Review Article

Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions

Table 4

Storage-as-a-Service.

ReferencesOverviewsAdvantagesTechniquesYears

[20]The model presents different security policies on the cloud storage and data; the data is not secure everywhere in the cloud data which is fragmented for security purposes; the identity authentication is used for securityThe model analyses the cloud storage different methods are applied at different stages to achieve securityThe data transmission encryption, access control, identity authentication, and Shamir’s threshold secret sharing program are used in the presented model2017

[21]The data placement problem is addressed for the big data in the cloud storage system; the data placement problems are solved by the decision, size, and number of chunksThe renewal time minimizes up to 20 percent and 21 percent for the network and Internet topology, the linear programming model, heuristic algorithm, and T-coloring approachThe linear programming model, heuristic algorithm, and T-coloring approach2016

[22]As the cloud network is an open platform for the users to store and compute the data; the users store and compute the data in the cloud over a wireless remote network by using the Internet; security of the data is the concern in an open system for this purpose encryption and decryption of data outperformed to secure the dataDifferent steps involved in the proposed work which strongly secures the data from the start to end of the systemEncryption and decryption of data with integrity are applied2017

[23]Several different security issues are discussed in this article; after that it proposes its own work; the data is divided into small and large sizes; the symmetry encryption approach is applied to large size dataA strong encryption on data applied which fully secures the larger size data from threatsThe AES symmetric encryption algorithm is applied to the system2015

[24]The proposed work targets the two main security issues called the confidentiality level of data and data encryption processing time; the key provided to the users which are not for to avail by any other userThe data encryption time and overhead reduced by achieving a reliable cloud networkThe AES, TLS, and the secure hashing algorithm (SHA)2016

[25]The big data is divided into n sequences and stored in m different CSPs which is proposed to ensure the security of big data; the cryptographic virtual mapping and trapdoor techniques are proposed to achieve high feasible protection of the big dataTwo different scenarios are analyzed in the proposed model, and the simulation results concluded that the proposed model provides more security for big data in an efficient way than the other traditional approachesThe cryptographic virtual mapping, data type block or IP resembles, and trapdoor function2016

[26]Three game models are discussed to analyze the security in the cloud system; the assessment model helps the users to find the risk of data privacyThis model ensures the privacy of the data and hence minimizes the influence of the third party in private dataSecurity assessment model, one user, multiuser, and multiprovider2019