A Comprehensive Survey of IoT- Based Cloud Computing Cyber Security

S. Yadav, Keshao D. Kalaskar, Pankaj Dhumane
{"title":"A Comprehensive Survey of IoT- Based Cloud Computing Cyber Security","authors":"S. Yadav, Keshao D. Kalaskar, Pankaj Dhumane","doi":"10.13005/ojcst15.010203.04","DOIUrl":null,"url":null,"abstract":"The flexible architecture offered by cloud computing allows for the dispersion of resources and data over numerous places, making it possible to access them from a variety of industrial settings. The use, storage, and sharing of resources such as data, services, and industrial applications have all changed as a result of cloud computing. In the past ten years, companies have quickly shifted to cloud computing in order to benefit from increased performance, lower costs, and more extensive access. Additionally, the internet of things (IoT) has significantly improved when cloud computing was incorporated. However, this quick shift to the cloud brought up a number of security concerns and challenges. Traditional security measures don't immediately apply to cloud-based systems and are occasionally inadequate. Despite the widespread use and proliferation of various cyber weapons, cloud platform issues and security concerns have been addressed over the last three years. Deep learning's (DL) quick development in the field of artificial intelligence (AI) has produced a number of advantages that can be used to cloud-based industrial security concerns. The following are some of the research's findings: We provide a detailed evaluation of the structure, services, configurations, and security fashions that enable cloud-primarily based IoT. We additionally classify cloud protection dangers in IoT into four foremost areas (records, network and carrier, programs, and gadgets). We discuss the technological issues raised in the literature before identifying key research gaps. In each class, describe the boundaries using a popular, artificial intelligence, and in-depth studying attitude. and security concerns relating to individuals), which are fully covered; we find and analyze the most recent cloud-primarily based IoT attack innovations; we identify, talk, and verify key safety challenges show the regulations from a standard, synthetic intelligence, and deep learning perspective in every class angle; we first present the technological difficulties identified in the literature before identifying IoT-based cloud infrastructure has significant research gaps which should be highlighted for future research orientations. Cloud computing and cyber security.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Oriental journal of computer science and technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.13005/ojcst15.010203.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The flexible architecture offered by cloud computing allows for the dispersion of resources and data over numerous places, making it possible to access them from a variety of industrial settings. The use, storage, and sharing of resources such as data, services, and industrial applications have all changed as a result of cloud computing. In the past ten years, companies have quickly shifted to cloud computing in order to benefit from increased performance, lower costs, and more extensive access. Additionally, the internet of things (IoT) has significantly improved when cloud computing was incorporated. However, this quick shift to the cloud brought up a number of security concerns and challenges. Traditional security measures don't immediately apply to cloud-based systems and are occasionally inadequate. Despite the widespread use and proliferation of various cyber weapons, cloud platform issues and security concerns have been addressed over the last three years. Deep learning's (DL) quick development in the field of artificial intelligence (AI) has produced a number of advantages that can be used to cloud-based industrial security concerns. The following are some of the research's findings: We provide a detailed evaluation of the structure, services, configurations, and security fashions that enable cloud-primarily based IoT. We additionally classify cloud protection dangers in IoT into four foremost areas (records, network and carrier, programs, and gadgets). We discuss the technological issues raised in the literature before identifying key research gaps. In each class, describe the boundaries using a popular, artificial intelligence, and in-depth studying attitude. and security concerns relating to individuals), which are fully covered; we find and analyze the most recent cloud-primarily based IoT attack innovations; we identify, talk, and verify key safety challenges show the regulations from a standard, synthetic intelligence, and deep learning perspective in every class angle; we first present the technological difficulties identified in the literature before identifying IoT-based cloud infrastructure has significant research gaps which should be highlighted for future research orientations. Cloud computing and cyber security.
基于物联网的云计算网络安全综合研究
云计算提供的灵活架构允许将资源和数据分散到许多地方,从而可以从各种工业环境中访问它们。由于云计算,数据、服务和工业应用程序等资源的使用、存储和共享都发生了变化。在过去的十年中,为了从更高的性能、更低的成本和更广泛的访问中获益,公司已经迅速转向云计算。此外,当云计算被纳入时,物联网(IoT)得到了显着改善。然而,这种向云的快速转移带来了许多安全问题和挑战。传统的安全措施不能立即适用于基于云计算的系统,有时还不够。尽管各种网络武器的广泛使用和扩散,云平台问题和安全问题在过去三年中得到了解决。深度学习(DL)在人工智能(AI)领域的快速发展产生了许多优势,可用于基于云的工业安全问题。以下是一些研究结果:我们对基于云的物联网的结构、服务、配置和安全模式进行了详细的评估。我们还将物联网中的云保护风险分为四个主要领域(记录、网络和运营商、程序和设备)。在确定关键的研究差距之前,我们讨论了文献中提出的技术问题。在每节课上,用流行的、人工智能的、深入的学习态度来描述边界。以及与个人有关的安全问题),这些都得到了充分的保障;我们发现并分析了最新的基于云的物联网攻击创新;我们从标准、人工智能和深度学习的角度,从每个班级的角度,识别、讨论和验证关键的安全挑战;在确定基于物联网的云基础设施具有重大的研究差距之前,我们首先提出了文献中确定的技术困难,这些研究差距应该在未来的研究方向上得到强调。云计算与网络安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信