{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:33:21Z","timestamp":1703032401931},"reference-count":127,"publisher":"IGI Global","issue":"1","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"abstract":"

The integration of IoT and cloud poses increased security challenges. Implementing security mechanisms in IoT systems is challenging due to the availability of limited resources, large number of devices, heterogeneity of devices, generation of bulk data, etc. Likewise, cloud resources are also vulnerable to security issues due to virtualization, insider threats, data loss, data breaches, insecure APIs, etc. Security is of major concern with the integration of IoT and cloud. The primary objective of this review is to highlight the security issues associated with an IoT system and cloud system and with the integration of the two, as well as to highlight solutions in each case. The secondary objective is to describe popular IoT-cloud platforms and also to highlight how such platforms facilitate secure integration. Ultimately a highlight on a shared responsibility model of implementing security is emphasized as both IoT users and cloud service providers have to cooperatively share the responsibility to deploy secure cloud-based IoT applications.<\/p>","DOI":"10.4018\/ijcac.325624","type":"journal-article","created":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T16:19:49Z","timestamp":1689005989000},"page":"1-30","source":"Crossref","is-referenced-by-count":2,"title":["Integration of the Internet of Things and Cloud"],"prefix":"10.4018","volume":"13","author":[{"given":"Chellammal","family":"Surianarayanan","sequence":"first","affiliation":[{"name":"Centre for Distance and Online Education, Bharathidasan University, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5220-0408","authenticated-orcid":true,"given":"Pethuru Raj","family":"Chelliah","sequence":"additional","affiliation":[{"name":"Reliance Jio Pvt. Ltd., India"}]}],"member":"2432","reference":[{"key":"IJCAC.325624-0","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080650"},{"key":"IJCAC.325624-1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.285"},{"key":"IJCAC.325624-2","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110743"},{"key":"IJCAC.325624-3","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04874-y"},{"key":"IJCAC.325624-4","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11010016"},{"key":"IJCAC.325624-5","doi-asserted-by":"publisher","DOI":"10.3390\/s21155122"},{"key":"IJCAC.325624-6","doi-asserted-by":"publisher","DOI":"10.4108\/eetss.v8i30.590"},{"key":"IJCAC.325624-7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMIC.2014.6954232"},{"key":"IJCAC.325624-8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988293"},{"key":"IJCAC.325624-9","article-title":"A reliable communication framework and its use in Internet of Things (IoT). CSEIT1835111, 3(5), 450-456.","author":"T.Alam","year":"2018"},{"key":"IJCAC.325624-10","doi-asserted-by":"publisher","DOI":"10.3390\/smartcities4030064"},{"key":"IJCAC.325624-11","doi-asserted-by":"publisher","DOI":"10.3390\/app11199005"},{"key":"IJCAC.325624-12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918101"},{"key":"IJCAC.325624-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107706"},{"key":"IJCAC.325624-14","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2018.8364068"},{"key":"IJCAC.325624-15","doi-asserted-by":"publisher","DOI":"10.1109\/ICAEM.2018.8536261"},{"key":"IJCAC.325624-16","doi-asserted-by":"crossref","unstructured":"Almolhis, N., Alashjaee, A. M., Duraibi, S., Alqahtani, F. A., & Moussa, A. N. (2020). The security issues in IoT - cloud: A review. 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), (pp. 191-196). IEEE.","DOI":"10.1109\/CSPA48992.2020.9068693"},{"key":"IJCAC.325624-17","unstructured":"Amazon Web Services. (n.d.). AWS IoT device defender. Amazon web services. https:\/\/aws.amazon.com\/iot-device-defender\/"},{"key":"IJCAC.325624-18","unstructured":"Asghar, M., & Amjad, A. (2018). Securing insecure web API's in cloud computing. Mitteilungen Klosterneuburg, 68."},{"key":"IJCAC.325624-19","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.105"},{"key":"IJCAC.325624-20","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5533843"},{"key":"IJCAC.325624-21","unstructured":"Bernsmed, K., Jaatun, M. G., & Undheim, A. (2011). Security in service level agreements for cloud computing. In CLOSER 2011 - Proceedings of the 1st International Conference on Cloud Computing and Services Science, (pp. 555-560). IEEE."},{"key":"IJCAC.325624-22","doi-asserted-by":"publisher","DOI":"10.1145\/3333165.3333169"},{"key":"IJCAC.325624-23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMST54943.2021.00018"},{"key":"IJCAC.325624-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.021"},{"key":"IJCAC.325624-25","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-09960-z"},{"key":"IJCAC.325624-26","doi-asserted-by":"publisher","DOI":"10.1145\/3447625"},{"key":"IJCAC.325624-27","doi-asserted-by":"publisher","DOI":"10.32629\/jai.v1i2.25"},{"key":"IJCAC.325624-28","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01241-0"},{"key":"IJCAC.325624-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.11.027"},{"key":"IJCAC.325624-30","doi-asserted-by":"publisher","DOI":"10.1002\/int.23032"},{"key":"IJCAC.325624-31","first-page":"5159","article-title":"The security concerns and solutions for cloud-based IoT system.","volume":"100","author":"M.Deore","year":"2022","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"IJCAC.325624-32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922196"},{"key":"IJCAC.325624-33","doi-asserted-by":"publisher","DOI":"10.3390\/fi11030082"},{"key":"IJCAC.325624-34","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7579021"},{"key":"IJCAC.325624-35","doi-asserted-by":"publisher","DOI":"10.1109\/CSE-EUC.2017.101"},{"key":"IJCAC.325624-36","unstructured":"Finsliq Blog. (n.d.). PaaS security issues in cloud computing. Finsliq Blog. https:\/\/www.finsliqblog.com\/paas-security-issues-in-cloud-computing\/"},{"key":"IJCAC.325624-37","doi-asserted-by":"publisher","DOI":"10.3390\/s22062196"},{"key":"IJCAC.325624-38","unstructured":"FutureLearn. (n.d.). Steps - Key topics in digital transformation. FutureLearn. https:\/\/www.futurelearn.com\/info\/courses\/key-topics-in-digital-transformation\/0\/steps\/257345"},{"key":"IJCAC.325624-39","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSCI.285593"},{"key":"IJCAC.325624-40","unstructured":"Google Cloud. (n.d.). Overview of Google Cloud IoT Core. Google Cloud. https:\/\/cloud.google.com\/iot\/docs\/concepts\/overview"},{"key":"IJCAC.325624-41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSDET.2018.8821160"},{"key":"IJCAC.325624-42","first-page":"1","article-title":"An integrated BIM-IoT approach to support energy monitoring.","author":"C. G.Guida","year":"2021","journal-title":"International Conference on Smart Systems and Advanced Computing (Syscom-2021)"},{"key":"IJCAC.325624-43","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.05.038"},{"key":"IJCAC.325624-44","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322603"},{"key":"IJCAC.325624-45","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-021-08436-x"},{"key":"IJCAC.325624-46","doi-asserted-by":"publisher","DOI":"10.1186\/1869-0238-4-5"},{"key":"IJCAC.325624-47","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.10.078"},{"key":"IJCAC.325624-48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"IJCAC.325624-49","doi-asserted-by":"publisher","DOI":"10.3390\/s20082378"},{"key":"IJCAC.325624-50","doi-asserted-by":"publisher","DOI":"10.3390\/app12083953"},{"key":"IJCAC.325624-51","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2016.03.001"},{"key":"IJCAC.325624-52","unstructured":"IBM. (2021). Overview of the architecture. IBM Knowledge Center. https:\/\/www.ibm.com\/docs\/en\/wip-mg\/5.0.0.1?topic=overview-architecture"},{"key":"IJCAC.325624-53","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2021.1031.1045"},{"key":"IJCAC.325624-54","unstructured":"Info Q. (2019, August 16). Azure security center for IoT reaches general availability. InfoQ. https:\/\/www.infoq.com\/news\/2019\/08\/azure-security-center-iot-ga\/"},{"key":"IJCAC.325624-55","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2019.0447"},{"key":"IJCAC.325624-56","unstructured":"ISACA. (2022). SaaS security risk and challenges. ISACA. https:\/\/www.isaca.org\/resources\/news-and-trends\/industry-news\/2022\/saas-security-risk-and-challenges"},{"key":"IJCAC.325624-57","unstructured":"Islam, T., Manivannan, D., & Zeadally, S. (2016). A classification and characterization of security threats in cloud computing. International Journal of Next-Generation Computing, 7."},{"key":"IJCAC.325624-58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3109886"},{"key":"IJCAC.325624-59","doi-asserted-by":"publisher","DOI":"10.1016\/j.gltp.2021.08.045"},{"issue":"12","key":"IJCAC.325624-60","article-title":"Identification and prioritization of security challenges of big data on cloud computing based on SLR: A fuzzy-TOPSIS analysis approach.","volume":"33","author":"A. W.Khan","year":"2021","journal-title":"Software, Practice & Experience"},{"key":"IJCAC.325624-61","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.297094"},{"key":"IJCAC.325624-62","doi-asserted-by":"publisher","DOI":"10.1109\/ICM.2016.7847850"},{"key":"IJCAC.325624-63","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-59749-645-2.00011-2"},{"key":"IJCAC.325624-64","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058318"},{"key":"IJCAC.325624-65","unstructured":"LearnIoT. (n.d.). Cisco IoT security framework. LearnIoT. https:\/\/www.learniot.com\/cisco-iot-security-framework\/"},{"key":"IJCAC.325624-66","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2017.51010"},{"key":"IJCAC.325624-67","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.323804"},{"key":"IJCAC.325624-68","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890432"},{"key":"IJCAC.325624-69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2499271"},{"issue":"5","key":"IJCAC.325624-70","article-title":"Remote monitoring of IoT device: Cloud computing & IoT.","volume":"8","author":"H.Lineswala","year":"2020","journal-title":"International Journal of Engineering Research & Technology (Ahmedabad)"},{"key":"IJCAC.325624-71","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"IJCAC.325624-72","article-title":"Effective use of embedded platforms in the development of experiments for enhancing the interests of STEAM students in Mexico","author":"A.Mercado Herrera","year":"2023","journal-title":"Technology integration and transformation in STEM classrooms"},{"key":"IJCAC.325624-73","doi-asserted-by":"publisher","DOI":"10.1109\/SDS49854.2020.9143903"},{"key":"IJCAC.325624-74","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6353-9_46"},{"key":"IJCAC.325624-75","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS49469.2020.239563"},{"key":"IJCAC.325624-76","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2020.11.283"},{"key":"IJCAC.325624-77","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2022.100805"},{"key":"IJCAC.325624-78","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"IJCAC.325624-79","first-page":"1","article-title":"Analyzing and eliminating phishing threats in IoT, network and other web applications using iterative intersection.","author":"K.Nirmal","year":"2020","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"IJCAC.325624-80","first-page":"169","article-title":"Detection and prevention of man-in-the-middle attack in IoT network using regression modeling.","author":"S.Nitiynandan","year":"2022","journal-title":"Advances in Engineering Software"},{"key":"IJCAC.325624-81","doi-asserted-by":"publisher","DOI":"10.2478\/bsaft-2022-0007"},{"key":"IJCAC.325624-82","doi-asserted-by":"publisher","DOI":"10.3390\/s20205897"},{"key":"IJCAC.325624-83","unstructured":"Peerbits. (2023). Biggest IoT Security Challenges. Peerbits. https:\/\/www.peerbits.com\/blog\/biggest-iot-security-challenges.html"},{"key":"IJCAC.325624-84","unstructured":"Prakash, V., Xie, S., & Huang, D. Y. (2022). Software update practices on smart home IoT devices. https:\/\/arxiv.org\/pdf\/2208.14367.pdf"},{"key":"IJCAC.325624-85","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169481"},{"key":"IJCAC.325624-86","doi-asserted-by":"publisher","DOI":"10.1109\/CISCT.2019.8777438"},{"key":"IJCAC.325624-87","unstructured":"QuickHeal. (2019). Android-based IoT devices open ADB port, inviting easy attacks, crypto-miners. Quick Heal Blogs. https:\/\/blogs.quickheal.com\/android-based-iot-devices-open-adb-port-inviting-easy-attacks-crypto-miners\/"},{"key":"IJCAC.325624-88","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.091131"},{"key":"IJCAC.325624-89","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.300824"},{"key":"IJCAC.325624-90","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2021040105"},{"key":"IJCAC.325624-91","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126193"},{"key":"IJCAC.325624-92","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-5040-3.ch011"},{"key":"IJCAC.325624-93","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-017-0098-8"},{"key":"IJCAC.325624-94","doi-asserted-by":"publisher","DOI":"10.1016\/j.fcij.2017.02.001"},{"key":"IJCAC.325624-95","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.026"},{"key":"IJCAC.325624-96","author":"B.Russell","year":"2015","journal-title":"Security guidance for early adopters of the Internet of Things (IoT); Mobile working group peer reviewed document"},{"key":"IJCAC.325624-97","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.091147"},{"key":"IJCAC.325624-98","doi-asserted-by":"publisher","DOI":"10.3390\/s22197433"},{"key":"IJCAC.325624-99","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4943225"},{"key":"IJCAC.325624-100","doi-asserted-by":"publisher","DOI":"10.1109\/BigData55660.2022.10020355"},{"key":"IJCAC.325624-101","doi-asserted-by":"publisher","DOI":"10.36548\/jismac.2022.2.002"},{"key":"IJCAC.325624-102","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03733-w"},{"key":"IJCAC.325624-103","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2959025"},{"key":"IJCAC.325624-104","doi-asserted-by":"publisher","DOI":"10.3390\/app13020758"},{"key":"IJCAC.325624-105","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.317220"},{"key":"IJCAC.325624-106","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058395"},{"key":"IJCAC.325624-107","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046754"},{"key":"IJCAC.325624-108","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151022"},{"key":"IJCAC.325624-109","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-019-00294-x"},{"key":"IJCAC.325624-110","doi-asserted-by":"publisher","DOI":"10.3390\/app10124102"},{"key":"IJCAC.325624-111","unstructured":"TechTarget. (n.d.). Cloud workload protection platform security benefits and features. Tech Target.. https:\/\/www.techtarget.com\/searchsecurity\/tip\/Cloud-workload-protection-platform-security-benefits-features"},{"key":"IJCAC.325624-112","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.306260"},{"key":"IJCAC.325624-113","doi-asserted-by":"publisher","DOI":"10.13052\/jsn2445-9739.2017.003"},{"key":"IJCAC.325624-114","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2015.23"},{"key":"IJCAC.325624-115","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.36"},{"key":"IJCAC.325624-116","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.07.335"},{"key":"IJCAC.325624-117","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"IJCAC.325624-118","doi-asserted-by":"publisher","DOI":"10.3390\/su142416842"},{"key":"IJCAC.325624-119","doi-asserted-by":"publisher","DOI":"10.3390\/fi9020020"},{"key":"IJCAC.325624-120","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2883403"},{"key":"IJCAC.325624-121","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881447"},{"key":"IJCAC.325624-122","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2021.3128775"},{"key":"IJCAC.325624-123","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"IJCAC.325624-124","unstructured":"Yasrab, R. (2018). MPSM: Multi-prospective PaaS security model. arXiv preprint arXiv:1804.04731 [cs.CR]."},{"key":"IJCAC.325624-125","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600363CM"},{"key":"IJCAC.325624-126","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.08.038"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=325624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T10:04:10Z","timestamp":1699956250000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCAC.325624"}},"subtitle":["Security Challenges and Solutions \u2013 A Review"],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":127,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.325624","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,10]]}}}