Abstract

Cloud Computing (CC) is a promising technology due to its pervasive features, such as online storage, high scalability, and seamless accessibility, in that it plays an important role in reduction of the capital cost and workforce, which attracts organizations to conduct their businesses and financial activities over the cloud. Even though CC is a great innovation in the aspect of computing with ease of access, it also has some drawbacks. With the increase of cloud usage, security issues are proportional to the increase. To address these, there has been much work done in this domain, whereas research work considering the growing constrained applications provided by the Internet of Things (IoT) and smart city networks are still lacking. In this survey, we provide a comprehensive security analysis of CC-enabled IoT and present state-of-the-art in the research area. Finally, future research work and possible areas of implementation and consideration are given to discuss open issues.

Highlights

  • Introduction published maps and institutional affilWith the introduction of the Internet of Things (IoT), every object is connected to the Internet to provide diverse types of services, like resource management, scalability, elasticity, power management, data storage, etc

  • In Reference [91], the author argues on the three potential threats to personal privacy that have been posed by smart cities: IoT, big data, and cloud

  • The authors in this paper have provided a solution of self-protection against insider attacks through the implementation of policies

Read more

Summary

A Survey on Modern Cloud Computing Security over Smart

City Networks: Threats, Vulnerabilities, Consequences, Countermeasures, and Challenges. Abeer Iftikhar Tahirkheli 1 , Muhammad Shiraz 2 , Bashir Hayat 3 , Muhammad Idrees 4 , Ahthasham Sajid 5 , Rahat Ullah 6 , Nasir Ayub 2 and Ki-Il Kim 7, *.

Related Work and Concepts
Taxonomy Diagram
CC Security
Countermeasures against Security Threats and Attacks
CC Security Prospects in the Future Networks
Tabular Analysis and Methodology Representations
Open Issues
Findings
Conclusions and Recommendations
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call