This paper was prepare, based on the sensitivity of data security topics, and based on the controversy surrounding cloud-computing security. Therefore, this paper aimed to contribute by providing some tips and directions related to cloud security through critical review for a number of recent studies. Then, extracting the most important latest problems and solutions that related to data security in cloud computing; and presenting them all in one study to become a comprehensive reference. The study found that the most important problems are data leakage, data remoteness, privacy and data segregation. As for the most important solutions that this paper reached to meet these challenges, were using practical strategies like models and standards, and using different emerging and programming technologies such as encryption, digital signatures, hashing, and blockchain, smart contracts, IoTs sensors and devices, edge computing, and fog computing. The study recommended researchers to conduct more theoretical and practical research on the subject, and recommended the cloud services providers to adopt several practical strategies and emerging technologies for higher protection.
Due to the sensitivity of the data security issue and the lack of studies focused on data security in the Internet of Things (IoT) environment; this paper-through the methodology of critical review of relevant previous and recent studies-aimed to extract the most important challenges or problems and technical and defence strategies and solutions related to securing data in IoT. That is all In order to serve as a practical guide to benefit the concerned ones. As for the results of the studies, there were several things, including: that the most common security issues and challenges within the previous studies were: confidentiality, privacy and encryption effectiveness, and authentication methods are the best methods for securing data by nearly 60%, and the most important of these methods is lightweight authentication, multi-factor authentication, then mutual authentication. In addition, it is necessary to pay attention to securing all layers of the IoT. Especially the perception layer; as it is the main interface for the attack for easy physical access to the end nodes and web interfaces. Moreover, there are several modern technologies and methods that contribute to securing data such as: lightweight systems, digital twins, Software-Defined Network (SDN), edge computing and engineering, fog computing, trust computing, Context aware of accessibility. As for the recommendations, the study recommended all the following. IoT service providers should adopt several security methods, techniques and protocols in order to raise the level of security during data transfer and storage. The concerned organizations and bodies should issue unified laws and frameworks in order to standardize the work in IoT environment and In order to protect the confidentiality and privacy of data.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.