Review Article

Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions

Table 14

Infrastructure-as-a-Service.

ReferencesOverviewsAdvantagesTechniquesYears

[67]Two networks called software-defined network (SDN) and information-centric networking (ICN) are analyzed on the cloud model to secure the data; the ICN is considered the building block of the framework, and SDN decouples the control planeThis flexible infrastructure highly provides data securitySoftware defines network, and information-centric networking are applied2017

[68]The private network analyzes the big data to secure the enterprises; different threats on different layers are analyzed and give a solution to each threat; by doing this a secure enterprise Pr network is achievedThe framework gives different solutions for the different threats on five layers, and the Pr becomes more secure and confidentialThe big data, key technology, five layers, and antivirus technology2018

[69]The cloud providers and the users both are responsible to deliver reliable and secure data over the cloud; different security threats and their solutions are analyzed here; the CSP protects the sharing of technology issues; the security provided is architecture and layer baseHighly secure techniques are discussed which fully protects the data on any deployment modelIsolation and segmentation, web browser, service level agreement, two-factor authentication, and many more techniques are used2016

[70]The leakage and temper of the cloud data is minimized; along with these, the privacy and unauthentic scenarios are being analyzed using a framework called the Auth-privacy chain, a blockchain framework, and enterprise operating systemThis proposed framework eliminates the data leakage and temper of data in the cloud system and provides privacyBlockchain-based access control, the Auth-privacy chain, and enterprise operating system2020