{"id":"https://openalex.org/W4388893899","doi":"https://doi.org/10.1109/pais60821.2023.10322004","title":"Security Issues in Cloud-based IoT Systems","display_name":"Security Issues in Cloud-based IoT Systems","publication_year":2023,"publication_date":"2023-10-25","ids":{"openalex":"https://openalex.org/W4388893899","doi":"https://doi.org/10.1109/pais60821.2023.10322004"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/pais60821.2023.10322004","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093314664","display_name":"Rahma Berchi","orcid":null},"institutions":[{"id":"https://openalex.org/I40193446","display_name":"University Ferhat Abbas of Setif","ror":"https://ror.org/02rzqza52","country_code":"DZ","type":"education","lineage":["https://openalex.org/I40193446"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Rahma Berchi","raw_affiliation_strings":["University Ferhat Abbas Sétif 1,LRSD Laboratory, Faculty of Sciences,Sétif,Algeria"],"affiliations":[{"raw_affiliation_string":"University Ferhat Abbas Sétif 1,LRSD Laboratory, Faculty of Sciences,Sétif,Algeria","institution_ids":["https://openalex.org/I40193446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041596954","display_name":"Lemia Louail","orcid":"https://orcid.org/0000-0003-0598-3117"},"institutions":[{"id":"https://openalex.org/I90183372","display_name":"Universit\u00e9 de Lorraine","ror":"https://ror.org/04vfs2w97","country_code":"FR","type":"education","lineage":["https://openalex.org/I90183372"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Lemia Louail","raw_affiliation_strings":["Université de Lorraine, CNRS, CRAN,Nancy,France,F-54000"],"affiliations":[{"raw_affiliation_string":"Université de Lorraine, CNRS, CRAN,Nancy,France,F-54000","institution_ids":["https://openalex.org/I90183372","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070281252","display_name":"Sarra Cherbal","orcid":null},"institutions":[{"id":"https://openalex.org/I40193446","display_name":"University Ferhat Abbas of Setif","ror":"https://ror.org/02rzqza52","country_code":"DZ","type":"education","lineage":["https://openalex.org/I40193446"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Sarra Cherbal","raw_affiliation_strings":["University Ferhat Abbas Sétif 1,LRSD Laboratory, Faculty of Sciences,Sétif,Algeria"],"affiliations":[{"raw_affiliation_string":"University Ferhat Abbas Sétif 1,LRSD Laboratory, Faculty of Sciences,Sétif,Algeria","institution_ids":["https://openalex.org/I40193446"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.91,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.745318,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":67,"max":78},"biblio":{"volume":"160","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.9122397},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.73188204},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.69703525},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6534408},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5979392},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.59485674},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.52602655},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.45679808},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.32995844},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.12633881},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.10753709},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.087980956},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/pais60821.2023.10322004","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://hal.science/hal-04305018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":37,"referenced_works":["https://openalex.org/W2756488506","https://openalex.org/W2786099287","https://openalex.org/W2896120010","https://openalex.org/W2928717702","https://openalex.org/W2936630130","https://openalex.org/W2989802406","https://openalex.org/W3004171232","https://openalex.org/W3013197899","https://openalex.org/W3013536937","https://openalex.org/W3049097090","https://openalex.org/W3081624807","https://openalex.org/W3106015623","https://openalex.org/W3120136700","https://openalex.org/W3138269143","https://openalex.org/W3152701910","https://openalex.org/W3171772491","https://openalex.org/W3196743383","https://openalex.org/W3196811292","https://openalex.org/W3208936142","https://openalex.org/W3214214904","https://openalex.org/W4205955221","https://openalex.org/W4214588958","https://openalex.org/W4283789005","https://openalex.org/W4283835231","https://openalex.org/W4293580333","https://openalex.org/W4294187947","https://openalex.org/W4296350759","https://openalex.org/W4308244717","https://openalex.org/W4311786779","https://openalex.org/W4318499260","https://openalex.org/W4324093415","https://openalex.org/W4362571045","https://openalex.org/W4367598464","https://openalex.org/W4377292008","https://openalex.org/W4381301607","https://openalex.org/W4381663056","https://openalex.org/W4400468131"],"related_works":["https://openalex.org/W4401658540","https://openalex.org/W4205234238","https://openalex.org/W3167767780","https://openalex.org/W3148880067","https://openalex.org/W3142266060","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W2931996793","https://openalex.org/W2788934790","https://openalex.org/W1988660452"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,38,102],"has":[2],"transformed":[3],"the":[4,17,96],"IT":[5],"landscape":[6],"by":[7],"offering":[8],"benefits":[9],"like":[10],"scalability,":[11],"flexibility,":[12],"and":[13,49,59,67,84,98,114],"cost":[14],"reduction.":[15],"However,":[16],"security":[18,69],"challenges":[19,97],"in":[20,100],"cloud":[21,29,37,57,73,101,120],"environments":[22],"have":[23],"raised":[24],"concerns":[25,70],"for":[26],"organizations":[27,109],"adopting":[28],"services.":[30,121],"In":[31],"this":[32,79],"paper,":[33],"an":[34,61],"overview":[35],"of":[36,95],"is":[39,54],"provided,":[40],"including":[41],"its":[42],"main":[43],"characteristics,":[44],"deployment":[45],"models,":[46,48],"service":[47],"associated":[50,118],"benefits.":[51],"The":[52],"focus":[53],"on":[55],"categorizing":[56],"threats":[58],"proposing":[60],"improved":[62],"taxonomy":[63],"to":[64,72,90],"better":[65],"organize":[66],"classify":[68],"specific":[71],"computing.":[74],"Through":[75],"a":[76,91],"literature":[77],"survey,":[78],"research":[80],"presents":[81],"detailed":[82],"findings":[83],"analyses":[85],"from":[86],"relevant":[87],"papers,":[88],"contributing":[89],"more":[92],"comprehensive":[93],"understanding":[94,113],"solutions":[99],"security.":[103],"By":[104],"addressing":[105],"these":[106],"knowledge":[107],"gaps,":[108],"can":[110],"enhance":[111],"their":[112],"effectively":[115],"mitigate":[116],"risks":[117],"with":[119]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4388893899","counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-01-04T14:28:56.126645","created_date":"2023-11-23"}