IoT and Cloud Computing Issues, Challenges and Opportunities: A Review
With the exponential growth of the Industrial Internet of Things (IIoT), multiple outlets are constantly producing a vast volume of data. It is unwise to locally store all the raw data in the IIoT devices since the energy and storage spaces of the end devices are strictly constrained. self-organiza...
| Published in: | Qubahan Academic Journal |
|---|---|
| Main Authors: | Mohammed Mohammed Sadeeq, Nasiba M. Abdulkareem, Subhi R. M. Zeebaree, Dindar Mikaeel Ahmed, Ahmed Saifullah Sami, Rizgar R. Zebari |
| Format: | Article |
| Language: | English |
| Published: |
Qubahan
2021-03-01
|
| Subjects: | |
| Online Access: | https://journal.qubahan.com/index.php/qaj/article/view/36 |
Similar Items
Enhancing IoT security through blockchain integration
by: Wafa Shujaa, et al.
Published: (2025-10-01)
by: Wafa Shujaa, et al.
Published: (2025-10-01)
Privacy Framework for the Development of IoT-Based Systems
by: Yaqin Y. Shaheen, et al.
Published: (2025-07-01)
by: Yaqin Y. Shaheen, et al.
Published: (2025-07-01)
A comprehensive study on issues and challenges related to privacy and security in IoT
by: Nishant Chaurasia, et al.
Published: (2023-06-01)
by: Nishant Chaurasia, et al.
Published: (2023-06-01)
Secure ticket-based authentication method for IoT applications
by: Mojtaba Alizadeh, et al.
Published: (2023-06-01)
by: Mojtaba Alizadeh, et al.
Published: (2023-06-01)
IoT Technologies during and Beyond COVID-19: A Comprehensive Review
by: Mohamed Yousif, et al.
Published: (2021-04-01)
by: Mohamed Yousif, et al.
Published: (2021-04-01)
A Study of Moving from Cloud Computing to Fog Computing
by: Hindreen Rashid Abdulqadir, et al.
Published: (2021-04-01)
by: Hindreen Rashid Abdulqadir, et al.
Published: (2021-04-01)
Health IoT Threats: Survey of Risks and Vulnerabilities
by: Samaneh Madanian, et al.
Published: (2024-10-01)
by: Samaneh Madanian, et al.
Published: (2024-10-01)
A Scalable Blockchain Framework for Secure Transactions in IoT-Based Dynamic Applications
by: Sultan Basudan
Published: (2023-01-01)
by: Sultan Basudan
Published: (2023-01-01)
BSNCare+: A Robust IoT-Oriented Healthcare System with Non-Repudiation Transactions
by: Kuo-Hui Yeh
Published: (2016-12-01)
by: Kuo-Hui Yeh
Published: (2016-12-01)
A Survey of Security Architectures for Edge Computing-Based IoT
by: Elahe Fazeldehkordi, et al.
Published: (2022-06-01)
by: Elahe Fazeldehkordi, et al.
Published: (2022-06-01)
Integrating Data Privacy and Energy Management in Smart Cities With Partial Sustainable IoT Networks
by: Yuri Santo, et al.
Published: (2025-01-01)
by: Yuri Santo, et al.
Published: (2025-01-01)
Internet of Things (IoT) applications security trends and challenges
by: Asif Ali Laghari, et al.
Published: (2024-12-01)
by: Asif Ali Laghari, et al.
Published: (2024-12-01)
Cybersecurity for Blockchain-Based IoT Systems: A Review
by: Razan Alajlan, et al.
Published: (2023-06-01)
by: Razan Alajlan, et al.
Published: (2023-06-01)
Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions
by: Dung T. Nguyen, et al.
Published: (2025-08-01)
by: Dung T. Nguyen, et al.
Published: (2025-08-01)
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
by: Andrew Churcher, et al.
Published: (2021-01-01)
by: Andrew Churcher, et al.
Published: (2021-01-01)
BULWARK: A Framework to Store IoT Data in User Accounts
by: Jeremy Lynn Reed, et al.
Published: (2022-01-01)
by: Jeremy Lynn Reed, et al.
Published: (2022-01-01)
Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions
by: Jonathan Cook, et al.
Published: (2023-01-01)
by: Jonathan Cook, et al.
Published: (2023-01-01)
A Panorama of Cloud Platforms for IoT Applications Across Industries
by: Sami Yangui
Published: (2020-05-01)
by: Sami Yangui
Published: (2020-05-01)
Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review
by: Deepak, et al.
Published: (2024-01-01)
by: Deepak, et al.
Published: (2024-01-01)
IoT Forensics: Current Perspectives and Future Directions
by: Abdulghani Ali Ahmed, et al.
Published: (2024-08-01)
by: Abdulghani Ali Ahmed, et al.
Published: (2024-08-01)
The Requirements, Benefits, and Barriers of IoT Solutions to Support Well-Being in Elementary Schools
by: Agnieszka Kitkowska, et al.
Published: (2024-01-01)
by: Agnieszka Kitkowska, et al.
Published: (2024-01-01)
Narrowband IoT: A Greener Solution for Large Scale Deployments
by: Sudhir K. Routray, et al.
Published: (2022-03-01)
by: Sudhir K. Routray, et al.
Published: (2022-03-01)
A Smart Framework to Detect Threats and Protect Data of IoT Based on Machine Learning
by: Ahmad M. Almasabi, et al.
Published: (2024-01-01)
by: Ahmad M. Almasabi, et al.
Published: (2024-01-01)
A Set of Tools and Data Management Framework for the IoT–Edge–Cloud Continuum
by: Janis Judvaitis, et al.
Published: (2024-12-01)
by: Janis Judvaitis, et al.
Published: (2024-12-01)
Ethical hacking for IoT: Security issues, challenges, solutions and recommendations
by: Jean-Paul A. Yaacoub, et al.
Published: (2023-01-01)
by: Jean-Paul A. Yaacoub, et al.
Published: (2023-01-01)
Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey
by: Vishal Sharma, et al.
Published: (2020-01-01)
by: Vishal Sharma, et al.
Published: (2020-01-01)
Developing IoT applications: challenges and frameworks
by: Itorobong S. Udoh, et al.
Published: (2018-06-01)
by: Itorobong S. Udoh, et al.
Published: (2018-06-01)
Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme
by: Zhaohui Tang
Published: (2021-01-01)
by: Zhaohui Tang
Published: (2021-01-01)
An Intelligent IoT and ML-Based Water Leakage Detection System
by: Mohammed Rezwanul Islam, et al.
Published: (2023-01-01)
by: Mohammed Rezwanul Islam, et al.
Published: (2023-01-01)
A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems
by: Mumin Adam, et al.
Published: (2024-01-01)
by: Mumin Adam, et al.
Published: (2024-01-01)
End-to-end security enabled intelligent remote IoT monitoring system
by: Kashif Saleem, et al.
Published: (2024-03-01)
by: Kashif Saleem, et al.
Published: (2024-03-01)
Enhancing Privacy in Wearable IoT through a Provenance Architecture
by: Richard K. Lomotey, et al.
Published: (2018-04-01)
by: Richard K. Lomotey, et al.
Published: (2018-04-01)
Security Perception of IoT Devices in Smart Homes
by: Lili Nemec Zlatolas, et al.
Published: (2022-02-01)
by: Lili Nemec Zlatolas, et al.
Published: (2022-02-01)
An Unlinkable Authentication Scheme for Distributed IoT Application
by: Yousheng Zhou, et al.
Published: (2019-01-01)
by: Yousheng Zhou, et al.
Published: (2019-01-01)
Energy Efficiency for Green Internet of Things (IoT) Networks: A Survey
by: Laith Farhan, et al.
Published: (2021-11-01)
by: Laith Farhan, et al.
Published: (2021-11-01)
Blockchain-IoT Healthcare Applications and Trends: A Review
by: Wafaa A. N. A. Al-Nbhany, et al.
Published: (2024-01-01)
by: Wafaa A. N. A. Al-Nbhany, et al.
Published: (2024-01-01)
A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications
by: Abbas M. Al-Ghaili, et al.
Published: (2023-01-01)
by: Abbas M. Al-Ghaili, et al.
Published: (2023-01-01)
IoT Platforms and Security: An Analysis of the Leading Industrial/Commercial Solutions
by: Giancarlo Fortino, et al.
Published: (2022-03-01)
by: Giancarlo Fortino, et al.
Published: (2022-03-01)
Hub-OS: An interoperable IoT computing platform for resources utilization with real-time support
by: Desoky Abdelqawy, et al.
Published: (2022-04-01)
by: Desoky Abdelqawy, et al.
Published: (2022-04-01)
Cross Deep Learning Method for Effectively Detecting the Propagation of IoT Botnet
by: Majda Wazzan, et al.
Published: (2022-05-01)
by: Majda Wazzan, et al.
Published: (2022-05-01)
Similar Items
-
Enhancing IoT security through blockchain integration
by: Wafa Shujaa, et al.
Published: (2025-10-01) -
Privacy Framework for the Development of IoT-Based Systems
by: Yaqin Y. Shaheen, et al.
Published: (2025-07-01) -
A comprehensive study on issues and challenges related to privacy and security in IoT
by: Nishant Chaurasia, et al.
Published: (2023-06-01) -
Secure ticket-based authentication method for IoT applications
by: Mojtaba Alizadeh, et al.
Published: (2023-06-01) -
IoT Technologies during and Beyond COVID-19: A Comprehensive Review
by: Mohamed Yousif, et al.
Published: (2021-04-01)
