Review Article

Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions

Table 12

Management-as-a-Service.

ReferencesOverviewsAdvantagesTechniquesYears

[2]The inside and outside security of the Pr network is analyzed here; three different scanners are used to make sure the security inside and outside the cloud; for inside security, Metasploit, Nessus, and open vas tools are used; the outside security of the cloud is performed by web app tenable IOIt secure the data for inside and outside the Pr from hijackers, etc.The scanners Nessus, Metasploit, open VAS, and web app tenable IO tools are used2018

[59]The presented model calculates the baseline values based on day, time, and log data frequency to show out the attacker’s name and traffic information; the correlation performs in the model which makes the threat identification easyThe proposed model analyzes and recognizes the cyber threat by obtained correlated information; the SIEM architecture provides the engine to store data and storing the ability to store dataThe SOA, OpenSOE, and complemented DIM2017

[60]The model presents the security of a cloud system; the quantitative evaluation provided security; the problems of evaluation and comparing the security level offered the presence of complex service supply chainThe presented model provides a well-defined set of security related to the acquired serviceReference evaluation model (REM), SecSLAs algorithms, and complex service supply chain techniques are presented to achieve security goals2016

[8]The proposed work ensures the users in the security domain, while they deal in a cloud network; the work enables the users to check and control the data at any stage and level; different models are applied to analyze the security and accountabilityIt makes the cloud system according to the demand of the users who can check and control their data at any stageThe PM in the cloud, RSASS system, data security model, and CIA models are used2015

[61]Various old policies of the cloud network security are compared with network security; besides, some additional new knowledge-based policies are added to cloud security, and then experimentally analyze and find the correctness and effectiveness of the proposed workThe experimental results proved the design policies stood well to old policies for cloud securityA multidimensional integer space conflict detection algorithm is proposed2016

[62]According to the job of the user and computer security provided to the cloud system in this framework, through GA-based job security, two new concepts are achieved in this work called security on demand and improved trust levelBy using the algorithms and techniques in this work, the simulation results show the high-level security with the minimum cost of timeThe GA-based job security technique is used2015

[63]Two security threats called timing attacks and DoS are analyzed and secure the cloud system from these threats; the security-aware and NDTMSI with the agent-based monitoring system is proposedThe proposed approach provides magnificence security without substantial modification and provides integrity and confidential and authentication monitoring to the cloudThe safe random number generator (BBS), secure generic scheduler, nondeterministic model, a secure hashing algorithm (SHA) scoring workers, security bias model, and leveraging genetic heuristic approach2017

[64]The hybrid cryptographic system (HCS) is applied to the cloud system to secure the data; in this work, symmetric and asymmetric approaches are analyzed to encrypt and decrypt the dataIn this work, the system from start to end is secure which achieves the trust of the users until the data stores on the cloudIn the hybrid cryptographic system, asymmetry data encryption RSA and symmetry data encryption AES are applied2017