud and mobile cloud systems. J. King Saud Univ. - Comput. Inf. Sci. 2021 33 7 810 819 10.1016/j.jksuci.2019.05.007
    [Google Scholar]
  130. Singh N. Singh A.K. Data privacy protection mechanisms in cloud. Data Sci. Eng. 2018 3 1 24 39 10.1007/s41019‑017‑0046‑0
    [Google Scholar]
  131. Alabdulatif A. Thilakarathne N.N. Kalinaki K. A novel cloud enabled access control model for preserving the security and privacy of medical big data. Electronics (Basel) 2023 12 12 2646 10.3390/electronics12122646
    [Google Scholar]
  132. Krishnaraj N. Sangeetha S. A study of data privacy in internet of things using privacy preserving techniques with its management. Int. J. Eng. Trends Technol. 2022 70 3 54 65
    [Google Scholar]
  133. Al Kabir A. Mohammed E. Wael S. Securing IoT devices against emerging security threats: Challenges and mitigation techniques. J. Cyber Secur. 2023 7 4 199 223 10.1080/23742917.2023.2228053
    [Google Scholar]
  134. Alzoubi Y.I. Ahmad A.A.A.L. Jaradat A. Fog computing security and privacy issues, open challenges, and blockchain solution: An overview. Int. J. Electr. Comput. Eng. 2021 11 6 5081 5088
    [Google Scholar]
  135. Zaman S. Alhazmi K. Aseeri M.A. Ahmed M.R. Khan R.T. Kaiser M.S. Mahmud M. Security threats and artificial intelligence based countermeasures for internet of things networks: A comprehensive survey. IEEE Access 2021 9 94668 94690 10.1109/ACCESS.2021.3089681
    [Google Scholar]
  136. Selvarajan S. Srivastava G. Khadidos A.O. Khadidos A.O. Baza M. Alshehri A. Lin J.C.W. An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. J. Cloud Comput. (Heidelb.) 2023 12 1 38 10.1186/s13677‑023‑00412‑y 36937654
    [Google Scholar]
  137. Alnaim A.K. Alwakeel A.M. machine-learning-based IoT–edge computing healthcare solutions. electronics 2023 12 1027
    [Google Scholar]
  138. Xiao Y. Jia Y. Liu C. Cheng X. Yu J. Lv W. Edge computing security: State of the art and challenges. Proc. IEEE 2019 107 8 1608 1631 10.1109/JPROC.2019.2918437
    [Google Scholar]
  139. Tahirkheli A.I. Shiraz M. Hayat B. Idrees M. Sajid A. Ullah R. Ayub N. Kim K.I. A survey on modern cloud computing security over smart city networks: Threats, vulnerabilities, consequences, countermeasures, and challenges. Electronics (Basel) 2021 10 15 1811 10.3390/electronics10151811
    [Google Scholar]
  140. Atiewi S. Al-Rahayfeh A. Almiani M. Yussof S. Alfandi O. Abugabah A. Jararweh Y. Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography. IEEE Access 2020 8 113498 113511 10.1109/ACCESS.2020.3002815
    [Google Scholar]
  141. Roslin Dayana K. Shobha Rani P. Secure cloud data storage solution with better data accessibility and time efficiency. Automatika 2023 64 751 758
    [Google Scholar]
  142. Thabit F. Alhomdy S. Jagtap S. A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions. Int. J. Intell. Netw. 2021 2 18 33
    [Google Scholar]
  143. Jain P. Gyanchandani M. Khare N. Enhanced secured map reduce layer for big data privacy and security. J. Big Data 2019 6 1 30 10.1186/s40537‑019‑0193‑4
    [Google Scholar]
  144. Azeez N.A. der Vyver C.V. Security and privacy issues in e-health cloud-based system: A comprehensive content analysis. Egypt. Inform. J. 2019 20 2 97 108 10.1016/j.eij.2018.12.001
    [Google Scholar]
  145. Rejin PR. Paul RD. Alavi AH. Verification of data integrity and co-operative loss recovery for secure data storage in cloud computing. Cogent Eng. 2019 6 1 10.1080/23311916.2019.1654694
    [Google Scholar]
  146. Xie Q. Zhang C. Jia X. Security-aware and efficient data deduplication for edge-assisted cloud storage systems. IEEE Trans. Serv. Comput. 2023 16 03 2191 2202
    [Google Scholar]
  147. Kaur K. Syed A. Mohammad A. Halgamuge M.N. Review: An evaluation of major threats in cloud computing associated with big data. IEEE 2nd International Conference on Big Data Analysis (ICBDA), Beijing, China, 2017, pp. 368-372. 2017 10.1109/ICBDA.2017.8078842
    [Google Scholar]
  148. Niu L. Wang F. Li J. Development of agricultural internet of things monitoring system combining cloud computing and wechat technology. IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 2019, pp. 1457-1460. 10.1109/ITAIC.2019.8785884
    [Google Scholar]
  149. Wang Y. Ni K. Wang X. Zhu J. Design of automatic weather monitoring and forecasting system based on internet of things and big data. 2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), Erode, India, 2022, pp. 979-982. 10.1109/ICSCDS53736.2022.9761041
    [Google Scholar]
  150. Al-Mekhlafi Z.G. Al-Shareeda M.A. Manickam S. Mohammed B.A. Qtaish A. Lattice-based lightweight quantum resistant scheme in 5g-enabled vehicular networks. Mathematics 2023 11 2 399 10.3390/math11020399
    [Google Scholar]
  151. Al-Mekhlafi Z.G. Al-Shareeda M.A. Manickam S. Mohammed B.A. Alreshidi A. Alazmi M. Alshudukhi J.S. Alsaffar M. Alsewari A. Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5g-enabled vehicular networks. Electronics (Basel) 2023 12 4 872 10.3390/electronics12040872
    [Google Scholar]
  152. Al-Shareeda M.A. Manickam S. COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing. Int. J. Environ. Res. Public Health 2022 19 23 15618 10.3390/ijerph192315618 36497709
    [Google Scholar]
  153. Pathak M. Mishra K.N. Singh S.P. Securing data and preserving privacy in Cloud IoT-based technologies: An analysis of assessing threats and developing effective safeguards. Artif. Intell. Rev. 2024 1 33
    [Google Scholar]
  154. Ali A. Joseph N. Nadaf T.A. Blockchain segmentation: An industrial solution for large scale data. Soft Computing and Its Engineering Applications Patel K.K. Santosh K. Patel A. Ghosh A. Springer Cham 2024 Vol. 2030 10.1007/978‑3‑031‑53731‑8_15
    [Google Scholar]
  155. Mahapatro R.K. Ali A. Ramakrishnan N. Blockchain segmentation: A storage optimization technique for large data. 8th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 2023, pp. 499-504. 2023 10.1109/ICCES57224.2023.10192631
    [Google Scholar]
  156. Li H. Ge L. Tian L. Survey: Federated learning data security and privacy-preserving in edge-Internet of Things. Artif. Intell. Rev. 2024 57 5 130 10.1007/s10462‑024‑10774‑7
    [Google Scholar]
  157. Namakshenas D. Yazdinejad A. Dehghantanha A. Srivastava G. Federated quantum-based privacy-preserving threat detection model for consumer internet of things. IEEE Trans. Consum. Electron. 2024 10.1109/TCE.2024.3377550
    [Google Scholar]
  158. Allam A.H. Gomaa I. Zayed H.H. Taha M. IoT-based eHealth using blockchain technology: A survey. Cluster Comput. 2024 10.1007/s10586‑024‑04357‑y
    [Google Scholar]
  159. Yazdinejad A. Dehghantanha A. Srivastava G. AP2FL: Auditable privacy-preserving federated learning framework for electronics in healthcare. IEEE Trans. Consum. Electron. 2024 70 1 2527 2535 10.1109/TCE.2023.3318509
    [Google Scholar]
/content/journals/rascs/10.2174/0126662558319054241003054922
Loading
/content/journals/rascs/10.2174/0126662558319054241003054922
Loading

Data & Media loading...


  • Article Type:
    Review Article
Keywords: Big Data ; Privacy Protection ; Machine Learning ; Cloud-IoT Computing ; Data Securities
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test