Review Article

Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions

Table 5

Database-as-a-Service.

ReferencesOverviewsAdvantagesTechniquesYears

[5]The SSG is proposed for cloud security; the defender and attackers are compared by applying the model; the utility function, best strategy, and payoff are analyzed in the game modelThe information on the attacker’s behavior is collected by active and passive stages of the SSG; the efficient utility function is achieved by this model; the defender availability and cost are maximum and minimum, respectivelyThe security Stackelberg model, active and passive stages, utility function modeling, natural roles, and defense strategy2018

[27]This model works on a pay-per-use basis; doubtful traffic enters at one side of the model by applying different policies by the model components; a clean output data is provided to the clientsThe model not only improves the security but also the flexibility, control, effectiveness, and performance as wellThe IDPS and POC are used in this model2016

[28]This proposed work aims to manage and secure cloud data; incorrect screening and privacy of the cloud data is encounteredThe outcomes of the experiments show that the proposed model solves the problem of low accuracy and reliability of the data in the cloud environmentThe neural network model called S-Alex Net and game-theoretical approach SCNN-DGT is discussed2019