Abstract
The Internet of Things (IoT) has become a rising and dynamic research area. It is the integration of numerous objects (things) to communicate information without human beings' intervention. Inappropriately, because of the qualities resource-constrained and limited communication range, it significantly relies upon the Cloud as outsourcing to store and compute the data. This reconciliation of IoT with the Cloud has brought new issues and poses difficulties regarding protection and security threats. The necessity for the wide arrangement of cloud-based IoT is rapidly expanding with significant security-related issues. This work plots existing security methodologies and vulnerabilities near to a portion of the current security strategies by a total review of existing work in the field of security in cloud-based IoT. This paper concentrated on security and protection in terms of privacy by investigating some potential difficulties and risks that should be resolved. The Cloud of Things (CoT) architectures and present applications have been explored and focused on the middleware layer's attacks. Furthermore, this paper outlines a concise scientific classification of the current security threats in cloudbased IoT, plans, and communication. Finally, a few captivating open issues are given with promising designs to trigger more research community research attempts.
Keywords: IoT, cloud computing, cloud-based IoT, security issues, attacks, communication.
Graphical Abstract
[http://dx.doi.org/10.1109/JIOT.2019.2897063]
[http://dx.doi.org/10.1109/JIOT.2019.2896749]
[http://dx.doi.org/10.1109/CLOUD.2013.20]
[http://dx.doi.org/10.1109/ACCESS.2018.2890432]
[http://dx.doi.org/10.18196/jrc.1427]
[http://dx.doi.org/10.1007/978-981-15-0694-9_12]
[http://dx.doi.org/10.1007/978-3-030-16450-8_11]
[http://dx.doi.org/10.1016/j.comcom.2019.12.015]
[http://dx.doi.org/10.1109/TCCN.2020.2990657]
[http://dx.doi.org/10.46586/tches.v2020.i1.321-347]
[http://dx.doi.org/10.1016/j.sigpro.2019.107286]
[http://dx.doi.org/10.1016/j.cose.2019.101679]
[http://dx.doi.org/10.1002/cpe.4978]
[http://dx.doi.org/10.1007/978-3-642-00843-6_2]
[http://dx.doi.org/10.1109/COMPSAC.2017.156]
[http://dx.doi.org/10.1109/MNET.2019.1800225]
[http://dx.doi.org/10.1016/j.jisa.2017.01.003]
[http://dx.doi.org/10.1109/CSCloud.2017.62]
[http://dx.doi.org/10.1007/s11227-017-2083-x]
[http://dx.doi.org/10.1109/TETC.2016.2606384]
[http://dx.doi.org/10.1016/j.clsr.2015.12.001]
[http://dx.doi.org/10.1016/j.jss.2012.12.025]
[http://dx.doi.org/10.1016/j.jnca.2016.09.002]
[http://dx.doi.org/10.1109/COMPSAC.2016.168]
[http://dx.doi.org/10.1109/JIOT.2017.2683200]
[http://dx.doi.org/10.1016/j.jnca.2016.11.027]
[http://dx.doi.org/10.1109/JIOT.2017.2694844]
[http://dx.doi.org/10.1109/MCOM.2017.1600363CM]
[http://dx.doi.org/10.1016/j.future.2013.01.010]
[http://dx.doi.org/10.1145/3229565.3229567]
[http://dx.doi.org/10.1016/j.future.2018.04.033]
[http://dx.doi.org/10.1007/s40815-017-0347-5]
[http://dx.doi.org/10.1109/COMST.2018.2862350]
[http://dx.doi.org/10.1109/ACCESS.2018.2880838]
[http://dx.doi.org/10.1109/ACCESS.2019.2924045]
[http://dx.doi.org/10.1016/j.jnca.2019.102496]
[http://dx.doi.org/10.1109/GCWCN.2018.8668635]
[http://dx.doi.org/10.1109/ACCESS.2019.2932438]
[http://dx.doi.org/10.1007/978-981-15-0324-5_37]
[http://dx.doi.org/10.1016/j.future.2016.11.031]
[http://dx.doi.org/10.1007/978-3-030-15334-2_10]
[http://dx.doi.org/10.1093/sleep/zsaa001] [PMID: 31930318]
[http://dx.doi.org/10.1016/j.comcom.2019.11.048]
[http://dx.doi.org/10.1080/23335777.2020.1716268]
[http://dx.doi.org/10.4018/IJISP.2020040102]
[http://dx.doi.org/10.1016/j.ress.2020.106790]
[http://dx.doi.org/10.1002/ett.3677]
[http://dx.doi.org/10.1007/978-981-15-0694-9_12]
[http://dx.doi.org/10.1007/978-3-030-16450-8_11]
[http://dx.doi.org/10.1109/ICCCNT45670.2019.8944879]
[http://dx.doi.org/10.1016/j.simpat.2019.101984]
[http://dx.doi.org/10.1016/j.comcom.2020.02.025]
[http://dx.doi.org/10.1016/j.aquaeng.2020.102067]
[http://dx.doi.org/10.1016/j.comnet.2014.02.022]
[http://dx.doi.org/10.1109/CloudCom.2013.142]
[http://dx.doi.org/10.1155/2018/5603518]
[http://dx.doi.org/10.1016/j.future.2019.10.043]