MITS5004 Cyber-Storms Come from Clouds – Security of Cloud Computing in the IoT Era


The article is based on analyzing the Internet of Things which is increasingly spreading in the current society with the guarantee of rising competence and develops connection. IoT is that method which helps in monitor and manages the house temperature, possible leakages and different parameters related to the house (Muratova, 2020). It is mainly used to monitor and manage the systems and drug management in a better manner. From the security point of view, this plethora of IoT tool is flooding in the world with a wonderful penalty so that it is not overstatement about the privacy tragedy and safety measures. Currently, IoT is relay on the cloud system and this device is helpful in collect and store necessary data of an organization.

Related work

In this part, article review accurate works associated with the research and describe how the involvement extends. In this, there are different researcher groups concentrate on recognizing the security and privacy issues in cloud computing. It is important for all the businesses is to focus on maintaining security challenges that may create a major impact on their growth and performance level (Alhaidari, et. al., 2020).

Cloud Computing Paradigm

In current time, cloud computing is also known as a paradigm. Clod computing defines as the model which allow suitable, on-demand network access to the communal collection of configurable computing resources that can quickly free with minimum administration attempt or facilities contributor interface. There are main five actors of cloud computing such as provider, consumer, broker, carrier and auditor. Cloud computing has various features which include resource pooling, service measurement, provide a wide network to users, easily share and store important data and information (Butt, et. al., 2020).


In this section, the article introduces the methodology which is adopted to categorize the security issues and challenges. Cloud computing is a difficult computing paradigm in the current period. To achieve this goal, it introduces a simplified architecture of cloud communications that is depicted and described. Such architecture is a concept of architecture projected and simplifies to such degree in which cloud computing is measured as the main four layers such as physical, application, data storage and virtualization layer (Zhao, et. al., 2020). This help analyzes and examines the activities which are taken into account and evaluate safety issues which may create a negative impact on business.

Cloud-Specific Security Issues

Cloud security is very important for the data and information to be secured from any kind of threats and frauds which are specific to the cloud security issues. The confidentiality is the cloud-specific security issue which involves the issues of unauthorised access to the cloud computing facilities which is a threat to cloud computing when there is no confidentiality for the information. Integrity is another cloud-specific security issue in which the information in the cloud computing is not referred as integrated and reliable to be trusted upon due to the cloud security which can be breached to disturb the integrity of the information being stored in the cloud platforms (Abawajy, et. al., 2017). There are many multiple levels of security issues which are specific to the cloud security of the information and data collected on the cloud platforms. The availability of the cloud delivering, processing and storing of the information is very much required. This issue creates problems in the availability of the cloud information for the authorized users for accessing or modification of the data or information by the authorized users in the cloud security.
There are various kinds of security issues present in the cloud computing field which are specific to the cloud such as data breaching by the unauthorized users, malware injection by the foreign users, insiders threats in which the insiders attack the data and information of the cloud, hijacking of accounts of users by the hackers or other threatening organisations for the motive of accessing the data or information by unauthorized actions (Dang, et. al., 2019). The cloud-specific security issues are the main threat for the fraud or accessing of information by unauthorized access which is problematic for cloud security. This can create issues for the authorized users and security breach will be done by these actions. The issues are a threat to the security of the data and information collected in the cloud-based services which are required to be safe and secure for the access of information on large databases by the users. The cloud-specific security issues are not the general issues which come across using data storing applications but they are specific for the cloud-based services which threats and fraudulent activities are being done to access data and information through unauthorized users to modify or enhance the information for their benefit. This creates redundancy and integrity issues in the data and information which is big issues for cloud-based services.

Generic Security Issues

The network level and web technologies issues are the issues which are considered as generic security issues. The availability, integrity and confidentiality of the data and information should be kept for the security purposes of the generic security issues. The issues like data breaching, malicious inside activities, hijack accounts of authorised users, DDoS attacks, and human errors are the most common generic security issues which can create troubles in the cloud-based services all along for the authorised users to create modification and trouble for the data and information by the unauthorised users (Elhoseny, et. al., 2018). The integrity, confidentiality and availability approaches will be compromised and this will create security issues for the authorised users where their data and information will be modified under hackers operations and data and information will no longer remain confidential.
The cloud services based stored data and information need to be secured from the unidentified access of data and information which can create security issues. Authentication processes should be imposed for accessing and modification of the data and information on the cloud-based services to prevent the security integration and issues like breaching and data loss will be mitigated by the security services of the cloud. The cloud computing is highly vulnerable for the security purposes of the data and information where the data and information are more prone to getting attacked by the hijackers or maliciousness of insiders of the organisation. The generic security issues can create a situation for the conditions of the data and information theft from the cloud servers who are unauthorised users (Darwish, et. al., 2019). This is a breach in the security. The security issues like this need to be confined by the cloud-based services which create security issues for the authorized users of the cloud-based services which are important for their business.

IoT Security Issues

IoT pervades more factors of life and it mainly involves two forms of smart attached devices and substance. In this section of the article, it discusses the set of security issues that are based on the IoT system. For each problem, the company needs to develop a solution and this risk can be mitigated properly. It has been analyzed that most of the IoT products are purchased at the initial level of security (Dinh, et. al., 2017). To resolve such issues, the author projected blockchain-based confidentiality preserve software that helps in a deal with the required problem in a better manner. There are large numbers of IoT devices which are free with default passwords and poor security methods and make them simple malware. The author also proposes three major approaches that are collected and devise the data and it provides different level which shows the visibility into IoT device performance. It is important for the company is to focus on deal with such issues and manage these challenges by using effective technology such as blockchain.
This will help in storing and collecting required data that are required for the functioning and management of business operations. IoT technology helps in collecting and gathering necessary data without face any issue (Xia, et. al., 2016). Due to the different issues related to IoT security and privacy management of such information, how IoT method are developed and managed effectively. But sometimes it develops rich ground for entire functions and activities that main seek is to creating use of susceptible and therefore hazardous for both confidentiality and security of users. Such aspect unlocks various investigation challenges in regards to systems in which cloud computing and IoT are similar to each other. The authors deliver a solution for both of the system and it helps in maintaining the safety of all the data and other information.

Conclusions and Future Work

According to this article, it has been concluded that security of cloud computing is considered as a core element of the IoT architecture. Both the IoT and cloud computing are related to each other and this help provides security and safety to the important data related to customers and organization. It is a useful device that is helpful in kept safe all the data and information which is important for smoothly run of business operation and its functions.


Abawajy, J.H. and Hassan, M.M., 2017. Federated internet of things and cloud computing pervasive patient health monitoring system. IEEE Communications Magazine, 55(1), pp.48-53.
Alhaidari, F., Rahman, A. and Zagrouba, R., 2020. Cloud of Things: architecture, applications and challenges. Journal of Ambient Intelligence and Humanized Computing, pp.1-19.
Butt, U.A., Mehmood, M., Shah, S.B.H., Amin, R., Shaukat, M.W., Raza, S.M., Suh, D.Y. and Piran, M., 2020. A Review of Machine Learning Algorithms for Cloud Computing Security. Electronics, 9(9), p.1379.
Dang, L.M., Piran, M., Han, D., Min, K. and Moon, H., 2019. A survey on internet of things and cloud computing for healthcare. Electronics, 8(7), p.768.
Darwish, A., Hassanien, A.E., Elhoseny, M., Sangaiah, A.K. and Muhammad, K., 2019. The impact of the hybrid platform of the internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. Journal of Ambient Intelligence and Humanized Computing, 10(10), pp.4151-4166.
Dinh, T., Kim, Y. and Lee, H., 2017. A location-based interactive model of internet of things and cloud (IoT-Cloud) for mobile cloud computing applications. Sensors, 17(3), p.489.
Elhoseny, M., Abdelaziz, A., Salama, A.S., Riad, A.M., Muhammad, K. and Sangaiah, A.K., 2018. A hybrid model of internet of things and cloud computing to manage big data in health services applications. Future generation computer systems, 86, pp.1383-1394.
Muratova, P., 2020. Maintenance of data security in the cloud. Язык в сфере профессиональной коммуникации.—Екатеринбург, 2020, pp.574-577.
Xia, M., Li, T., Zhang, Y. and De Silva, C.W., 2016. Closed-loop design evolution of engineering system using condition monitoring through internet of things and cloud computing. Computer Networks, 101, pp.5-18.
Zhao, S., Li, S., Qi, L. and Da Xu, L., 2020. Computational intelligence enabled cybersecurity for the internet of things. IEEE Transactions on Emerging Topics in Computational Intelligence.