Review Article

Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions

Table 11

Security-as-a-Service.

ReferencesOverviewsAdvantagesTechniquesYears

[49]Two new models are proposed to stop the fake feedbacks by the malicious users called the FEBM; the previous feedback average is considered to indicate fake feedbackThe variable delta decreases the positive and negative false error with high accuracyThe delta variable factor, the Bayesian game model, and the feedback evaluation2017

[50]The attack-defense game-theoretic approach called Stackelberg game is proposed; the players in this game are called the defender and the attacker; the strategies of the defender are open and the attackers follow these strategies; the equilibrium point will be found by the active and passive structuredThe Stackelberg model with active and passive structured is usedThe attackers achieve the maximum gain of the defender2018

[51]In the proposed approach, an integrated solution to cloud security based using the clear framework and the BPMN is discussed; three-layered models are analyzed for the strong security and blocking of threatsThe multilayered CCAF security model has 20 percent better performance than the single-layered security models which can block 7348 viruses and trojans; a quick locking system is achieved which can block and quarantine the 9919 trojans and viruses in quick responseThe CCAF, BPMN, 10,000 trojans, and 10 PB data in the data center2016

[52]The security issues are analyzed on Security-as-a-Service (SecaaS) in this work; a new pattern called leveraging is applied to SaaS; it gives self-managing, automating, and scalable to SaaSThe simulation results show that it outperforms regarding security; the security of the SaaS improves by the cloud-native applicationThe CNA is used2017

[53]The proposed work in this article provided security to a Pr system; the whole work is divided into three steps to provide security to big data; two types of scanning obtained called vulnerability scanning and log scanning which then are correlated to each other to find the attacks on big dataThe experimental result shows the attacks count, host computer used, and security tips count to guarantee the speed of analysisNikto scanning tools with Nagious and conical correlation are used2016

[54]The updated chain VM service proposes to handle the high traffic input to the chain; the halts and deadlock option provide security assurance; the repetition of the previous input data block in new updated chain VMThe technique achieves the increase in the percentage of the security and upgrading and optimizing the security; it configures and runs the desired security stackSeamless flow, dispatcher VM, and SNAT docker container2018

[55]In this model, co-resident attacks encounter instead of looking to the solutions of the attacker after co-locating with their targets; the probability of the attackers co-locating with the targets mitigates in this approachThe cloud Sim and open stack simulators are used which shows the attackers first need to co-locate their VM according to target VM and the attackers achieve hardly up to 40 percentThe virtual machine allocation policy, the PSSP policy, workload balance, and low power consumption2017

[56]The approach presents different models to detect and track the already existing threats in the database and new incoming threats to a cloud systemThe simulation results show the framework efficiently detects the anomaly security system up to 90%The signature method, intellectual model, big data technology, and Weka application2017

[57]The covert channel analysis performs to secure data at multilevel which enables to secure the data in the presence of unauthorized personnel; different steps follow the data to achieve securityThe work protects the data in the presence of an unauthorized person who achieves the trust of usersCovert channel and prototype approach is developed2015

[58]The assessment framework proposes to solve a security threat related to the specific client; in this model, different six threats are analyzed, find the concerned client for each threat, and give a secure environmentThe model is not fixed to any specific network but can be fitted to any system; the model solves the problem of previously existing assessment framework problems and finds a threat for the concerned clientSpiral network and STRIDE categorizing model is used2018