Comprehensive analysis of security issues in cloud-based Internet of Things: A survey

Journal article


Gimba, U. A., Ariffrin, N. A. M., Musa, A. and Babangida, L. 2023. Comprehensive analysis of security issues in cloud-based Internet of Things: A survey. Journal of Computer Science & Computational Mathematics. 13 (2). https://doi.org/10.20967/jcscm.2023.02.004
AuthorsGimba, U. A., Ariffrin, N. A. M., Musa, A. and Babangida, L.
Abstract

The Internet of Things (IoT )has emerged as the largest computing platform, enabling IoT devices to sense real-world conditions such as temperature, humidity, pressure, and cloud prediction. However, the security of IoT systems is crucial due to their direct impact on human life. With the expansion of processing and communication capabilities to numerous devices, IoT has become a vast network where connectivity is ubiquitous. This paper focuses on the security issues of cloud-based IoT, specifically access control, network security, data security, and privacy, which are the four main components of cloud-based IoT. By analyzing and comparing existing research papers on security in cloud IoT and IoT in general, we identify proposed solutions. Most researchers have concentrated on a single component, while only a few have addressed two components. Consequently, our research aims to bridge the gap in Cloud IoT security by focusing on more than two components. We propose the utilization of methods such as Machine Learning and blockchain to enhance security, drawing on the strengths highlighted in previous works. Our future focus will involve exploring potential attacks in cloud IoT and developing a comprehensive method that encompasses atleast three security components of cloud IoT security.

KeywordsIoT-security; Blockchain; Cloud security; Access control; Privacy
Year2023
JournalJournal of Computer Science & Computational Mathematics
Journal citation13 (2)
PublisherSANDKRS
ISSN2231-8879
Digital Object Identifier (DOI)https://doi.org/10.20967/jcscm.2023.02.004
Official URLhttps://www.jcscm.net/cms/?action=showpaper&id=2268049
Publication dates
OnlineJun 2023
Publication process dates
Deposited19 Oct 2023
Publisher's version
License
File Access Level
Open
Permalink -

https://repository.canterbury.ac.uk/item/961qv/comprehensive-analysis-of-security-issues-in-cloud-based-internet-of-things-a-survey

Download files


Publisher's version
  • 70
    total views
  • 84
    total downloads
  • 2
    views this month
  • 0
    downloads this month

Export as

Related outputs

Data security and governance in multi-cloud computing environment
Yeboah-Ofori, Abel, Jafar, Alameen, Abisogun, Toluwaloju, Hilton, Ian, Oseni, Waheed and Musa, Ahmad 2024. Data security and governance in multi-cloud computing environment. 2024 11th International Conference on Future Internet of Things and Cloud (FiCloud). pp. 215-222. https://doi.org/10.1109/ficloud62933.2024.00040
Functional and performance analysis of discrete event network simulation tools
Musa, A. and Awan, I. 2022. Functional and performance analysis of discrete event network simulation tools. Simulation Modelling Practice and Theory. 116, p. 102470. https://doi.org/10.1016/j.simpat.2021.102470
The case for validating ADDIE model as a digital forensic model for peer to peer network investigation
Musa, A., Awan, I-U and Zarah, F. 2022. The case for validating ADDIE model as a digital forensic model for peer to peer network investigation. Information System Frontiers. https://doi.org/10.1007/s10796-022-10360-8
Machine learning for intrusion detection and network performance
Ibrahim Abobaker and Ahmad Musa 2021. Machine learning for intrusion detection and network performance. in: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud)
Efficacy of ADDIE model in peer-to-peer networks: Digital evidence investigation
Ahmad Musa, Irfan-Ullah Awan and Ibrahim Abobaker 2021. Efficacy of ADDIE model in peer-to-peer networks: Digital evidence investigation. in: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud) IEEE.
Self regulated learning in flipped classrooms: A systematic literature review
Rasheed Abubakar Rasheed, Amirrudin Kamsin, Nor Aniza Abdullah, Habeebah Adamu Kakudi, Auwal Shehu Ali, Ahmad Musa and Adamu Sani Yahaya 2020. Self regulated learning in flipped classrooms: A systematic literature review. International Journal of Information and Education Technology. 10 (11). https://doi.org/10.18178/ijiet.2020.10.11.1469
An investigation into peer-to-peer network security using Wireshark
Ahmad Musa, Aliyu Abubakar, Usman Abdul Gimba and Rasheed Abubakar Rasheed 2019. An investigation into peer-to-peer network security using Wireshark. in: 2019 15th International Conference on Electronics, Computer and Computation (ICECCO) IEEE.
Transfer learning based histopathologic image classification for burns recognition
Aliyu Abubakar, Hassan Ugail, Ali Maina Bukar, Ali Ahmad Aminu and Ahmad Musa 2019. Transfer learning based histopathologic image classification for burns recognition. in: 2019 15th International Conference on Electronics, Computer and Computation (ICECCO) IEEE.