Review Article

Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions

Table 7

Process-as-a-Service.

ReferencesOverviewsAdvantagesTechniquesYears

[34]The model investigates different security and privacy issues; in this work, five layers are introduced which protect the cloud system at every layer from threats and attacksThis model provides a secure service with confidence; it provides the difference between attacks and security along with the countermeasure secure servicesThe model used five different layers to protect the cloud from threats called the CI, CISL, PESL, data layer (DL), and ACPML2016

[35]The policy updating problem in the big data is solved by proposing the attribute-based encryption (ABE) scheme; then, DAC scheme for the big data is proposed which enables the owners to dynamic policy updating; different policy updating algorithms for different types of access control are proposedThis approach enables the checking of directly updating ciphertext by the cloud; there is no need for policy updating in data decryptionThe outsource ABE, DAC scheme, Boolean formulas, and access tree2016

[36]The static and dynamic load balancing techniques are proposed; the pairs of keys are generated to secure the data; load balancing attached to a cloud effectively avails the resources provided to nodesThe model performs better in terms of response time, throughput, resource utilization, fault tolerance, and scalabilityLoad balancing technique, dynamic load balancing, and key pairs2018

[37]The data security monitoring method based on autonomic computing is proposed; different modules are proposed to gather the data stream and then evaluate the processed data to determine the abnormality; the data collection and analysis of storage are the core of the proposed modelIt can accurately evaluate the degree of abnormal; the cost can be reduced by the architecture of integrating modulesThe data monitoring process on autonomic computing and data mining algorithm based on the chaotic algorithm and abnormal behavior detection based on Poisson2018

[10]The sharing of data between a mobile system and cloud system is discussed in this work; the AES technique is used to encrypt the high definition (HD) video; different keys are used to make secure the system are public, private, and security keys (PUK, PRK, and SK)The delay minimizes due to utilizing the computational powerAES, HD video, HEVC, PUK, PRK, and SK2017