Skip to main content
Log in

Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Users of computer networks may benefit from cloud computing, which is a fairly new abstraction that offers features like processing as well as the sharing and storing of data. As a result of the services it provides, cloud computing is drawing significant investments from across the world. Despite this, Cloud Computing Security continues to be one of the most important issues for businesses and consumers that use cloud computing systems. A few of the security flaws that are associated with cloud computing were passed down from earlier computer systems. In contrast, the other flaws were brought about by the distinctive qualities and design of cloud computing. The newly developed platform has measures that restrict data access to just those users who are authorized to do so. Using the user’s identification and authentication/authorization information, a third-party service is responsible for managing access to the data. This service checks on all requests. Sensitive information and facts pertaining to users are encrypted both while in transit and while being stored. The platform was put into operation, analysed, and compared to other cloud platforms that were already in existence in terms of how effective it was in comparison to other platforms. When compared to the other security platforms, the findings demonstrated that this platform performed as anticipated in a relatively short amount of time and offered robust protection against the acts of an intruder.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

Data is available from the authors upon reasonable request.

References

  1. Azodolmolky, S., Wieder, P., Yahyapour, R.: Cloud computing networking: challenges and opportunities for innovations. IEEE Commun. Mag. 51(7), 54–62 (2013)

    Article  Google Scholar 

  2. Abualigah, L., Alkhrabsheh, M.: Amended hybrid multi-verse optimizer with genetic algorithm for solving task scheduling problem in cloud computing. J. Supercomput. 78(1), 740–765 (2022)

    Article  Google Scholar 

  3. Zhou, M., Zhang, R., Zeng, D., Qian, W.: Services in the cloud computing era: a survey. In: 2010 4th International Universal Communication Symposium (pp. 40–46). IEEE (2010).

  4. Boukerche, A., Robson, E.: Vehicular cloud computing: architectures, applications, and mobility. Comput. Netw. 135, 171–189 (2018)

    Article  Google Scholar 

  5. Abidin, M.A.Z., Nawawi, A., Salin, A.S.A.P.: Customer data security and theft: a Malaysian organization’s experience. Inf. Comput. Secur. 27(1), 81–100 (2019)

    Article  Google Scholar 

  6. Modi, S.B., Wiles, M.A., Mishra, S.: Shareholder value implications of service failures in triads: the case of customer information security breaches. J. Oper. Manag. 35, 21–39 (2015)

    Article  Google Scholar 

  7. Dayyabu, A., Alhassan, H.M., Abualigah, L.: Pedestrian speed prediction using feed forward neural network. In: Classification Applications with Deep Learning and Machine Learning Technologies, pp. 225–241. Springer, Cham (2022)

    Google Scholar 

  8. Obaidat, I., Al-zou’bi, A., Mughaid, A., Abualigah, L.: Investigating the cyberbullying risk in digital media: protecting victims in school teenagers. Soc. Netw. Anal. Min. 13(1), 139 (2023)

    Article  Google Scholar 

  9. Bada, M., Nurse, J.R.: The social and psychological impact of cyberattacks. In: Emerging Cyber Threats and Cognitive Vulnerabilities, pp. 73–92. Academic Press, Amsterdam (2020)

    Chapter  Google Scholar 

  10. Claycomb, W. R., & Nicoll, A.: Insider threats to cloud computing: directions for new research challenges. In: 2012 IEEE 36th Annual Computer Software and Applications Conference, pp 387–394. IEEE (2012).

  11. Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M., Inácio, P.R.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13, 113–170 (2014)

    Article  Google Scholar 

  12. Ramasamy, L.K., Khan, F., Shah, M., Prasad, B.V.V.S., Iwendi, C., Biamba, C.: Secure smart wearable computing through artificial intelligence-enabled Internet of Things and cyber-physical systems for health monitoring. Sensors 22(3), 1076 (2022)

    Article  ADS  PubMed  PubMed Central  Google Scholar 

  13. Sheikh, Z.A., Singh, Y., Singh, P.K., Ghafoor, K.Z.: Intelligent and secure framework for critical infrastructure (CPS): current trends, challenges, and future scope. Comput. Commun. 193, 302–331 (2022)

    Article  Google Scholar 

  14. Zhao, S., Li, S., Qi, L., Da Xu, L.: Computational intelligence enabled cybersecurity for the Internet of Things. IEEE Trans. Emerg. Top. Comput. Intell. 4(5), 666–674 (2020)

    Article  Google Scholar 

  15. Farooq, M., Khan, M.H.: Artificial intelligence-based approach on cybersecurity challenges and opportunities in the Internet of Things & edge computing devices. Int. J. Eng. Comput. Sci. 12(07), 25763–25768 (2023)

    Google Scholar 

  16. Chanal, P.M., Kakkasageri, M.S., Manvi, S.K.S.: Security and privacy in the internet of things: computational intelligent techniques-based approaches. In: Recent Trends in Computational Intelligence Enabled Research, pp. 111–127. Academic Press, Amsterdam (2021)

    Chapter  Google Scholar 

  17. Sani, A.S., Yuan, D., Jin, J., Gao, L., Yu, S., Dong, Z.Y.: Cyber security framework for Internet of Things-based Energy Internet. Futur. Gener. Comput. Syst. 93, 849–859 (2019)

    Article  Google Scholar 

  18. Miloslavskaya, N., Tolstoy, A.: Internet of Things: information security challenges and solutions. Clust. Comput. 22, 103–119 (2019)

    Article  Google Scholar 

  19. Awotunde, J.B., Misra, S.: Feature extraction and artificial intelligence-based intrusion detection model for a secure Internet of Things networks. In: Illumination of artificial intelligence in cybersecurity and forensics, pp. 21–44. Springer, Cham (2022)

    Chapter  Google Scholar 

  20. Chen, S., Wen, H., Wu, J., Lei, W., Hou, W., Liu, W., Jiang, Y.: Internet of Things based smart grids supported by intelligent edge computing. IEEE Access 7, 74089–74102 (2019)

    Article  Google Scholar 

  21. Abdullayeva, F.: Cyber resilience and cyber security issues of intelligent cloud computing systems. Results Control Optim. 12, 100268 (2023)

    Article  Google Scholar 

  22. Da Costa, K.A., Papa, J.P., Lisboa, C.O., Munoz, R., de Albuquerque, V.H.C.: Internet of Things: a survey on machine learning-based intrusion detection approaches. Comput. Netw. 151, 147–157 (2019)

    Article  Google Scholar 

  23. Abualigah, L., Al-Ajlouni, Y.Y., Daoud, M.S., Altalhi, M., Migdady, H.: Fake news detection using recurrent neural network based on bidirectional LSTM and GloVe. Soc. Netw. Anal. Min. 14(1), 1–16 (2024)

    Article  Google Scholar 

  24. Tumula, S., Ramadevi, Y., Padmalatha, E., Kiran Kumar, G., Venu Gopalachari, M., Abualigah, L., Chithaluru, P., Kumar, M.: An opportunistic energy-efficient dynamic self-configuration clustering algorithm in WSN-based IoT networks. Int. J. Commun. Syst. 37(1), e5633 (2024)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

All authors read and approved the final paper.

Corresponding author

Correspondence to Laith Abualigah.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interest regarding the publication of this paper.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mughaid, A., Obeidat, I., Abualigah, L. et al. Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things. Int. J. Inf. Secur. (2024). https://doi.org/10.1007/s10207-024-00832-0

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10207-024-00832-0

Keywords

Navigation