Open Access Open Access  Restricted Access Subscription or Fee Access

IoT-Cloud Service Security and Privacy: Integration and Consolidation

(*) Corresponding author

Authors' affiliations



Advances in technology have led to the rapid development of the Internet and the emergence of the Internet of Things. In the Internet of Thing, data storage and transmission need privacy protection. In addition, the Internet of Things needs cloud services in storing, transferring and managing data. Therefore, it is crucial that the cloud is also secure. To that end, this paper explores a three-layered IoT conceptual model in conjunction with the elements of cloud computing security and privacy for IoT components, and protection of stored and transmitted data. More specifically, a three-layered model is proposed that maps to cloud computing security and privacy requirements as: (1) perception layer for accessing to cloud, (2) transport layer for device identification, and (3) application layer for cloud data.
Copyright © 2021 Praise Worthy Prize - All rights reserved.


IoT; Cloud; Security; Public Cloud; Hybrid Cloud; Privacy

Full Text:



H.E. Samra, S. Li. Alice, B. Soh, M. A. AlZain, A Conceptual Model for Cloud-Based E-Training in Nursing Education, Knowledge-Intensive Economies and Opportunities for Social, Organizational, and Technological Growth. 2019, pp. 295-310.

K.S. Yeo, M. C. Chian, T. C. Wee, D. Tuan Internet of Things: Trends, challenges and applications. In 2014 International Symposium on Integrated Circuits (ISIC). 10-12 Dec., 2014, Singapore, Singapore

J.P. Nzabahimana, Analysis of security and privacy challenges in Internet of Things. The 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 24-27 May, 2018, Kyiv • Ukraine

C. Li and B. Palanisamy, Privacy in Internet of Things: From Principles to Technologies. IEEE Internet of Things Journal, vol. 6, n. 1, 2019, p. 488-505.

G.K. Sodhi, G. S. Gaba, L. Kansal, et al., Preserving Authenticity and Integrity of Distributed Networks through Novel Message Authentication Code. Indonesian Journal of Electrical Engineering and Computer Science, vol. 12, n. 3, 2018, pp. 1297-1304.

J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, Twenty Security Considerations for Cloud-Supported Internet of Things. IEEE Internet of Things Journal, vol. 3, n. 3, 2016, pp. 269-284.

R. Djouani, K. Djouani,F. Boutekkouk,R. Sahbi, A Security Proposal for IoT integrated with SDN and Cloud. The 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), 16-19 Oct., 2018, Marrakesh, Morocco.

H. Samra, A. Li, B. Soh, M. Al. Zain, Utilisation of hospital information systems for medical research in Saudi Arabia: A mixed-method exploration of the views of healthcare and IT professionals involved in hospital database management systems. Health Information Management Journal, vol. 49, n. 2, 2019, pp. 117-126.

S.A Alsaif, From Learning Management Systems to a Social Learning Environment: A Comparative Review and the Implications. International Journal of Smart Education and Urban Society (IJSEUS), 2019. 10(1): p. 1-18.

J. Singh, J. Bacon, J. Crowcroft, A. Madhavapeddy, et al., Regional clouds: technical considerations. 2014.

M. Masud and M.S. Hossain, Secure data-exchange protocol in a cloud-based collaborative health care environment, Multimedia Tools and Applications, vol. 77, 2018, pp. 11121-11135.

S. Bhatt, F. Patwa, and R. Sandhu. An Access Control Framework for Cloud-Enabled Wearable Internet of Things, The 3rd IEEE International Conference on Collaboration and Internet Computing (CIC), Oct. 15-16, 2017, San Jose, California, USA

O.S. Faragallah, Efficiently Encrypting Color Images with Few Details based on RC6 and Different Operation Modes for Cybersecurity Applications, IEEE Access, vol. 8, n. 1, 2020.

R.K. Alqurashi, Cyber Attacks and Impacts: A Case Study in Saudi Arabia. International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, n. 1, 2020.

L. Alhathally, Cyber security Attacks: Exploiting weaknesses. International Journal of Recent Technology and Engineering, vol. 8, n. 5, 2020.

S. Alraddady, Deployment of Fog Computing During Hajj Season: A Proposed Framework. Procedia Computer Science, vol. 161, 2019, pp. 1072-1079.

A. Davis, J. Parikh, and W.E. Weihl. Edgecomputing: extending enterprise applications to the edge of the internet. The 13th international World Wide Web conference on Alternate track papers & posters, 2004, New York, USA.

AlZain, M.A., B. Soh, and E. Pardede, A survey on data security issues in cloud computing: From single to multi-clouds. Journal of Software, vol. 8, n. 5, 2013, pp. 1068-1078.

M.A. AlZain, Byzantine Fault-Tolerant Architecture in Cloud Data Management. International Journal of Knowledge Society Research (IJKSR), vol. 7, n. 3. 2016, pp. 86-98.

B.O. Al-Amri A Comprehensive Study of Privacy Preserving Techniques in Cloud Computing Environment. Advances in Science, Technology and Engineering Systems Journal, vol 5, n. 2, 2020, pp. 419-424.

A.F. Altwairqi, M.A. AlZain, M. Masud, J. Al-Amri, and B. Soh, Four Most Famous Cyber Attacks for Financial Gains. International Journal of Engineering and Advanced Technology, vol. 9, n. 2, 2019.

M.A. Alotaibi, Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection. International Journal of Communication Networks and Information Security, vol. 11, n. 3, 2019, pp. 424-431.

M.A. AlZain, A.S. Li, and B. Soh Managing Multi-Cloud Data Dependability Faults, Knowledge-Intensive Economies and Opportunities for Social, Organizational, and Technological Growth. 2019, pp. 295-310.

X. Weiquan and W. Houkui. The Design Research of Data Security Model Based on Public Cloud. The 9th International Conference on Computational Intelligence and Security, Dec. 14-15, 2013, Newark NJ USA.

P. Mell and T. Grance, The NIST definition of cloud computing. NIST, 2011.

M.A. AlZain, Cloud computing security: from single to multi-clouds. The 45th Hawaii International Conference on System Sciences, Jan. 4-7, 2012, Maui, Hawaii USA, United States.

J. Park, Approach for Cloud Recommendation and Integration to Construct User-Centric Hybrid Cloud. The 2017 IEEE International Conference on Smart Cloud (SmartCloud), Nov. 3-5, 2017, New York City, NY, USA.

Angrisani, L., Bonavolontà, F., Dassi, C., Liccardo, A., Schiano Lo Moriello, R., Tocchi, A., On the Suitability of Compressive Sampling for LoRa Signals Classification, (2020) International Review of Electrical Engineering (IREE), 15 (3), pp. 187-198.

Arena, F., Pau, G., Severino, A., Trubia, S., Curto, S., Future Connected Cars Through the Evolution of Telematics and Infotainment, (2021) International Journal on Engineering Applications (IREA), 9 (2), pp. 49-61.

Bani Yassein, M., Aljawarneh, S., Al-Saad, M., An Efficient On-Demand Constrained Application Protocol for Internet of Things, (2018) International Journal on Communications Antenna and Propagation (IRECAP), 8 (3), pp. 232-239.

Jimenez, M., Medina, A., Navarro, L., Osorio, A., Robles, D., Calle, M., Candelo-Becerra, J., Obstacles, Speed and Spreading Factor: Insights in LoRa Mobile Performance, (2019) International Journal on Communications Antenna and Propagation (IRECAP), 9 (3), pp. 228-235.

Bani Yassein, M., Al-Jarrah, H., Alma'aitah, A., Performance Evaluation of the Objective Functions for Low-Power and Lossy Networks in the Light Density Network Used in Media Technology for the Internet of Things, (2020) International Journal on Communications Antenna and Propagation (IRECAP), 10 (6), pp. 386-392.

Diovu, R., Agee, J., Smart Grid Advanced Metering Infrastructure: Overview of Cloud-Based Cyber Security Solutions, (2018) International Journal on Communications Antenna and Propagation (IRECAP), 8 (4), pp. 302-314.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2023 Praise Worthy Prize