Review Article

Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions

Table 1

Abbreviation used in the paper.

AbbreviationsWords

PaaSPlatform-as-a-service
SaaSSoftware-as-a-service
IaaSInfrastructure-as-a-service
PbPublic cloud
PrPrivate cloud
HCHybrid cloud
NENash equilibrium
CSU (s)Cloud service user (s)
CSP (s)Cloud service provider (s)
CICloud infrastructure
SSGSecurity Stackleberg game
FEBMFeedback evaluation and Bayesian model
CSPMCloud security and privacy model
NISTNational Institute of Standards and Technology
ACPMLAccess control and privilege management layer
CCAFCloud computing adoption framework
BPMNBusiness process modeling Notation
CISLCloud infrastructure security layer
PESLPhysical environmental security layer
HTTPHypertext transfer protocol
DDoSDistributed denial of service
SDLCSoftware development life cycle
ABDSAttribute-based data sharing
DACData access control
SK (s)Secret key (s)
PSSFPPrevious-selected-server-first policy
MOOMultiobjective optimization
DFSDistributed file system
CCTVClosed circuit television
IM-SecaaSIntrusion management Security-as-a-Service
OPEXOperational expense model
IDPSIntrusion detection/prevention system
CEPMCompliance enforcement and policy management
SSDPSimulation software development process
ADIRSAttack detection and intrusion rejection system
CSACloud security Alliance
SecSLASecurity service level agreement
QPTQuantitative policy trees
QHPQuantitative hierarchical process
QoSQuality of service
DoSDenial of service
PMPrivacy manager
GAGenetic algorithm
SADPSecurity-aware data placement
PSOParticle Swarm optimization
ACOAnt colony optimization
CASChaotic ant Swarm
GA-CASGenetic algorithm-based chaotic ant Swarm
MHA (s)Metaheuristic algorithms
NDTMSINondeterministic task meta-Schedular integrated
AESAdvanced encryption standard
HEVCHigh efficiency video coding
IEVSIntraencoded video stream
TLSTransport layer security
SED2Secure efficient data distribution
EDconEfficient data conflation
MDMCOMultidimensional and multiconstraint optimization
BC (s)Blockchain (s)
BPDPPBlockchain’s public and distributed peer-to-peer
BWHBlock withholding
PoWProof-of-Work
PPLNPay-per-Last N
SBOSSecurity benchmark for open stack
PKEPublic key encryption
SLA (s)Service level agreement (s)