Abstract
The Cloud Computing (CC) technology refers to an infrastructure in which both data storage and data processing take place outside the mobile device. Furthermore, another new and fast growing technology called Internet of things (IoT) rises in the sector of networks and telecommunications with specific concern in the “modern” area of wireless telecommunication systems. Regarding our recent research, the main goal of the interaction and cooperation between things and objects sent through the wireless networks is to fulfill the objective set to them as a combined entity, with the aim to achieve a better environment for the use of Big Data (BD). In addition, counting on the technology of wireless networks, both CC and IoT could be developed rapidly and together. In this paper, we survey IoT and Cloud Computing technologies with focus on security problems that both technologies faced. Particularly, these two aforementioned technologies (i.e., Cloud Computing and IoT) have been compared, with the aim to examine the familiar characteristics and examine and discover the benefits of their integration to secure the use and transmission of Big Data. In conclusion, contributions of CC and IoT technologies and how the CC technology improves the operation of IoT as a base technology for Big Data systems have been presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805. https://doi.org/10.1016/j.comnet.2010.05.010.
Stergiou, C., Psannis, K. E., Kim, B.-G., & Gupta, B. (2016). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964–975.
Plageras, A. P., Psannis, K. E., Stergiou, C., Wang, H., & Gupta, B. B. (2018). Efficient IoT-based sensor big data collection-processing and analysis in smart buildings. Future Generation Computer Systems, 82, 349–357.
Hilbert, M., & López, P. (2011). The world’s technological capacity to store, communicate, and compute information. Science, 332(6025), 60–65.
Fu, Z., Ren, K., Shu, J., Sun, X., & Huang, F. (2015). Enabling personalized search over encrypted out-sourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems, 27(9), 2546–2559.
Mongay Batalla, J., & Krawiec, P. (2014). Conception of ID layer performance at the network level for internet of things. Personal and Ubiquitous Computing, 18(2), 465–480.
Stergiou, C., & Psannis, K. E. (2017). Efficient and secure big data delivery in cloud computing. Multimedia Tools and Applications, 76(21), 22803–22822.
Stergiou, C., Psannis, K. E., Plageras, A. P., Kokkonis, G., & Ishibashi, Y. (2017, June 19–21). Architecture for security in IoT environments. In Proceedings of 26th IEEE International Symposium on Industrial Electronics, Edinburgh, Scotland.
Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in internet of things. Digital Communications and Networks (DCN), 4(2), 18–137.
Kryftis, Y., Mastorakis, G., Mavromoustakis, C., Mongay Batalla, J., Pallis, E., & Kormentzas, G. (2016). Efficient entertainment services provision over a novel network architecture. IEEE Wireless Communications Magazine, 23, 14.
Stergiou, C., & Psannis, K. E. (2016). Recent advances delivered by mobile cloud computing and internet of things for big data applications: A survey. International Journal of Network Management, 27, 1–12.
Stergiou, C., Psannis, K. E., Plageras, A. P., Ishibashi, Y., & Kim, B.-G. (2018). Algorithms for efficient digital media transmission over IoT and cloud networking. Journal of Multimedia Information System, 5(1), 1–10.
Stergiou, C., Psannis, K. E., Plageras, A. P., Kokkonis, G., & Ishibashi, Y. (2017, June). Architecture for security monitoring in IoT environments. In Proceedings of IEEE 26th international symposium on industrial electronics, Edinburgh, Scotland.
Plageras, A. P., Psannis, K. E., Ishibashi, Y., & Kim, B.-G. (2016, October). IoT-based surveillance system for ubiquitous healthcare. In Proceedings of IEEE/IECON 2016 - 42nd Annual Conference of the IEEE, Industrial Electronics Society.
Li, J., Huang, L., Zhou, Y., He, S., & Ming, Z. (2017). Computation partitioning for mobile cloud computing in a big data environment. IEEE Transactions on Industrial Informatics, 13, 2009–2018.
Yu, R., Huang, X., Kang, J., Ding, J., Maharjan, S., Gjessing, S., & Zhang, Y. (2015). Cooperative resource management in cloud-enabled vehicular networks. IEEE Transactions on Industrial Informatics, 62(12), 7938–7951.
Agrawal, D., Gupta, B. B., Yamaguchi, S., & Psannis, K. E. (2018). Recent advances in mobile cloud computing. Wireless Communications and Mobile Computing, 2018, 5895817.
Ali, A. M. M., Ahmad, N. M., & Amin, A. H. M. (2014, December). Cloudlet-based cyber foraging framework for distributed video surveillance provisioning. In 2014 Fourth World Congress on Information and Communication Technologies (WICT), Bandar Hilir, Malaysia.
Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A., & Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2), 133–143.
Fremdt, S., Beck, R., & Weber, S. (2013, October) Does cloud computing matter? An analysis of the cloud model software-as-a-service and its impact on operational agility. In 46th Hawaii International Conference on System Sciences (pp. 1025–1034).
Stergiou, C., & Psannis, K. E. (2017, July 24–26). Algorithms for big data in advanced communication systems and cloud computing. In Proceedings of 19th IEEE Conference on Business Informatics 2017 (CBI2017), Doctoral Consortium, Thessaloniki, Greece.
Plageras, A. P., Stergiou, C., Psannis, K. E., Kim, B.-G., Gupta, B., & Ishibashi, Y. (2017, July 24–26). Solutions for inter-connectivity and security in a smart hospital building. In Proceedings of 15th IEEE International Conference on Industrial Informatics (INDIN 2017), Emden, Germany.
Thirumalai, C., & Kar, H. (2018, April 21–22). Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices. In IEEE, Proceedings of 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), Vellore, India.
Plageras, A. P., Stergiou, C., Psannis, K. E., Kokkonis, G., Ishibashi, Y., Kim, B.-G., et al. (2017, July 24–26). Efficient large-scale medical data (eHealth big data) analytics in internet of things. In Proceedings of 19th IEEE International Conference on Business Informatics (CBI’17), International Workshop on the Internet of Things and Smart Services (ITSS2017), Thessaloniki, Greece.
Stergiou, C., Psannis, K. E., Plageras, A. P., Xifilidis, T., & Gupta, B. B. (2018, April 15–20). Security and privacy of big data for social networking services in cloud. In Proceedings of IEEE conference on Computer Communications (IEEE INFOCOM 2018), Honolulu, HI.
Angin, P., Bhargava, B., Ranchal, R., Singh, N., & Linderman, M. (2010, October 31–November 3). An entity-centric approach for privacy and identity management in cloud computing. In Proceedings of 29th IEEE International Symposium on Reliable Distributed Systems, New Delhi, India. https://doi.org/10.1109/SRDS.2010.28.
Doukas, C, Pliakas, T., & Maglogiannis, I. (2010, August 31–September 4). Mobile healthcare information management utilizing cloud computing and android OS. In Proceedings of 32nd Annual International Conference of the IEEE EMBS 2010, Buenos Aires, Argentina.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2011). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13, 1587–1611. https://doi.org/10.1002/wcm.1203.
Habib, S. M., Ries, S., & Muhlhauser, M. (2011, November 16–18). Towards a trust management system for cloud computing. In Proceedings of IEEE International Joint Conference TrustCom-11/IEEE ICESS-11/FCST-11, Changsha, China.
Prasad, M. R., Gyani, J., & Murti, P. R. K. (2012). Mobile cloud computing: Implications and challenges. Journal of Information Engineering and Applications, 2(7), 7–15.
Shiraz, M., Gani, A., Khokhar, R. H., & Buyya, R. (2012). A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. IEEE Communications Surveys & Tutorials, 15(3), 1294–1313.
Kim, M., & Park, S. O. (2013). Trust management on user behavioral patterns for a mobile cloud computing. Cluster Computing, 16(4), 725–731. https://doi.org/10.1007/s10586-013-0248-9.
Stergiou, C., Psannis, K. E., & Gupta, B. B. (2019) Advanced media-based smart big data on intelligent cloud systems. IEEE Transactions on Sustainable Computing, 4(1), 77–87.
Gnana Singh, A. A., Tamizhpoonguil, B., & Jebamalar Leavline, E. (2016). A survey on big data and cloud computing. International Journal on Recent and Innovation Trends in Computing and Communication, 7(4), 273–277.
Awodele, O., Izang, A. A., Kuyoro, S. O., & Osisanwo, F. Y. (2016). Big data and cloud computing issues. International Journal of Computer Applications, 12(133), 14–19.
Rallapallia, S., Gondkar, R. R., & Ketavarapu, U. P. K. (2015, December). Impact of processing and analyzing healthcare big data on cloud computing environment by implementing Hadoop cluster. In International Conference on Computational Modeling and Security (CMS2016) (pp. 16–22).
Hernandez-Ramos, J. L., Moreno, M. V., Bernabe, J. B., Carrillo, D. G., & Skarmeta, A. F. (2015). SAFIR: Secure access framework for IoT-enabled services on smart buildings. Journal of Computer and System Sciences, 81(8), 1452–1463.
Moreno, M. V., Dufour, L., Skarmeta, A. F., Jara, A. J., Genoud, D., Ladevie, B., & Bezian, J.-J. (2016). Big data: The key to energy efficiency in smart buildings. Soft Computing, 20(5), 1749–1762.
Shah, J., & Mishra, B. (2016). Customized IoT enabled wireless sensing and monitoring platform for smart buildings. Procedia Technology, 23, 256–263.
Ben Sta, H. (2017). Quality and the efficiency of data in “smart-cities”. Future Generation Computer Systems, 74, 409–416.
Li, J., Zhang, Y., Chen, X., & Xiang, Y. (2018). Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security, 72, 1–12.
Qiu, M., Gai, K., Thuraisingham, B., Tao, L., & Zhao, H. (2018). Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Generation Computer Systems, 80, 421–429.
Elhoseny, M., Ramirez-Gonzalez, G., Abu-Elnasr, O. M., Shawkat, S. A., Arunkumar, N., & Farouk, A. (2018). Secure medical data transmission model for IoT-based healthcare systems. IEEE Access, 6, 20596–20608.
Hamida, E. B., Noura, H., & Znaidi, W. (2015). Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures. Electronics, 4(3), 380–423.
Dastjerdi, A. V., & Buyya, R. (2016). Fog computing: Helping the internet of things realize its potential. IEEE Computer, 49(8), 112–116.
Barreno, M., Nelson, B., Sears, R., Joseph, A. D., & Tygar, J. D. (2006, March 21–24). Can machine learning be secure? In ACM, in Proceedings of the 2006 ACM Symposium on Information, Computer And Communications Security, ASIACCS ’06, Taipei, Taiwan (pp. 16–25).
Liao, X., Ding, L., & Wang, Y. (2011, June 27–29). Secure machine learning, a brief overview. In IEEE, Proceedings of 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement – Companion, Jeju Island, South Korea.
Barreno, M., Nelson, B., Joseph, A. D., & Tygar, J. D. (2010). The security of machine learning. Machine Learning, 81(2), 121–148.
Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., et al. (2017, October 30–November 3). Practical secure aggregation for privacy-preserving machine learning. In ACM, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS ’17, Dallas, TX (pp. 1175–1191).
Demontis, A., Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., et al. (2017). Yes, machine learning can be more secure! A case study on android malware detection. IEEE Transactions on Dependable and Secure Computing (Early Access), 16(4), 711–724.
Sheng, Y.-B., & Zhou, L. (2017). Distributed secure quantum machine learning. Science Bulletin, 64(14), 1025–1029.
Bello-Orgaz, G., Jung, J. J., & Camacho, D. (2016). Social big data: Recent achievements and new challenges. Information Fusion, 28, 45–59.
Gandomi, A., & Haider, M. (2015). Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 35(2), 137–144.
Kaur, N., & Sood, S. K. (2017). Dynamic resource allocation for big data streams based on data characteristics (5Vs). International Journal of Network Management, 27(4), e1978.
Hu, H., Wen, Y., Chua, T. S., & Li, X. (2014). Toward scalable systems for big data analytics: A technology tutorial. IEEE Access, 2, 652–687.
Rajaraman, V. (2016). Big data analytics. Resonance, 21(8), 695–716.
Alexandrov, A., Bergmann, R., Ewen, S., Freytag, J. C., Hueske, F., Heise, A., et al. (2014). The stratosphere platform for big data analytics. The VLDB Journal, 23(6), 939–964.
Kwon, O., Lee, N., & Shin, B. (2014). Data quality management, data usage experience and acquisition intention of big data analytics. International Journal of Information Management, 34(3), 387–394.
Müller, K., Schwarz, H., Marpe, D., Bartnik, C., Bosse, S., & Brust, H. (2013). 3D high-efficiency video coding for multi-view video and depth data. IEEE Transactions on Image Processing, 9(22), 3366–3378.
Shen, L., Liu, Z., Zhang, X., Zhao, W., & Zhang, Z. (2013). An effective CU size decision method for HEVC encoders. IEEE Transactions on Multimedia, 2(15), 465–470.
Ohm, J.-R., Sullivan, G. J., Schwarz, H., Tan, T. K., & Wiegand, T. (2012). Comparison of the coding efficiency of video coding standards – including high efficiency video coding (HEVC). IEEE Transactions on Circuits and Systems for Video Technology, 12(22), 1669–1684.
Batalla, J. M. (2015). Advanced multimedia service provisioning based on efficient interoperability of adaptive streaming protocol and high efficient video coding. Journal of Real-Time Image Processing, 12(2), 443–454.
Rouse, M. (2015, November 1). IoT security (internet of things security). IoT Agenda [Online]. Retrieved July 27, 2016, from http://internetofthingsagenda.techtarget.com/definition/IoT-security-Internet-of-Things-security
Plageras, A. P., & Psannis, K. E. (2017, July 24–26). Algorithms for big data delivery over the internet of things. In Proceedings of 19th IEEE Conference on Business Informatics 2017 (CBI2017), Doctoral Consortium, Thessaloniki, Greece.
Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.
Nair, A., Shaniba Asmi, P., & Aloor, G. (2016). Analysis of physical layer security via co-operative communication in internet of things. International Conference on Emerging Trends in Engineering, Science and Technology (ICETEST - 2015), 24, 896–903.
Hu, W., Tan, H., Corke, P., Shih, W. C., & Jha, S. (2010). Toward trusted wireless sensor networks. ACM Transactions on Sensor Networks, 7(5), 1–25.
Huang, D. (2011). Mobile cloud computing. IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter, 6(10), 27–31.
Haque, M. N., Chowdhury, M. R. K., Gani, A., & Whaiduzzaman, M. (2014). A study on strategic provision of cloud computing services. The Scientific World Journal, 2014, 1–8.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012–1023.
Haghighat, M., Zonouz, S., & Abdel-Mottaleb, M. (2015). CloudID: Trustworthy cloud-based and cross-enterprise biometric identification. Expert Systems with Applications, 11(42), 7905–7916.
Kumar, Y., Munjal, R., & Sharma, H. (2011). Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. IJCSMS International Journal of Computer Science and Management Studies, 11(3), 68–76.
Kaur, R., & Kinger, S. (2014). Analysis of security algorithms in cloud computing. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 3(3), 171–176.
Singh, G., & Kinger, S. (2013). Integrating AES, DES, and 3-DES encryption algorithms for enhanced data security. International Journal of Scientific & Engineering Research, 4(7), 2058.
Sachdev, A., & Bhansali, M. (2013). Enhancing cloud computing security using AES algorithm. International Journal of Computer Applications, 9(67), 19–23.
Viswanathan, P. (2012, July 7). Cloud computing – is it really all that beneficial? abouttech [Online]. Retrieved May 24, 2017, from http://mobiledevices.about.com/od/additionalresources/a/Cloud-Computing-Is-It-Really-All-That-Beneficial.htm
Pfarr, F., Buckel, T., & Winkelmann, A. (2014, January 6–9). Cloud computing data protection – a literature review and analysis. In Proceedings of 47th Hawaii International Conference on System Sciences, Waikoloa, HI (pp. 5018–5027).
Almrot, E., & Andersson, S. (2013, May). A study of the advantages and disadvantages of mobile cloud computing versus native environment. Digitala Vetenskapliga Arkivet, Bachelor Thesis in Software Engineering, Blekinge Institute of Technology, Karlskrona.
Fremdt, S., Beck, R., & Weber, S. (2013, January 7–10). Does cloud computing matter? An analysis of the cloud model software-as-a-service and its impact on operational agility. In Proceedings of 46th Hawaii International Conference on System Sciences 2013, Wailea, Maui, HI (pp. 1025–1034).
Blog: Follow what’s happening at Get Cloud Services. (2014, December 23). Mobile cloud computing – pros and cons. GetCloud Services [Online]. Retrieved December 24, 2017, from https://www.getcloudservices.com/blog/mobile-cloud-computing-pros-and-cons/
Shi, E., Niu, Y., Jakobsoon, M., & Chow, R. (2010, October 25–28). Implicit authentication through learning user behavior. In ACM, Proceedings of ISC’10 13th International Conference on Information Security, Boca Raton, FL (pp. 99–113).
Mell, P., Grance, T. (2011) The NIST definition of cloud computing. Recommendations of the National Institute of Standards and Technology, Special Publication 800–145. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg. MD 20899–8930.
Botta, A., de Donato, W., Persico, V., & Pescapè, A. (2016). Integration of cloud computing and internet of things: A survey. Journal of Future Generation Computer Systems, 56, 684–700.
Bhattasali, T., Chaki, R., & Chaki, N. (2013). Secure and trusted cloud of things. In: India Conference (INDICON), 2013 Annual IEEE (pp. 1–6).
Simmhan, Y., Kumbhare, A. G., Cao, B., & Prasanna, V. (2011). An analysis of security and privacy issues in smart grid software architectures on clouds. In: Cloud Computing (CLOUD), IEEE International Conference on IEEE (pp. 582–589).
Grozev, N., & Buyya, R. (2014). Inter-cloud architectures and application brokering: Taxonomy and survey. Software: Practice and Experience, 44(3), 369–390.
Rao, B. P., Saluia, P., Sharma, N., Mittal, A., & Sharma, S. V. (2012). Cloud computing for internet of things and sensing based applications. In: Sensing Technology (ICST), 2012 Sixth International Conference on IEEE (pp. 374–380).
He, W., Yan, G., & Xu, L. D. (2014). Developing vehicular data cloud services in the IoT environment. IEEE Transactions on Industrial Informatics, 10(2), 1587–1595.
Dobre, C., & Xhafa, F. (2014). Intelligent services for big data science. Future Generation Computer Systems, 37, 267–281.
Aceto, G., Botta, A., de Donato, W., & Pescapè, A. (2013). Cloud monitoring: A survey. Computer Networks, 57(9), 2093–2115.
Acknowledgment
The authors would like to thank the anonymous reviewers for their valuable comments and feedback which were extremely helpful in improving the quality of the paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Stergiou, C.L., Plageras, A.P., Psannis, K.E., Gupta, B.B. (2020). Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-22277-2_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22276-5
Online ISBN: 978-3-030-22277-2
eBook Packages: Computer ScienceComputer Science (R0)