Review Article

Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions

Table 8

Application-as-a-Service.

ReferencesOverviewsAdvantagesTechniquesYears

[38]The visualization environment is used to update the development and deployment of a software workload; different zone security policies are adopted by the metamodel framework; the SDLC used to find perfect infrastructure environmentsHighly improves the security of cloud computingThe SDLC and different cloud modules are used, i.e., builder module, consumption module, and manager module2018

[39]Three different entities involving cloud, roadside infrastructure, and vehicles with additional work of advanced primitive cryptographic primitive make the connected vehicular cloud computing more secure and confidentialThe service of the CVCC provides more reliability to the cloud users due to the availability of the service even in the absence of cloud and roadside infrastructureAdvanced cryptographic primitives, outsource pairing computation, and rich applications2018

[40]Different algorithms and steps are proposed in cloud security; among them, one algorithm is proposed here; the security uses service level agreements; in this work, two techniques called the QPT and QHP are used on the cloud systemThis proposed work ensures the security of the user’s data at different levelsThe SecSLA, QPT, and QHP are applied2017