Review Article

Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions

Table 9

Platform-as-a-Service.

ReferencesOverviewsAdvantagesTechniquesYears

[41]The risk rate and cost are analyzed using three different workflow techniques using cloudSim simulator; the workflow needs a periodically based series of computing, storage, and memory optimizationThis framework provides risk minimizing according to the cost for a user in the cloudThe MHA, the PSO, and the coding strategy2016

[42]The authors propose a new framework to provide managed security services via SDK; different techniques are involved in outperforming the model; the BT works to provide security to data for Pb and Pr in a multicloud environmentThrough this model, a user can secure its data for different cloud services such as private, public, and hybridThe horizontal service model, BT service store, and managed security service obtained through SDK2016

[43]For the data security purpose, encryption technique is applied in this presented work; the encryption approach is applied using AESThe algorithm provides strong security for data in SaaPAES algorithm is applied to the cloud system2018

[44]Three best strategies are applied to achieve the best response in data security and openness services; then, between these two, a relation has been drawn to help the cloud provider to choose the best strategy for both security and serviceThis proposed work decreases the investment for the security purpose and puts the cloud user in optimal service openness and best security environmentSpecific probability with macroanalysis, best strategies for investment in terms of security, and Nash equilibrium2019