Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey
Abstract
:1. Introduction
1.1. Methodology
- For the proposed survey, we collect IoT-based cloud computing papers from the timeline of 2015–2021.
- Research studies not published in English are excluded.
- The research studies not relevant to the IoT-based cloud computing survey scope are excluded.
- The main focus during paper selection is IoT-based cloud security and privacy.
- The research papers published on the same idea are eliminated to remove redundancy.
- We focus on the papers that performed experiments on the IoT-based cloud infrastructure.
1.2. Quality Analysis Criteria
- Does the selected research contribute to the proposed survey?
- Does the selected research belong to the survey scope? Does the selected research follow appropriate research standards?
- Does the selected research results are cleared?
- Does the author use appropriate techniques and features?
- Does the selected research objectives are clearly stated?
- Does the selected research focus on IoT-based cloud security?
- Does the selected research perform any experiments related to IoT-based cloud?
- Does the selected research share experiments details?
1.3. Contributions
- The research presents a consolidated survey on IoT cloud architecture, services, configurations, and security models. Additionally, we classify IoT cloud security concerns into four major categories: data, network and service, applications, and people-related security issues.
- The research identifies and inspects the latest advancements and trends in IoT cloud-based attacks.
- The research identifies, discusses, and analyzes significant security issues in each group and identifies the general limitations of AI, specifically DL.
- Furthermore, the research discusses technological challenges identified in the literature and the future directions at the intersection of cybersecurity and cloud.
1.4. Paper Structure
2. Background
2.1. Cloud Architectures and Deployment
2.1.1. Public Cloud
2.1.2. Private Cloud
2.1.3. Hybrid Cloud
2.1.4. Multi Cloud
2.2. Cloud Services
2.2.1. Software as a Service (SaaS)
2.2.2. Platform as a Service (PaaS)
2.2.3. Infrastructure as a Service (IaaS)
2.2.4. Development as a Service (DaaS)
2.2.5. Forensics as a Service (FaaS)
2.3. Information Disclosure
- An internal disclosure is the inadvertent making of private information public by an administrator or employee, which would lead to such disclosure. Lack of care and shredding or insufficient understanding of the sensitivity of information may result in such disclosures. The internal attacks can jeopardize certain users and allow absolute control over them [64].
- An external disclosure is the one which would target to acquire the provider’s system-specific information. For example, it may include the backup files, temporary files, patch levels, version numbers, and software distribution. For preventing such attacks where the risk of information disclosure is there, third-party authentication and encryption methods are often used [64].
3. Related Work
4. Cloud Configuration
4.1. Cloud Consumer
4.2. Cloud Provider
4.3. Cloud Auditor
4.4. Cloud Broker
4.5. Cloud Carrier
5. IoT-Based Cloud Attacks
5.1. Account Hijacking
- Verify your service provider to see if workers who have physical access to the server have been subjected to background checks.
- Have a reliable authentication strategy for cloud app clients.
- Disable the IP addresses from which cloud apps can be accessed. Several cloud application enables users to specify IP ranges, enabling them to utilize the company network or VPN to reach the app.
5.2. Denial of Service Attacks
- Prevent spoofing: Check whether traffic has a source IP address that matches the list of addresses for the site of origin, and apply filters to prevent spoofing of dial-up connections.
- Limit broadcasting: Attackers frequently make requests to all devices connected to the network, magnifying the attack. Attacks can be disrupted by limiting or shutting off broadcast forwarding whenever possible. When feasible, users can also turn off the echo and charge services.
- Streamline incident response: When DoS attacks are identified, improving the incident response can assist the security team in responding quickly.
- Protect endpoints: Check that these endpoints have been patched to address any known vulnerabilities. EDR agents should be deployed on all endpoints capable of running them.
- Dial in firewalls: Whenever feasible, make sure the firewalls restrict entry and exit traffic across the perimeter.
5.3. Phishing Attacks
- Be wary of each email or website.
- Before clicking on a link, verify it.
- Do not send any personal and business information by mail.
- Finally, reveal any suspicious activity to people in control of email and websites.
5.4. Malware Injection Attacks
5.5. Port Scanning Attacks
- A strong firewall: Unauthorized access to a company’s private network can be prevented by using a firewall. It manages ports and their visibility, as well as recognizing when a port scan is underway and shuts it off.
- TCP wrappers: Administrators can use these to grant or prohibit access to servers based on the IP address and domain names.
- Uncover network holes: A port scanner can be used by businesses to check whether other ports are open unnecessarily. They must perform frequent system audits to identify any weak points or vulnerabilities that an attacker might exploit.
5.6. Man-in-the-Middle Attacks
- Implement virtual private networks (VPNs);
- Using HTTPS, the user can ensure that sensitive online transactions/logins are safe;
- Create separate Wi-Fi networks;
- Use SSL/TLS encryption to secure email;
- Install an intrusion detection system (IDS).
5.7. Botnet Attacks
- Keep the software up to date;
- Closely monitor the network;
- Keep track of unsuccessful login attempts.
5.8. VM Rollback Attacks
5.9. Crypto-Jacking Attack
5.10. Security Service
6. Security Issues
6.1. C1-Data Security Issues
6.1.1. Storage
6.1.2. Location
6.1.3. Access
6.1.4. Integrity
6.1.5. Privacy Breaches
6.2. C2-Network and Services Related Security Issues
6.2.1. Account or Session Hijacking
6.2.2. Multi-Tenancy
6.2.3. Virtualization
6.2.4. Availability
6.2.5. Backup
6.3. C3-Application Related Security Issues
6.3.1. Malware Injections
6.3.2. User Interfaces
6.3.3. Development Life Cycle
6.4. C4-People Related Security Issues
6.4.1. Customer Trust
6.4.2. Compliance and Legality
6.4.3. Human Resource
6.4.4. Malicious Insiders
7. Challenges and Limitations in Cloud Computing
7.1. Confidentiality, Integrity and Availability (CIA)
7.2. Aspect of Application Security
7.3. COVID-19 or Similar Situation Challenges
7.4. Limited Computation Resources
7.5. Security Issue Classification
7.6. Limitations concerning Deep Learning/AI
7.7. Obsolete Laws
7.8. Security Policy Issues
8. Future Directions
9. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Mohiyuddin, A.; Javed, A.R.; Chakraborty, C.; Rizwan, M.; Shabbir, M.; Nebhen, J. Secure Cloud Storage for Medical IoT Data using Adaptive Neuro-Fuzzy Inference System. Int. J. Fuzzy Syst. 2021, 1–13. [Google Scholar] [CrossRef]
- Karam, Y.; Baker, T.; Taleb-Bendiab, A. Security support for intention driven elastic cloud computing. In Proceedings of the 2012 Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation, Malta, Malta, 14–16 November 2012; pp. 67–73. [Google Scholar]
- Abid, R.; Iwendi, C.; Javed, A.R.; Rizwan, M.; Jalil, Z.; Anajemba, J.H.; Biamba, C. An optimised homomorphic CRT-RSA algorithm for secure and efficient communication. Pers. Ubiquitous Comput. 2021, 1–14. [Google Scholar] [CrossRef]
- Ikram, A.A.; Javed, A.R.; Rizwan, M.; Abid, R.; Crichigno, J.; Srivastava, G. Mobile Cloud Computing Framework for Securing Data. In Proceedings of the 2021 44th International Conference on Telecommunications and Signal Processing (TSP), Brno, Czech Republic, 26–28 July 2021; pp. 309–315. [Google Scholar]
- Gartner-Top-10-Strategic-Technology-Trends-for-2020. Available online: https://www.gartner.com/smarterwithgartner/gartner-top-10-strategic-technology-trends-for-2020/ (accessed on 8 August 2020).
- Regalado, A. Who Coined Cloud Computing? MIT Technology Review. 31 October 2011. Available online: https://www.technologyreview.com/2011/10/31/257406/who-coined-cloud-computing/ (accessed on 8 August 2020).
- Amazon Web Services, Inc. Announcing Amazon Elastic Compute Cloud (Amazon EC2)—Beta. 2006. Available online: https://aws.amazon.com/about-aws/whats-new/2006/08/24/announcing-amazon-elastic-compute-cloud-amazon-ec2—beta/ (accessed on 8 August 2020).
- Googleappengine.blogspot.com. Introducing Google App Engine + Our New Blog. 2008. Available online: https://googleappengine.blogspot.com/2008/04/introducing-google-app-engine-our-new.html (accessed on 8 August 2020).
- Larsson, L.; Henriksson, D.; Elmroth, E. Scheduling and monitoring of internally structured services in cloud federations. In Proceedings of the 2011 IEEE Symposium on Computers and Communications (ISCC), Kerkyra, Greece, 28 June–1 July 2011; pp. 173–178. [Google Scholar]
- Hauger, D.; Microsoft Blog Editor—Microsoft News Center Staff. Windows Azure General Availability. The Official Microsoft Blog. 1 February 2020. Available online: https://blogs.microsoft.com/blog/2010/02/01/windows-azure-general-availability/ (accessed on 8 August 2020).
- dzone.com. Apache CloudStack vs. OpenStack: Which Is the Best? DZone Cloud. 2016. Available online: https://dzone.com/articles/apache-cloudstack-vs-openstack-which-is-the-best (accessed on 8 August 2020).
- Mell, P.; Grance, T. The NIST Definition of Cloud Computing; Special Publication (NIST SP) Series; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011. [Google Scholar] [CrossRef]
- Ghobaei-Arani, M.; Souri, A.; Baker, T.; Hussien, A. ControCity: An autonomous approach for controlling elasticity using buffer Management in Cloud Computing Environment. IEEE Access 2019, 7, 106912–106924. [Google Scholar] [CrossRef]
- Shabbir, M.; Shabbir, A.; Iwendi, C.; Javed, A.R.; Rizwan, M.; Herencsar, N.; Lin, J.C.W. Enhancing security of health information using modular encryption standard in mobile cloud computing. IEEE Access 2021, 9, 8820–8834. [Google Scholar] [CrossRef]
- Baker, T.; Mackay, M.; Randles, M.; Taleb-Bendiab, A. Intention-oriented programming support for runtime adaptive autonomic cloud-based applications. Comput. Electr. Eng. 2013, 39, 2400–2412. [Google Scholar] [CrossRef] [Green Version]
- Al-Khafajiy, M.; Baker, T.; Asim, M.; Guo, Z.; Ranjan, R.; Longo, A.; Puthal, D.; Taylor, M. COMITMENT: A fog computing trust management approach. J. Parallel Distrib. Comput. 2020, 137, 1–16. [Google Scholar] [CrossRef]
- Xia, T.; Washizaki, H.; Fukazawa, Y.; Kaiya, H.; Ogata, S.; Fernandez, E.B.; Kato, T.; Kanuka, H.; Okubo, T.; Yoshioka, N.; et al. CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development. Int. J. Syst. Softw. Secur. Prot. (IJSSSP) 2021, 12, 68–85. [Google Scholar] [CrossRef]
- Mather, T.; Kumaraswamy, S.; Latif, S. Cloud Security and Privacy; OReilly Media Inc.: Sebastopol, CA, USA, 2009. [Google Scholar]
- 4 Trends Impacting Cloud Adoption in 2020. Available online: https://www.gartner.com/smarterwithgartner/4-trends-impacting-cloud-adoption-in-2020/ (accessed on 8 August 2020).
- Su, J. Why Cloud Computing Cyber Security Risks Are On The Rise: Report. Forbes. 25 July 2019. Available online: https://www.forbes.com/sites/jeanbaptiste/2019/07/25/why-cloud-computing-cyber-security-risks-are-on-the-rise-report/#13a36bfc5621. (accessed on 8 August 2020).
- Mishra, P.; Negi, A.; Pilli, E.; Joshi, R. VMProtector: Malign Process Detection for Protecting Virtual Machines in Cloud Environment. In Third International Conference on Advances in Computing and Data Sciences, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part I; Springer: Singapore, 2019; pp. 360–369. [Google Scholar]
- Khorshed, M.T.; Ali, A.S.; Wasimi, S.A. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 2012, 28, 833–851. [Google Scholar] [CrossRef]
- Teneyuca, D. Internet cloud security: The illusion of inclusion. Inf. Secur. Tech. Rep. 2011, 16, 102–107. [Google Scholar] [CrossRef]
- Ismail, N. Cursing the cloud (or) controlling the cloud? Comput. Law Secur. Rev. 2011, 27, 250–257. [Google Scholar] [CrossRef]
- King, N.J.; Raja, V. Protecting the privacy and security of sensitive customer data in the cloud. Comput. Law Secur. Rev. 2012, 28, 308–319. [Google Scholar] [CrossRef]
- Ryan, P.; Falvey, S. Trust in the clouds. Comput. Law Secur. Rev. 2012, 28, 513–521. [Google Scholar] [CrossRef]
- Rai, R.; Sahoo, G.; Mehfuz, S. Securing software as a service model of cloud computing: Issues and solutions. arXiv 2013, arXiv:1309.2426. [Google Scholar]
- Chen, F.; Luo, D.; Xiang, T.; Chen, P.; Fan, J.; Truong, H.L. IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications. ACM Comput. Surv. (CSUR) 2021, 54, 1–36. [Google Scholar] [CrossRef]
- Rao, P.M.; Saraswathi, P. Evolving cloud security technologies for social networks. In Security in IoT Social Networks; Elsevier: Amsterdam, The Netherlands, 2021; pp. 179–203. [Google Scholar]
- Montasari, R.; Daneshkhah, A.; Jahankhani, H.; Hosseinian-Far, A. Cloud Computing Security: Hardware-Based Attacks and Countermeasures. In Digital Forensic Investigation of Internet of Things (IoT) Devices; Springer: Cham, Switzerland, 2021; pp. 155–167. [Google Scholar]
- Puthal, D.; Sahoo, B.P.; Mishra, S.; Swain, S. Cloud computing features, issues, and challenges: A big picture. In Proceedings of the 2015 International Conference on Computational Intelligence and Networks, Odisha, India, 12–13 January 2015; pp. 116–123. [Google Scholar]
- Khan, M.A. A survey of security issues for cloud computing. J. Netw. Comput. Appl. 2016, 71, 11–29. [Google Scholar] [CrossRef]
- Shahzad, F.; Iqbal, W.; Bokhari, F.S. On the use of CryptDB for securing Electronic Health data in the cloud: A performance study. In Proceedings of the 2015 17th International Conference on E-health Networking, Application Services (HealthCom), Boston, MA, USA, 14–17 October 2015; pp. 120–125. [Google Scholar] [CrossRef]
- Jouini, M.; Rabai, L.B.A. A security framework for secure cloud computing environments. In Cloud security: Concepts, Methodologies, Tools, and Applications; IGI Global: Hershey, PA, USA, 2019; pp. 249–263. [Google Scholar]
- Rong, C.; Nguyen, S.T.; Jaatun, M.G. Beyond lightning: A survey on security challenges in cloud computing. Comput. Electr. Eng. 2013, 39, 47–54. [Google Scholar] [CrossRef]
- Modi, C.; Patel, D.; Borisaniya, B.; Patel, A.; Rajarajan, M. A survey on security issues and solutions at dif ferent layers of Cloud computing. J. Supercomput. 2013, 63, 561–592. [Google Scholar] [CrossRef] [Green Version]
- Fernandes, D.A.; Soares, L.F.; Gomes, J.V.; Freire, M.M.; Inácio, P.R. Security issues in cloud environments: A survey. Int. J. Inf. Secur. 2014, 13, 113–170. [Google Scholar] [CrossRef]
- Jain, R.; Madan, S.; Garg, B. Privacy sustainability scheme in cloud environment. CSI Trans. ICT 2016, 4, 123–128. [Google Scholar] [CrossRef]
- Shahzad, A.; Hussain, M. Security issues and challenges of mobile cloud computing. Int. J. Grid Distrib. Comput. 2013, 6, 37–50. [Google Scholar] [CrossRef] [Green Version]
- Sgandurra, D.; Lupu, E. Evolution of attacks, threat models, and solutions for virtualized systems. ACM Comput. Surv. (CSUR) 2016, 48, 1–38. [Google Scholar] [CrossRef] [Green Version]
- Kumar, P.R.; Raj, P.H.; Jelciana, P. Exploring data security issues and solutions in cloud computing. Procedia Comput. Sci. 2018, 125, 691–697. [Google Scholar] [CrossRef]
- Tabrizchi, H.; Rafsanjani, M.K. A survey on security challenges in cloud computing: Issues, threats, and solutions. J. Supercomput. 2020, 76, 9493–9532. [Google Scholar] [CrossRef]
- Anuradha, M.; Jayasankar, T.; Prakash, N.; Sikkandar, M.Y.; Hemalakshmi, G.; Bharatiraja, C.; Britto, A.S.F. IoT enabled cancer prediction system to enhance the authentication and security using cloud computing. Microprocess. Microsyst. 2021, 80, 103301. [Google Scholar] [CrossRef]
- Monge, M.A.S.; Vidal, J.M.; Pérez, G.M. Detection of economic denial of sustainability (EDoS) threats in self-organizing networks. Comput. Commun. 2019, 145, 284–308. [Google Scholar] [CrossRef]
- Sotelo Monge, M.A.; Maestre Vidal, J. Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge. arXiv 2021, arXiv:2101.08676. [Google Scholar] [CrossRef]
- RM, S.P.; Bhattacharya, S.; Maddikunta, P.K.R.; Somayaji, S.R.K.; Lakshmanna, K.; Kaluri, R.; Hussien, A.; Gadekallu, T.R. Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything. J. Parallel Distrib. Comput. 2020, 142, 16–26. [Google Scholar]
- Ahamad, R.Z.; Javed, A.R.; Mehmood, S.; Khan, M.Z.; Noorwali, A.; Rizwan, M. Interference Mitigation in D2D Communication Underlying Cellular Networks: Towards Green Energy. CMC-Comput. Mater. Contin. 2021, 68, 45–58. [Google Scholar] [CrossRef]
- Reddy, G.T.; Sudheer, K.; Rajesh, K.; Lakshmanna, K. Employing data mining on highly secured private clouds for implementing a security-asa-service framework. J. Theor. Appl. Inf. Technol 2014, 59, 317–326. [Google Scholar]
- Naeem, A.; Javed, A.R.; Rizwan, M.; Abbas, S.; Lin, J.C.W.; Gadekallu, T.R. DARE-SEP: A hybrid approach of distance aware residual energy-efficient SEP for WSN. IEEE Trans. Green Commun. Netw. 2021, 5, 611–621. [Google Scholar] [CrossRef]
- Javed, A.R.; Abid, R.; Aslam, B.; Khalid, H.A.; Khan, M.Z.; Alhazmi, O.H.; Rizwan, M. Green5g: Enhancing capacity and coverage in device-to-device communication. Comput. Mater. Continua 2021, 67, 1933–1950. [Google Scholar] [CrossRef]
- NIST Cloud Computing Security Reference Architecture. Available online: https://csrc.nist.gov/publications/detail/sp/500-299/draft (accessed on 8 August 2020).
- Rani, B.K.; Rani, B.P.; Babu, A.V. Cloud computing and inter-clouds–types, topologies and research issues. Procedia Comput. Sci. 2015, 50, 24–29. [Google Scholar] [CrossRef] [Green Version]
- Diaby, T.; Rad, B.B. Cloud computing: A review of the concepts and deployment models. Int. J. Inf. Technol. Comput. Sci. 2017, 9, 50–58. [Google Scholar] [CrossRef] [Green Version]
- Shaikh, A.H.; Meshram, B. Security issues in cloud computing. In Intelligent Computing and Networking; Springer: Singapore, 2021; pp. 63–77. [Google Scholar]
- Bahrami, M.; Singhal, M. The role of cloud computing architecture in big data. In Information Granularity, Big Data, and Computational Intelligence; Springer: Cham, Switzerland, 2015; pp. 275–295. [Google Scholar]
- Odun-Ayo, I.; Ananya, M.; Agono, F.; Goddy-Worlu, R. Cloud computing architecture: A critical analysis. In Proceedings of the 2018 18th International Conference on Computational Science and Applications (ICCSA), Melbourne, Australia, 2–5 July 2018; pp. 1–7. [Google Scholar]
- Piraghaj, S.F.; Dastjerdi, A.V.; Calheiros, R.N.; Buyya, R. A survey and taxonomy of energy efficient resource management techniques in platform as a service cloud. In Handbook of Research on End-to-End Cloud Computing Architecture Design; IGI Global: Hershey, PA, USA, 2017; pp. 410–454. [Google Scholar]
- Huang, W.; Ganjali, A.; Kim, B.H.; Oh, S.; Lie, D. The state of public infrastructure-as-a-service cloud security. ACM Comput. Surv. (CSUR) 2015, 47, 1–31. [Google Scholar] [CrossRef]
- Nanda, S.; Hansen, R.A. Forensics as a service: Three-tier architecture for cloud based forensic analysis. In Proceedings of the 2016 15th International Symposium on Parallel and Distributed Computing (ISPDC), Fuzhou, China, 8–10 July 2016; pp. 178–183. [Google Scholar]
- Iqbal, F.; Batool, R.; Fung, B.C.; Aleem, S.; Abbasi, A.; Javed, A.R. Toward Tweet-Mining Framework for Extracting Terrorist Attack-Related Information and Reporting. IEEE Access 2021, 9, 115535–115547. [Google Scholar] [CrossRef]
- Tan, Y.; Wu, F.; Wu, Q.; Liao, X. Resource stealing: A resource multiplexing method for mix workloads in cloud system. J. Supercomput. 2019, 75, 33–49. [Google Scholar] [CrossRef]
- Hong, J.B.; Nhlabatsi, A.; Kim, D.S.; Hussein, A.; Fetais, N.; Khan, K.M. Systematic identification of threats in the cloud: A survey. Comput. Netw. 2019, 150, 46–69. [Google Scholar] [CrossRef]
- Haber, M.J.; Hibbert, B. Penetration Testing. In Asset Attack Vectors; Apress: Berkeley, CA, USA, 2018; pp. 93–98. [Google Scholar]
- Lin, H.; Xu, L.; Huang, X.; Wu, W.; Huang, Y. A trustworthy access control model for mobile cloud computing based on reputation and mechanism design. Ad Hoc Netw. 2015, 35, 51–64. [Google Scholar] [CrossRef]
- Singh, A.; Chatterjee, K. Cloud security issues and challenges: A survey. J. Netw. Comput. Appl. 2017, 79, 88–115. [Google Scholar] [CrossRef]
- Mushtaq, M.F.; Akram, U.; Khan, I.; Khan, S.N.; Shahzad, A.; Ullah, A. Cloud computing environment and security challenges: A review. Int. J. Adv. Comput. Sci. Appl. 2017, 8, 183–195. [Google Scholar]
- Singh, A. Security concerns and countermeasures in cloud computing: A qualitative analysis. Int. J. Inf. Technol. 2019, 11, 683–690. [Google Scholar]
- Basu, S.; Bardhan, A.; Gupta, K.; Saha, P.; Pal, M.; Bose, M.; Basu, K.; Chaudhury, S.; Sarkar, P. Cloud computing security challenges & solutions-A survey. In Proceedings of the 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 8–10 January 2018; pp. 347–356. [Google Scholar]
- Sheikh, A.; Munro, M.; Budgen, D. Systematic Literature Review (SLR) of resource scheduling and security in cloud computing. Int. J. Adv. Comput. Sci. Appl. 2019, 10. [Google Scholar] [CrossRef]
- An, Y.; Zaaba, Z.; Samsudin, N. Reviews on security issues and challenges in cloud computing. In IOP Conference Series: Materials Science and Engineering; IOP Publishing: Bristol, UK, 2016; Volume 160, p. 012106. [Google Scholar]
- Wani, A.R.; Rana, Q.; Pandey, N. Analysis and countermeasures for security and privacy issues in cloud computing. In System Performance and Management Analytics; Springer: Singapore, 2019; pp. 47–54. [Google Scholar]
- Ghaffari, F.; Gharaee, H.; Arabsorkhi, A. Cloud Security Issues Based on People, Process and Technology Model: A Survey. In Proceedings of the 2019 5th International Conference on Web Research (ICWR), Tehran, Iran, 24–25 April 2019; pp. 196–202. [Google Scholar]
- Chan, T.H.; Jia, K.; Gao, S.; Lu, J.; Zeng, Z.; Ma, Y. PCANet: A simple deep learning baseline for image classification? IEEE Trans. Image Process. 2015, 24, 5017–5032. [Google Scholar] [CrossRef] [Green Version]
- Graves, A.; Mohamed, A.r.; Hinton, G. Speech recognition with deep recurrent neural networks. In Proceedings of the 2013 IEEE international conference on acoustics, speech and signal processing, Vancouver, BC, Canada, 26–31 May 2013; pp. 6645–6649. [Google Scholar]
- Hinton, G.; Deng, L.; Yu, D.; Dahl, G.E.; Mohamed, A.R.; Jaitly, N.; Senior, A.; Vanhoucke, V.; Nguyen, P.; Sainath, T.N.; et al. Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal Process. Mag. 2012, 29, 82–97. [Google Scholar] [CrossRef]
- Liang, M.; Li, Z.; Chen, T.; Zeng, J. Integrative data analysis of multi-platform cancer data with a multimodal deep learning approach. IEEE/ACM Trans. Comput. Biol. Bioinform. 2014, 12, 928–937. [Google Scholar] [CrossRef]
- Li, P.; Li, J.; Huang, Z.; Li, T.; Gao, C.Z.; Yiu, S.M.; Chen, K. Multi-key privacy-preserving deep learning in cloud computing. Future Gener. Comput. Syst. 2017, 74, 76–85. [Google Scholar] [CrossRef]
- Hinton, G.E.; Salakhutdinov, R.R. Reducing the dimensionality of data with neural networks. Science 2006, 313, 504–507. [Google Scholar] [CrossRef] [Green Version]
- Giri, S.; Shakya, S. Cloud Computing and Data Security Challenges: A Nepal Case. Int. J. Eng. Trends Technol. 2019, 67, 146–150. [Google Scholar]
- Wu, W.; Zhang, Q.; Wang, Y. Public Cloud Security Protection Research. In Proceedings of the 2019 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Dalian, China, 20–22 September 2019; pp. 1–4. [Google Scholar]
- Ramachandra, G.; Iftikhar, M.; Khan, F.A. A comprehensive survey on security in cloud computing. Procedia Comput. Sci. 2017, 110, 465–472. [Google Scholar] [CrossRef]
- Sunyaev, A. Cloud Computing. In Internet Computing; Springer: Cham, Switzerland, 2020; pp. 195–236. [Google Scholar]
- Javed, A.R.; Usman, M.; Rehman, S.U.; Khan, M.U.; Haghighi, M.S. Anomaly detection in automated vehicles using multistage attention-based convolutional neural network. IEEE Trans. Intell. Transp. Syst. 2020, 22, 4291–4300. [Google Scholar] [CrossRef]
- Ahmed, W.; Rasool, A.; Javed, A.R.; Kumar, N.; Gadekallu, T.R.; Jalil, Z.; Kryvinska, N. Security in Next Generation Mobile Payment Systems: A Comprehensive Survey. IEEE Access 2021, 9, 115932–115950. [Google Scholar] [CrossRef]
- Riaz, S.; Khan, A.H.; Haroon, M.; Latif, S.; Bhatti, S. Big Data Security and Privacy: Current Challenges and Future Research perspective in Cloud Environment. In Proceedings of the 2020 International Conference on Information Management and Technology (ICIMTech), Bandung, Indonesia, 13–14 August 2020; pp. 977–982. [Google Scholar]
- Iwendi, C.; Rehman, S.U.; Javed, A.R.; Khan, S.; Srivastava, G. Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures. ACM Trans. Internet Technol. (TOIT) 2021, 21, 1–22. [Google Scholar] [CrossRef]
- Harkut, D.G. Introductory Chapter: Cloud Computing Security Challenges. In Cloud Computing Security-Concepts and Practice; IntechOpen: London, UK, 2020. [Google Scholar]
- Basit, A.; Zafar, M.; Liu, X.; Javed, A.R.; Jalil, Z.; Kifayat, K. A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun. Syst. 2021, 76, 139–154. [Google Scholar] [CrossRef] [PubMed]
- Basit, A.; Zafar, M.; Javed, A.R.; Jalil, Z. A novel ensemble machine learning method to detect phishing attack. In Proceedings of the 2020 IEEE 23rd International Multitopic Conference (INMIC), Bahawalpur, Pakistan, 5–7 November 2020; pp. 1–5. [Google Scholar]
- Pothuganti, S. Overview on Security Issues in Cloud Computing. Int. J. Innov. Res. Comput. Commun. Eng. 2020, 10, 4064–4068. [Google Scholar]
- Afzal, S.; Asim, M.; Javed, A.R.; Beg, M.O.; Baker, T. URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models. J. Netw. Syst. Manag. 2021, 29, 1–27. [Google Scholar] [CrossRef]
- Chouhan, P.; Singh, R. Security attacks on cloud computing with possible solution. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2016, 6, 92–96. [Google Scholar]
- Kene, S.G.; Theng, D.P. A review on intrusion detection techniques for cloud computing and security challenges. In Proceedings of the 2015 2nd International Conference on Electronics and Communication Systems (ICECS), Coimbatore, India, 26–27 February 2015; pp. 227–232. [Google Scholar]
- Chiba, Z.; Abghour, N.; Moussaid, K.; El Omri, A.; Rida, M. A survey of intrusion detection systems for cloud computing environment. In Proceedings of the 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, Morocco, 22–24 September 2016; pp. 1–13. [Google Scholar]
- Logesswari, S.; Jayanthi, S.; KalaiSelvi, D.; Muthusundari, S.; Aswin, V. A study on cloud computing challenges and its mitigations. Mater. Today Proc. 2020. [Google Scholar] [CrossRef]
- Singh, A.; Shrivastava, D.M. Overview of attacks on cloud computing. Int. J. Eng. Innov. Technol. (IJEIT) 2012, 1, 321–323. [Google Scholar]
- Muhammad, A.; Asad, M.; Javed, A.R. Robust early stage botnet detection using machine learning. In Proceedings of the 2020 International Conference on Cyber Warfare and Security (ICCWS), Islamabad, Pakistan, 20–21 October 2020; pp. 1–6. [Google Scholar]
- Rehman Javed, A.; Jalil, Z.; Atif Moqurrab, S.; Abbas, S.; Liu, X. Ensemble adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles. Trans. Emerg. Telecommun. Technol. 2020, e4088. [Google Scholar] [CrossRef]
- Bakr, A.; El-Aziz, A.; Hefny, H.A. A Survey on Mitigation Techniques against DDoS Attacks on Cloud Computing Architecture. Int. J. Adv. Sci. Technol. 2019, 28, 187–200. [Google Scholar]
- Alhenaki, L.; Alwatban, A.; Alamri, B.; Alarifi, N. A survey on the security of cloud computing. In Proceedings of the 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 1–3 May 2019; pp. 1–7. [Google Scholar]
- Sigler, K. Crypto-jacking: How cyber-criminals are exploiting the crypto-currency boom. Comput. Fraud. Secur. 2018, 2018, 12–14. [Google Scholar] [CrossRef]
- Roman, R.; Lopez, J.; Mambo, M. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 2018, 78, 680–698. [Google Scholar] [CrossRef] [Green Version]
- Iwendi, C.; Jalil, Z.; Javed, A.R.; Reddy, T.; Kaluri, R.; Srivastava, G.; Jo, O. Keysplitwatermark: Zero watermarking algorithm for software protection against cyber-attacks. IEEE Access 2020, 8, 72650–72660. [Google Scholar] [CrossRef]
- Chaudhary, A. Cloud Security Challenges in 2020. Cloud Security Alliance. 18 February 2020. Available online: https://cloudsecurityalliance.org/blog/2020/02/18/cloud-security-challenges-in-2020/ (accessed on 8 August 2020).
- Isc2.org. 2020 Cloud Security Report. 2020. Available online: https://www.isc2.org/resource-center/reports/2020-cloud-security-report (accessed on 8 August 2020).
- Cybersecurity Insiders. 2020 Cloud Security Report—Cybersecurity Insiders. 2020. Available online: https://www.cybersecurity-insiders.com/portfolio/cloud-security-report-prospectus/. (accessed on 8 August 2020).
- Abbasi, A.; Javed, A.R.; Chakraborty, C.; Nebhen, J.; Zehra, W.; Jalil, Z. ElStream: An Ensemble Learning Approach for Concept Drift Detection in Dynamic Social Big Data Stream Learning. IEEE Access 2021, 9, 66408–66419. [Google Scholar] [CrossRef]
- Pujari, V.; Patil, R.; Palkar, R. A Study of Data Storage Security Issues in Cloud Computing. In Proceedings of the National Seminar on “Trends in Geography, Commerce, IT And Sustainable Development”, Khed, India, 29 February 2020. [Google Scholar]
- Rao, R.V.; Selvamani, K. Data security challenges and its solutions in cloud computing. Procedia Comput. Sci. 2015, 48, 204–209. [Google Scholar] [CrossRef] [Green Version]
- Gaetani, E.; Aniello, L.; Baldoni, R.; Lombardi, F.; Margheri, A.; Sassone, V. Blockchain-based database to ensure data integrity in cloud computing environments. In Proceedings of the Italian Conference on Cybersecurity, Venice, Italy, 17–20 January 2017. [Google Scholar]
- Chen, D.; Zhao, H. Data security and privacy protection issues in cloud computing. In Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering, Hangzhou, China, 23–25 March 2012; Volume 1, pp. 647–651. [Google Scholar]
- Ahmed, W.; Shahzad, F.; Javed, A.R.; Iqbal, F.; Ali, L. WhatsApp Network Forensics: Discovering the IP Addresses of Suspects. In Proceedings of the 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 19–21 April 2021; pp. 1–7. [Google Scholar] [CrossRef]
- Christina, A.A. Proactive measures on account hijacking in cloud computing network. Asian J. Comput. Sci. Technol. 2015, 4, 31–34. [Google Scholar]
- Mishra, A.; Mathur, R.; Jain, S.; Rathore, J.S. Cloud computing security. Int. J. Recent Innov. Trends Comput. Commun. 2013, 1, 36–39. [Google Scholar]
- Hashizume, K.; Rosado, D.G.; Fernández-Medina, E.; Fernandez, E.B. An analysis of security issues for cloud computing. J. Internet Serv. Appl. 2013, 4, 5. [Google Scholar] [CrossRef] [Green Version]
- Thabita, F.; Alhomdyc, S.; Al-Ahdalc, A.H.; Jagtapa, S. Exploration of Security Challenges in Cloud Computing: Issues, Threats, and Attacks with their Alleviating Techniques. J. Inf. Comput. Sci. 2020, 12, 35–57. [Google Scholar]
- Namasudra, S.; Devi, D.; Kadry, S.; Sundarasekar, R.; Shanthini, A. Towards DNA based data security in the cloud computing environment. Comput. Commun. 2020, 151, 539–547. [Google Scholar] [CrossRef]
- Tripwire Guest Authors. Malware in the Cloud: What You Need to Know. Tripwire: The State of Security. 25 September 2018. Available online: https://www.tripwire.com/state-of-security/security-data-protection/cloud/malware-cloud/ (accessed on 8 August 2020).
- Kashfi, H. Software engineering challenges in cloud environment: Software development lifecycle perspective. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2017, 2, 251–256. [Google Scholar]
- Horvath, A.S.; Agrawal, R. Trust in cloud computing. In Proceedings of the SoutheastCon 2015, Fort Lauderdale, FL, USA, 9–12 April 2015; pp. 1–8. [Google Scholar]
- Awodele, O.; Adebayo, A.; Tayo, O. Security and Privacy Issues in Cloud Computing. Commun. Appl. Electron. 2017, 7, 14–17. [Google Scholar]
- Duncan, A.J.; Creese, S.; Goldsmith, M. Insider attacks in cloud computing. In Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 25–27 June 2012; pp. 857–862. [Google Scholar]
- Javed, A.R.; Beg, M.O.; Asim, M.; Baker, T.; Al-Bayatti, A.H. Alphalogger: Detecting motion-based side-channel attack using smartphone keystrokes. J. Ambient. Intell. Humaniz. Comput. 2020, 1–14. [Google Scholar] [CrossRef] [Green Version]
- Javed, A.R.; Rehman, S.U.; Khan, M.U.; Alazab, M.; Khan, H.U. Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network. Trans. Asian-Low-Resour. Lang. Inf. Process. 2021, 20, 1–17. [Google Scholar] [CrossRef]
- Islam, M.A.; Vrbsky, S.V. Transaction management with tree-based consistency in cloud databases. Int. J. Cloud Comput. 2017, 6, 58–78. [Google Scholar] [CrossRef]
- Tang, J.; Cui, Y.; Li, Q.; Ren, K.; Liu, J.; Buyya, R. Ensuring security and privacy preservation for cloud data services. ACM Comput. Surv. (CSUR) 2016, 49, 1–39. [Google Scholar] [CrossRef]
- Sehgal, N.K.; Bhatt, P.C. Cloud Workload Characterization. In Cloud Computing; Springer: Cham, Switzerland, 2018. [Google Scholar]
- Xuan, S.; Yang, W.; Dong, H.; Zhang, J. Performance evaluation model for application layer firewalls. PLoS ONE 2016, 11, e0167280. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Shin, S.; Song, Y.; Lee, T.; Lee, S.; Chung, J.; Porras, P.; Yegneswaran, V.; Noh, J.; Kang, B.B. Rosemary: A robust, secure, and high-performance network operating system. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3–7 November 2014; pp. 78–89. [Google Scholar]
- Moreno-Vozmediano, R.; Montero, R.S.; Llorente, I.M. Key challenges in cloud computing: Enabling the future internet of services. IEEE Internet Comput. 2012, 17, 18–25. [Google Scholar] [CrossRef]
- Hina, M.; Ali, M.; Javed, A.R.; Ghabban, F.; Khan, L.A.; Jalil, Z. SeFACED: Semantic-Based Forensic Analysis and Classification of E-Mail Data Using Deep Learning. IEEE Access 2021, 9, 98398–98411. [Google Scholar] [CrossRef]
- Javed, A.R.; Jalil, Z. Byte-level object identification for forensic investigation of digital images. In Proceedings of the 2020 International Conference on Cyber Warfare and Security (ICCWS), Islamabad, Pakistan, 20–21 October 2020; pp. 1–4. [Google Scholar]
- Osanaiye, O.; Choo, K.K.R.; Dlodlo, M. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 2016, 67, 147–165. [Google Scholar] [CrossRef]
- Mittal, M.; Iwendi, C.; Khan, S.; Rehman Javed, A. Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system. Trans. Emerg. Telecommun. Technol. 2021, 32, e3997. [Google Scholar] [CrossRef]
- Rehman, A.; Rehman, S.U.; Khan, M.; Alazab, M.; Reddy, T. CANintelliIDS: Detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans. Netw. Sci. Eng. 2021, 8, 1456–1466. [Google Scholar]
- Ahmed, M.; Litchfield, A.T. Taxonomy for identification of security issues in cloud computing environments. J. Comput. Inf. Syst. 2018, 58, 79–88. [Google Scholar] [CrossRef]
- Alzahrani, A.; Alalwan, N.; Sarrab, M. Mobile cloud computing: Advantage, disadvantage and open challenge. In Proceedings of the 7th Euro American Conference on Telematics and Information Systems, Valparaiso, Chile, 2–4 April 2014; pp. 1–4. [Google Scholar]
- Shahzad, F.; Javed, A.R.; Zikria, Y.B.; Rehman, S.u.; Jalil, Z. Future Smart Cities: Requirements, Emerging Technologies, Applications, Challenges, and Future Aspects. TechRxiv 2021. [Google Scholar] [CrossRef]
Abbreviation | Description |
---|---|
AI | Artificial Intelligence |
AES | Advanced Encryption Standard |
APIs | Application Programming interfaces |
CBC-MAC | Cipher Block Chaining Message Authentication Code |
CIA | Confidentiality, Integrity and Availability |
DDoS | Distributed Denial of Service |
DSA | Digital Signature Algorithm |
DaaS | Development as a Service |
DL | Deep Learning |
ECDSA | Elliptic Curve Digital Signature Algorithm |
EC2 | Elastic Compute Cloud |
FaaS | Forensic as a Service |
GDPR | General Data Protection Regulation |
HMAC | Hash-based Message Authentication Code |
IoT | Internet of Things |
IDPS | Intrusion Detection Prevention System |
IaaS | Infrastructure as a Service |
KPMG | Klynveld Peat Marwick Goerdeler |
LDAP | Lightweight Directory Access Protocol |
ML | Machine Learning |
NIST | National Institute of Standards and Technology |
NCC-SRA | NIST Cloud Computing Security Reference Architecture |
PaaS | Platform as a Service |
PKI | Public Key Infrastructure |
QoS | Quality of Service |
SAAS | Software as a Service |
SLR | Systematic Literature Review |
SLA | Service Level Agreement |
SSL | Secure Socket Layer |
SDLC | Software Development Life Cycle |
TTP | Trusted Third Party |
VM | Virtual Machine |
Year | Survey | Focus | Key Features and Limitations |
---|---|---|---|
2016 | M. A. Khan et al. [32] | Security threats and their countermeasure | • Presented security threats and their countermeasure from the perspective of cloud security issues. • Categorized and analyzed the security issues and their solution. •Provide a comparison of several threats and attacks faced by cloud infrastructure. •Author does not provide any IoT-based framework for countermeasure identified attacks and threats in the IoT environment. |
2016 | Singh et al. [65] | Cloud security issues and their solution | • Discussed different cloud environment features, cloud threats, cloud security issues, and solutions. • Discussed important topics associated with the cloud, such as deployment model, services, technologies, architecture and framework, attacks and threats, and cloud security concepts. • Presented open research issues in cloud security. • Author does not provide any future research challenges associated with IoT-based cloud computing. |
2017 | Mushtaq et al. [66] | Cloud design and deployment | • Cloud computing design included cloud components, deployment models, cloud security, and explored cloud service models. • Identified practical security challenges and potential threats. • Introduced the TTP to ensure security characteristics. • Did not present future research directions and challenges in IoT-based cloud computing. |
2018 | Basu et al. [68] | Cloud models and security | • Discussed different cloud properties and models from security perspectives. • Discussed cloud security issues and requirements in detail and proposed a novel methodology to countermeasure them. • Discussed cloud security issues and did not focus on future research directions from IoT-based cloud. |
2019 | Sheikh et al. [69] | Cloud situation categorization | • Provided systematic literature review to help the reader find relevant research articles on the associated topic. • Categorized literature into groups depends on the current situation to identify future research gaps. • Author did not discuss any IoT-based cloud framework and model and nor discussed cloud-related research challenges. |
2019 | Khandelwal et al. [70] | Cloud security issues and solution | • Created a list of cloud computing architecture that identifies security issues and finds solutions for the identified issues in cloud computing. • Lacks in proposing a methodology, current challenges, and future research directions. |
2019 | Ghaffari et al. [72] | Cloud security challenges | • Identified cyber security challenges and address the identified challenges to find feasible, efficient, and cost-effective security solutions. • Discussed cloud security issues but lacks future research directions. |
2021 | This survey | IoT cloud security issues, solution and categorization | • Presents a comprehensive survey of enabling cloud-based IoT architecture, services, configurations, and security models. • Classification of cloud security concerns in IoT into four major categories: data, network and service, applications, and people-related security issues, which are discussed in detail. • Identifies and inspects the latest advancements in cloud-based IoT attacks. • Identify, discuss and analyze significant security issues in each category and present limitations from general, artificial intelligence, and deep learning perspective. • Provides technological challenges identified in the literature and then identifies significant research gaps in IoT-based cloud infrastructure and highlights future research directions to blend cybersecurity in cloud. |
No. | Position | Responsibilities |
---|---|---|
1 | Cloud Consumer | Maintain relationship with entity and enable them to utilize cloud services. |
2 | Cloud Provider | Enable services to all consumers that are eligible. |
3 | Cloud Auditor | Assessment of services provided by cloud, performance of systems and security. |
4 | Cloud Broker | Manage the use, performance and delivery of service. |
5 | Cloud Carrier | Provide connection and transport cloud services. |
Attacks and Threads | Description |
---|---|
Information Breaches | Security breaches and the use of protected data |
Information Loss | Data loss as a result of poor handling |
Service or Account Hijacking | Attacks on the system aimed at stealing information |
Applications and API attacks | Attacks to expose software interfaces or APIs |
Denial of service (DOS) | Attack on machine or network that make inaccessible to user |
Malicious Insider | Any insider can utilize the system for malicious purposes |
Abuse and nefarious use of cloud services | Using cloud services for nefarious purposes or misuse of cloud services |
Insufficient diligence | Risk due to insufficient and shortage of cloud knowledge |
Shared technology | Due to shared resources, there have been several attacks. |
Security Type | Mechanism | Example |
---|---|---|
Confidentiality | Secure Socket Layer (SSL) and Encryption | Advanced Encryption Standard (AES), RSA, Digital Signature Algorithm (DSA) |
Integrity | Hash function, signature/authentication code | SHA-256,MD5, HMAC. |
Availability | Intrusion Detection Prevention System (IDPS), Firewall | SNORT, Suricata. |
Authentication | Endorsing certificate, SSL, Digital signature | Hash-based Message Authentication Code (HMAC), Elliptic Curve Digital Signature Algorithm (ECDSA), Cipher Block Chaining Message Authentication Code (CBC-MAC). |
Non-repudiation | Public/Private block chain, notary | Email tracking. |
No. | Category | Description |
---|---|---|
C1 | Data Security issues | Includes data security issues related to data storage, location, backup, integrity, access, and breaches. |
C2 | Network and Services related security issues | This category comprises security issues related to networks and services such as Service /Account hijacking, insider threats, virtualization, and multitenancy issues. |
C3 | Applications security issues | includes issues related to cloud-based applications such as malware injections, malicious insiders development life cycle, and UI issues. |
C4 | people-related security issues | Issues involving people such as trust management issues, compliance issues, human resource, and legal issues are included in this category. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ahmad, W.; Rasool, A.; Javed, A.R.; Baker, T.; Jalil, Z. Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey. Electronics 2022, 11, 16. https://doi.org/10.3390/electronics11010016
Ahmad W, Rasool A, Javed AR, Baker T, Jalil Z. Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey. Electronics. 2022; 11(1):16. https://doi.org/10.3390/electronics11010016
Chicago/Turabian StyleAhmad, Waqas, Aamir Rasool, Abdul Rehman Javed, Thar Baker, and Zunera Jalil. 2022. "Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey" Electronics 11, no. 1: 16. https://doi.org/10.3390/electronics11010016
APA StyleAhmad, W., Rasool, A., Javed, A. R., Baker, T., & Jalil, Z. (2022). Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey. Electronics, 11(1), 16. https://doi.org/10.3390/electronics11010016