Review Article

Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions

Table 6

Information-as-a-Service.

ReferencesOverviewsAdvantagesTechniquesYears

[29]To tackle the problems of computation efficiency and weak data security, ABDS scheme is proposed in cloud computing; the users are enabled in this approach to check the cost of the ciphertext in online/offline encryption mode before going to expensive full decryptionThe users can get online and offline encryption with minimum cost and time; the proposed work gives strong security to weak dataThe ABE, attribute-based data sharing (ABDS), chameleon hash function, and online/offline ciphertexts2018

[30]The framework used two types of CSPs to secure the cloud data while sharing the data and passes through several stages; the main focus is to provide security to the big data systemThe model highly provides security to cloud data services such as storage, networking, data management, access control, and infrastructure securityBonitasoft, business process management, CSP-1, and CSP-22016

[31]To tackle the NP-hard problem, a series of MHAs, characteristics with a simple structure, fast confluent, and energy have been proposed; the MOO problem solved in terms of reliability, make span, and timeThe proposed CAS solved the problems of the salesman, economic dispatch, and fuzzy system identification; the ACO finds the optimal path in a graph investigating the behavior of an ant colony, make span and flow time analyze the reliability factorThe ACO, chaos factor, make span, time flow, and GA-CAS2016

[32]The proposed work highly secures the cloud data; in this work, the data is split and then distributed by different cloud servers; the paper tries to resolve the abuse issue; the direct access of the cloud to the user’s original data is preventedThe experiment proves the proposed work efficiently performs this task by consuming less time as compared to AESThe algorithms SED2 and EDcon2016

[33]The US government data is protected from advanced persistent threats (APTs); the cloud security assessment model is used for four multitenant IaaS cloud architectureThe CCS penetration probability is high if minimum security control sets are appliedThe cloud security assessment model, APTs, and virtual machine2017