Cyber-Physical Mobile Computing, Communications, and Sensing for Industrial Internet of ThingsView this Special Issue
Research Article | Open Access
Alakananda Chakraborty, Muskan Jindal, Mohammad R. Khosravi, Prabhishek Singh, Achyut Shankar, Manoj Diwakar, "A Secure IoT-Based Cloud Platform Selection Using Entropy Distance Approach and Fuzzy Set Theory", Wireless Communications and Mobile Computing, vol. 2021, Article ID 6697467, 11 pages, 2021. https://doi.org/10.1155/2021/6697467
A Secure IoT-Based Cloud Platform Selection Using Entropy Distance Approach and Fuzzy Set Theory
With the growing emergence of the Internet connectivity in this era of Gen Z, several IoT solutions have come into existence for exchanging large scale of data securely, backed up by their own unique cloud service providers (CSPs). It has, therefore, generated the need for customers to decide the IoT cloud platform to suit their vivid and volatile demands in terms of attributes like security and privacy of data, performance efficiency, cost optimization, and other individualistic properties as per unique user. In spite of the existence of many software solutions for this decision-making problem, they have been proved to be inadequate considering the distinct attributes unique to individual user. This paper proposes a framework to represent the selection of IoT cloud platform as a MCDM problem, thereby providing a solution of optimal efficacy with a particular focus in user-specific priorities to create a unique solution for volatile user demands and agile market trends and needs using optimized distance-based approach (DBA) aided by Fuzzy Set Theory.
One of the greatest inventions of Gen Z, Internet has rapidly emerged over the last two decades, connecting people and organizations together into one giant family. This connectivity has generated the urgency of Internet of Things (IoT) , which involves sensors, software devices, and other technologies, for the purpose of maintaining the security and privacy of humongous data transmission among other devices and systems . For this sole purpose, several distinct IoT platforms have come into existence with their own unique cloud service providers (CSP) at the backend. But, like every coin has two sides, i.e., it has also led to a problematic situation when it comes to the selection of ideal CSP for a selected set of attributes that purview a finite set of requirements, to assist the process of decision-making where one has to deliberate multiple attributes, possible scenarios, market trends, and user biases .
According to the best of research and knowledge and observation, no compatible and comprehensive study and solutions been done for this integrated set of requirements in the field of cloud service provider selection (CSPS). However, there exist a lot of work that includes some of our set of factors quality which elaborately and accurately formulates algorithm for some quality factors and some for the technical aspects [4, 5]. Divergent from the preexisting schemes, thus, providing a flexible, realistic, and compatible methodology towards cloud service selection (CSS) considering all the possible factors under the sun required for an ideal cloud service.
1.1. Significance of the Research
In spite of the existence of many software solutions for this decision-making problem, they have been proved to be inadequate considering the distinct attributes unique to individual user.
1.1.1. Research Gaps in the IoT-Based Cloud Service Providers
The requirement of decision-making among the various cloud service providers amalgamated with IoT applications has led to the emergence of several software solutions in recent years. However, multiple demerits can be observed in the performance and efficiency of these platforms . The current short comings present in the IoT-based cloud service provider solutions involve numerous dimensions including the inefficiency of the platforms to extend for supporting the heterogeneous sensing technologies. Other demerits include the proprietorship of data, providing insinuations of privacy and security . The processing and sharing of information can also be counted as another gap especially in scenarios where it is essential to support novel services. The absence of assistance provided by application developers is another shortcoming faced by several IoT cloud platforms . Furthermore, most of these IoT platforms do not possess the property of expansion for the addition of new components to withstand the emergence of new technologies and provide economies of scale. Lastly, the delivery of the purchased software to the respective connected devices is also not supported by a majority of the marketplaces dedicated for IoT applications.
Multicriteria Decision-Making (MCDM) techniques provide a scientific and easy solution. MCDM deals with organizing variegated attributes which come under the purview of decision-making. It specializes in handling issues where the proximity of attributes is close, and human cognitive abilities are not able to take the logical decisions. It does so by performing bargains or trade-offs by replacing one criterion by equivalent another. This paper presents an integrated set of factors that contribute the solution to the problematic issue of the selection of an optimal IoT cloud platform.
In a nutshell, the qualities mentioned below make the proposed methodology novel when compared to state-of-the-art techniques: (1)Identification and categorization of selection attributes (SA): after thorough and detailed studying of more than fifty research papers, few factors, i.e., selection attributes (SA) were filtered out. About 90 factors were carefully studied, and explicitly observed and relevant factors were mined out by removing redundant elements and those which were similar to each other. Finally, these factors were then categorized into broad three categories after extensive reasoning and filtration, namely,(i)Quality factors(ii)Technical factors(iii)Economic factors(2)Prioritization of identified selection factors (SA): the identified selection attributes (SA) are then prioritized according to Fuzzy Set Theory. Here, prioritization is done on this basis of calculated priority weights of each selection attribute individually(3)Development of a hybrid decision-making framework: once the selection attributes are successfully selected and filtered out and then weighed, respectively, then the hybrid decision-making framework is developed using mainly two methodologies:(i)Fuzzy Set Theory(ii)Matrix Multicriteria Decision-Making Method
2. Literature Review
This section of the research is concerned with the existing studies in the field of selecting optimal cloud computing service provider for IoT-based applications, where the problem of service selection has been represented as an MCDM problem. To search the relevant data, the keywords like Cloud Computing for IoT, Cloud Platforms for IoT Services, IoT based Cloud Service Selection, IoT Service Selection Attributes, and Cloud Service Selection for IoT were used. As a result of this research, a total of 104 research papers from various highly reputed journals and conferences were analyzed in detail. Now, these papers were screened by examining their primary focus, whether it is related to the cloud service selection or not. Then, in the second screening, the approaches used and the case studies mentioned along with the selection attributes (SA) which were mentioned in these research papers were deliberate to make a comparative study of the same. The comprehensive tabular literature survey is shown in Table 1.
This paper presents and develops a hybrid decision-making framework using two methodologies, namely, Fuzzy Set Theory and Matrix Multicriteria Decision-Making (MMCDM) where identification and categorization of 14 selection attribute are prepared into three categories, namely, quality factors, technical factors, and economic factors. After removing redundant features and filtering unnecessary information, thereby making this framework relatively less vulnerable to prerequisites and limitations as compared to available frameworks and techniques in cloud computing service selection.
3.1. Security and Privacy Challenges in Cloud-Based IoT Platforms
While IoT and its applications are well explored and secure, the cloud-based IoT platforms are still comparatively less explored and nascent in nature . Categorized in two purviews, static and mobile-based platforms both have variegated challenges on grounds of security and privacy. There are multiple security challenges including identity privacy that deals with protection of details of user of the cloud devices like his/her personal real-world information. Other threats include disclosure of the real-time location of user termed as location privacy . Node compromising attack is also one of the most enduring threats to user’s privacy as it includes planned attacked to gain access to user’s private information . Removal or addition of transmission multiple layers is a very mundane breach performed by various IoT users; it involves manipulating the concept of reward distribution when transmitting. Malicious IoT users add or remove the distribution layers to hamper the cycle or amount of reward distributed .
3.2. Distance-Based Approach
Distance-based approach (DBA) is an effective and efficient MCDM method. Identifying and defining the optimized state of the multiple attributes that are part of the process is the initial gradation in the proposed method. The optimal state represented by the vector OP is the set of best values of criteria over a range of alternatives. The best values can be maximum or minimum, defining the type of criteria.
Reference to Figure 1, as indicated, vector “OP” is the optimal point in a multidimensional space. It acts as a reference point to which the other values of all the alternatives are analyzed to one another quantitatively. In other words, an arithmetical difference of the current values of alternatives from their corresponding optimal values is taken, which represents the ability of the considered alternatives to achieve the optimal state. The decision-making issue which needs to be dealt with is searching for a viable solution on basis of its proximity to the optimal state.
In Figure 1, “H” represents the feasible region and “Alt” as the alternative. The distance-based technique is aimed at determining a point in the “H” region and is in closest proximity to the optimal point.
To implement the above approach, let , 2, 3, 4… = alternatives, and , 2, 3, 4… = selection attributes. A matrix is created to represent the entire set of alternatives along with their respective criteria, which is shown in (1).
This matrix is known as the decision matrix . Now, we take the priority weights of these attributes according to the opinions of various experts and calculate their averages. We take the sum of these averages and divide the sum by each of these averages. The result is the creation of another matrix with only one row and columns equal to the number of attributes. This matrix is known as priority weights matrix [PW] as shown in (2).
Using the following Equations (3), (4) and (5), the decision matrix is standardized to minimize the impact of different units of measurement and to simplify the process. where is the average of each attribute for all alternatives. where is the standard deviation of each attribute for all alternatives. where is the value of each attribute for an alternative and is the standardized value of each attribute for an alternative.
The final matrix is known as the standardized matrix  and is represented as in (6).
The best value of each attribute is selected over the set of alternatives. The best values can be maximum or minimum values, depending on the type of attribute specified. The matrix formed using this set of values is known as the optimal matrix  as shown in (7).
The distance of each of the alternatives from its optimal state is calculated as the numerical difference between the values of each of the attributes and their corresponding optimum counterparts. The resulting values form a matrix called the distance matrix  as represented in (8).
Each value of this matrix is then squared and multiplied by their corresponding priority weights, as explained by Equation (9).
The resulting matrix is called the weighted distance matrix  as shown in (10).
Equation (11) is used to calculate the composite distance, “CD” between each alternative to the optimal state.
The one-column matrix formed as a result of this equation is called the composite distance matrix [CD] as shown in (12).
The last step of this method involves calculating the rank of each alternative by using their composite distance values. The smallest value gets the 1st rank, the second smallest value gets the 2nd rank, and so on. This is how the DBA MCDM approach is used for cloud service provider selection. Below, Figure 2 represents the model development of the methodology.
3.3. Estimation-of-Distribution Algorithms
These algorithms are general metaheuristics applied in optimization to represent a recent alternative to classical approaches . EDAs build probabilistic models of promising solutions by repeatedly sampling and selecting points from the underlying search space. EDAs typically work with a population of candidate solutions to the problem, starting with the population generated according to the uniform distribution over all admissible solutions . Many distinct approaches have been proposed for the estimation of probability distribution, such as Independent Variables, Bivariate Dependencies, and Multiple Dependencies.
4. Implementation, Results, and Discussions
Evaluating various cloud service providers using DBA (distance-based approach) methodology with Fuzzy Set Theory to calculate ranks based upon selection attributes is described by the following steps: (1)Identification and selection of cloud service providers (CSP): with the aid of an experienced group of dedicated decision-makers, specialized in the field of Computer Science and Technology, an analysis of several cloud service providers was conducted, and 9 most widely used CSPs, namely, (1) Amazon Web Services(AWS), (2) Digital Ocean, (3) Google Cloud Platform, (4) Microsoft Azure, (5) RackSpace, (6) SoftLayer, (7) IBM Smart Cloud Enterprise, (8) GoGrid, and (9) Google Compute Engine, were filtered out by evaluating them on various conceptual and practical criteria based on both quality and usability, thereby selecting them after immense brainstorming sessions and collective use of elimination principle(2)Identification of selection attributes: three major factors were identified which were, namely, quality factors, technical factors, and economic factors. They were further classified as: quality factors (functionality, reliability, usability, efficiency, maintainability, and portability), technical factors (storage capacity, CPU performance, memory utilization, platform design, and network speed), and economic factors (service induction cost, maintenance cost, and promotion cost) after the detailed analysis and intensive study of the cloud service providing industry and its various prerequisites along with understanding the market where this industry thrives (Figure 3).(3)Application of Fuzzy Set Theory: fuzzy logic forms its basis upon human acumen of decision-making regarding vague and nebulous information. It grossly distinguishes real-world problems based upon human comprehensive skills rather than absolute Boolean logic. In other words, the fuzzy system implements scales rather than 0/1 for coherent human understanding where 0 represents absolute fallacy, 1 represents absolute truth, and the middle values represent the fuzziness or the fuzzy values. In this study, we have implemented a triple fuzzy number scale which uses a triplet set of the form [a, b, c] with a sensory scale (Tables 2 and 3) . A survey was conducted among a group of 40 selected experts associated with the technical field. The (Table 2) questionnaire consisted of 14 pristine questions, based upon which a priority weights matrix was created consisting of the weights or values of the assorted attributes. While in the second questionnaire (Table 3), the nine already selected CSPs were appraised on the grounds of the 14 categorized selection attributes by an adept team of 5 experts. The extracted data from the questionnaires mentioned above were converted from a literal scale to TFN (Triple Fuzzy Number) scale, thereby averaged to a fuzzy number(4)Determination of weights and performance ratings: the expert-assigned linguistic terms were first converted into corresponding TFNs using the fuzzy scale and then defuzzied to get crisp score values. The data was extracted from the questionnaires and then evaluated using a combination of the mathematical formulas and concepts of aggregation and average(5)Creating performance rating matrices: a decision matrix of the performance ratings (Figure 4(a)) and a single-row matrix of the priority weights (Figure 4(b)) were created under the supervision of expert guidance using the fuzzy scale and MCDM(6)Calculating standardized matrix: root mean square of each selection attributes is carefully evaluated; furthermore, the mean previously determined is subtracted from each value and simultaneously divided by the corresponding root mean square of that particular selection attribute to get the standardized matrix (Figure 5).(7)Creating optimal and distance matrix: the optimal matrix is estimated by targeting the best values of each selected attribute of the standardized matrix (Figure 6(a)), i.e., the maximum values for quality and technical factors and minimum values for economic factors. Additionally, the distance matrix is calculated by finding the distance between each value of a particular selection attribute with its corresponding best value (Figure 6(b)).(8)Calculating weighted and composite distance matrix: by squaring the respective values of the distance matrix and multiplying them to the corresponding priority weights, the weighted distance matrix was obtained (Figure 7(a)). The matrix formed was then used to evaluate the composite distance matrix by calculating the square root of the total sum of each alternative (Figure 7(b)).(9)Ranking of cloud service providers: finally, the alternatives are ranked in decreasing order of their corresponding values in the composite distance matrix. Therefore, the least rank or rank 1 is most preferable while the maximum rank, i.e., rank 9, is least preferable considering the given set of alternatives (Table 4).
Table of TFN scale for importance of the 14 attributes during cloud service provider selection.
Table of TFN scale for performance ratings of the 9 CSPs over the selection attributes.
Table for ranking of various cloud service providers.
The selection of cloud service providers is a problematic task as many decision-making parameters are taken into consideration like security, cost optimization, availability, reliability, and fault tolerance, to name a few. Most of the mentioned factors are not constant and individualistic wherein every consumer who requires a cloud service provider has an almost unique set of demands and requisites, each having selected set of attributes has a different weight than other, i.e., prioritized attributes are not rare. Considering the presented scenario, Multicriteria Decision-Making technique has shown significant efficacy and is implemented in the field widely as it provides both individualistic and concurrent results.
Table 4 shows the ranking of nine cloud service providers based on fourteen carefully discerned attributes categorized in three categories, namely, quality factors (functionality, reliability, usability, efficiency, maintainability, and portability), technical factors (storage capacity, CPU performance, memory utilization, platform design, and network speed), and economic factors (service induction cost, maintenance cost, and promotion cost). The step-by-step gradation procedure described above where priority weights and decision matrix are extracted from surveys data using a fuzzy scale, which is then optimized-standardized and refined by priority weights as extracted from user survey data proves to be a simple, effective, and reliable method of action for selection of optimal cloud service provider. Figure 8 shows the graphical representation of the same.
5. Conclusion and Future Work
Taking into consideration the current extensive use in the cloud-based IoT services for building computation, storage, infrastructure, and other needs has led to a greater demand for an efficient methodology to drive which given cloud service provider meets one’s unique and individualistic demands for fulfilling ever-changing solutions in the field of IoT. Given the scenario of current cloud-based IoT applications with multiple service providers and vivid requirements, a lot of decision-making criteria and methodologies already exist, some of which include TOPSIS that is a useful and straightforward technique for ranking several possible alternatives according to closeness to the ideal solution, or AHP, or VIKOR which is based on the aggregating fuzzy merit that represents the closeness of an alternative to the ideal solution by compromising between two or more options to get a unified opinion between multiple criteria, and PROMETHEE compares various measures available by the technique of outranking.
Despite the preexisting techniques to classify, evaluate, and rate various IoT-based cloud service providers due to continuously changing set of attributes, challenges user’s privacy and security, user authentication, location privacy, disparate demands of customers, and colossus pool of available attributes ranging from performance, cost optimization to quality, it becomes very peculiar to get virtually concurrent results for one’s ever-changing characteristics and agility even after discerning the given set of methodologies in the available literature. Therefore, this research meets all the scenarios mentioned above, demands and unique characteristics by using an optimized matrix methodology aided by distance-based approach (DBA), some of its salient features are as follows: (a)Considering a broad set of categories that are further graded into subattributes, i.e., performance, technical and economic factors are individually optimized to get ultimate efficacy(b)Simple, straightforward, reader-friendly, and easily captured and understood by anyone concept and procedure(c)It is obtained by taking into consideration priorities among attributes as extracted from a user by surveyed data
Conclusively, in the presented research methodology, a distance-based approach with an optimized approach to consider priorities as set by data extracted from user survey in a simple, lucid yet compelling procedure to select an ideal cloud service provider for IoT applications. This study finds nine alternatives or popular cloud service providers and 14 attributes or deciding criteria.
Privacy and security are the two most emerging challenges in IoT applications as provided by cloud service providers due to the nascent nature of the field. Though IoT-based applications have already been explored from the aspects of privacy and security, implementing IoT applications via cloud-based platforms leads to a new set of possible threats. In future work, this study intends to evaluate variegated cloud-based IoT platforms from the aspects of security and privacy by analysing the same under the purview of three criteria. Firstly, the future work will deal with user’s individualistic threats of privacy and security like location privacy, breach of personal information, protection of user’s hardware and software devices, and user profile authentication. Other criteria include privacy and security challenges for a multilevel organization, namely, secure route establishment, isolation of malicious nodes, self-stabilization of the security protocol, and preservation of location privacy. Lastly, this study would assay multiple case studies of leading cloud-based IoT platforms’ breach of security and privacy to perform a comparative analysis of the same.
The data will be provided based on a request by the evaluation team.
All the authors of this paper have shown their participation voluntarily.
Conflicts of Interest
The authors of this research article declare that there is no conflict of interest in preparing this research article.
Alakananda Chakraborty is responsible for the methodology; Muskan Jindal for the software and data curation; Mohammad R. Khosravi for the data curation and writing—original draft preparation; Achyut Shankar for the visualization and investigation; Prabhishek Singh for the supervision; Manoj Diwakar for the software and validation; and Achyut Shankar for the writing—reviewing and editing.
- R. Sikarwar, P. Yadav, and A. Dubey, “A survey on IOT enabled cloud platforms,” in 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), pp. 120–124, Gwalior, India, 2020, April.
- N. Almolhis, A. M. Alashjaee, S. Duraibi, F. Alqahtani, and A. N. Moussa, “The security issues in IoT-cloud: a review,” in 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), pp. 191–196, Langkawi, Malaysia, 2020, February.
- M. Ullah, P. H. Nardelli, A. Wolff, and K. Smolander, “Twenty-one key factors to choose an IoT platform: theoretical framework and its applications,” 2020, https://arxiv.org/pdf/2004.04924.
- H. M. Alabool and A. K. Mahmood, “Trust-based service selection in public cloud computing using fuzzy modified VIKOR method,” Australian Journal of Basic and Applied Sciences, vol. 7, no. 9, pp. 211–220, 2013.
- Z. Rehman, O. K. Hussain, and F. K. Hussain, “Parallel cloud service selection and ranking based on QoS history,” International Journal of Parallel Programming, vol. 42, no. 5, article 276, pp. 820–852, 2014.
- P. Ganguly, “Selecting the right IoT cloud platform,” in 2016 International Conference on Internet of Things and Applications (IOTA), pp. 316–320, Pune, India, 2016, January.
- P. Varga, J. Peto, A. Franko et al., “5G support for industrial IoT applications–challenges, solutions, and research gaps,” Sensors, vol. 20, no. 3, p. 828, 2020.
- M. Lin, C. Huang, Z. Xu, and R. Chen, “Evaluating IoT platforms using integrated probabilistic linguistic MCDM method,” IEEE Internet of Things Journal, vol. 7, no. 11, pp. 11195–11208, 2020.
- A. E. Youssef, “An integrated MCDM approach for cloud service selection based on TOPSIS and BWM,” IEEE Access, vol. 8, pp. 71851–71865, 2020.
- Y. Wang, Y. Lin, R. Y. Zhong, and X. Xu, “IoT-enabled cloud-based additive manufacturing platform to support rapid product development,” International Journal of Production Research, vol. 57, no. 12, pp. 3975–3991, 2018.
- V. S. Narwane, B. E. Narkhede, R. D. Raut, B. B. Gardas, P. Priyadarshinee, and M. S. Kavre, “To identify the determinants of the CloudIoT technologies adoption in the Indian MSMEs: structural equation modelling approach,” International Journal of Business Information Systems, vol. 31, no. 3, pp. 322–353, 2019.
- A. Mijuskovic, I. Ullah, R. Bemthuis, N. Meratnia, and P. Havinga, “Comparing apples and oranges in IoT context: a deep dive into methods for comparing IoT platforms,” IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1797–1816, 2021.
- L. Surya, “Security challenges and strategies for the IoT in cloud computing,” International Journal of Innovations in Engineering Research and Technology ISSN, vol. 3, pp. 2394–3696, 2016.
- S. Bhatt, A. T. Lo’ai, P. Chhetri, and P. Bhatt, “Authorizations in cloud-based internet of things: current trends and use cases,” in 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC), pp. 241–246, Rome, Italy, 2019, June.
- M. M. Hassan, M. R. Hassan, S. Huda, and V. H. C. de Albuquerque, “A robust deep learning enabled trust-boundary protection for adversarial industrial IoT environment,” IEEE Internet of Things Journal, vol. 8, 2020.
- M. A. da Cruz, J. J. Rodrigues, P. Lorenz, V. Korotaev, and V. H. C. de Albuquerque, “In. IoT—a new middleware for internet of things,” IEEE Internet of Things Journal, vol. 8, 2020.
- K. A. da Costa, J. P. Papa, C. O. Lisboa, R. Munoz, and V. H. C. de Albuquerque, “Internet of Things: a survey on machine learning-based intrusion detection approaches,” Computer Networks, vol. 151, pp. 147–157, 2019.
- S. Satyadevan, B. S. Kalarickal, and M. K. Jinesh, “Security, trust and implementation limitations of prominent IoT platforms,” in Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), pp. 85–95, Bhubaneswar, Odisha, India, 2015.
- X. Li, Q. Wang, X. Lan, X. Chen, N. Zhang, and D. Chen, “Enhancing cloud-based IoT security through trustworthy cloud service: an integration of security and reputation approach,” IEEE Access, vol. 7, pp. 9368–9383, 2019.
- C. Stergiou, K. E. Psannis, B. G. Kim, and B. Gupta, “Secure integration of IoT and cloud computing,” Future Generation Computer Systems, vol. 78, pp. 964–975, 2018.
- J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, “Security and privacy for cloud-based IoT: challenges,” IEEE Communications Magazine, vol. 55, no. 1, pp. 26–33, 2017.
- M. Hauschild and M. Pelikan, “An introduction and survey of estimation of distribution algorithms,” Swarm and Evolutionary Computation, vol. 1, no. 3, pp. 111–128, 2011.
Copyright © 2021 Alakananda Chakraborty et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.