Abstract
Users of computer networks may benefit from cloud computing, which is a fairly new abstraction that offers features like processing as well as the sharing and storing of data. As a result of the services it provides, cloud computing is drawing significant investments from across the world. Despite this, Cloud Computing Security continues to be one of the most important issues for businesses and consumers that use cloud computing systems. A few of the security flaws that are associated with cloud computing were passed down from earlier computer systems. In contrast, the other flaws were brought about by the distinctive qualities and design of cloud computing. The newly developed platform has measures that restrict data access to just those users who are authorized to do so. Using the user’s identification and authentication/authorization information, a third-party service is responsible for managing access to the data. This service checks on all requests. Sensitive information and facts pertaining to users are encrypted both while in transit and while being stored. The platform was put into operation, analysed, and compared to other cloud platforms that were already in existence in terms of how effective it was in comparison to other platforms. When compared to the other security platforms, the findings demonstrated that this platform performed as anticipated in a relatively short amount of time and offered robust protection against the acts of an intruder.
Similar content being viewed by others
Data availability
Data is available from the authors upon reasonable request.
References
Azodolmolky, S., Wieder, P., Yahyapour, R.: Cloud computing networking: challenges and opportunities for innovations. IEEE Commun. Mag. 51(7), 54–62 (2013)
Abualigah, L., Alkhrabsheh, M.: Amended hybrid multi-verse optimizer with genetic algorithm for solving task scheduling problem in cloud computing. J. Supercomput. 78(1), 740–765 (2022)
Zhou, M., Zhang, R., Zeng, D., Qian, W.: Services in the cloud computing era: a survey. In: 2010 4th International Universal Communication Symposium (pp. 40–46). IEEE (2010).
Boukerche, A., Robson, E.: Vehicular cloud computing: architectures, applications, and mobility. Comput. Netw. 135, 171–189 (2018)
Abidin, M.A.Z., Nawawi, A., Salin, A.S.A.P.: Customer data security and theft: a Malaysian organization’s experience. Inf. Comput. Secur. 27(1), 81–100 (2019)
Modi, S.B., Wiles, M.A., Mishra, S.: Shareholder value implications of service failures in triads: the case of customer information security breaches. J. Oper. Manag. 35, 21–39 (2015)
Dayyabu, A., Alhassan, H.M., Abualigah, L.: Pedestrian speed prediction using feed forward neural network. In: Classification Applications with Deep Learning and Machine Learning Technologies, pp. 225–241. Springer, Cham (2022)
Obaidat, I., Al-zou’bi, A., Mughaid, A., Abualigah, L.: Investigating the cyberbullying risk in digital media: protecting victims in school teenagers. Soc. Netw. Anal. Min. 13(1), 139 (2023)
Bada, M., Nurse, J.R.: The social and psychological impact of cyberattacks. In: Emerging Cyber Threats and Cognitive Vulnerabilities, pp. 73–92. Academic Press, Amsterdam (2020)
Claycomb, W. R., & Nicoll, A.: Insider threats to cloud computing: directions for new research challenges. In: 2012 IEEE 36th Annual Computer Software and Applications Conference, pp 387–394. IEEE (2012).
Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M., Inácio, P.R.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13, 113–170 (2014)
Ramasamy, L.K., Khan, F., Shah, M., Prasad, B.V.V.S., Iwendi, C., Biamba, C.: Secure smart wearable computing through artificial intelligence-enabled Internet of Things and cyber-physical systems for health monitoring. Sensors 22(3), 1076 (2022)
Sheikh, Z.A., Singh, Y., Singh, P.K., Ghafoor, K.Z.: Intelligent and secure framework for critical infrastructure (CPS): current trends, challenges, and future scope. Comput. Commun. 193, 302–331 (2022)
Zhao, S., Li, S., Qi, L., Da Xu, L.: Computational intelligence enabled cybersecurity for the Internet of Things. IEEE Trans. Emerg. Top. Comput. Intell. 4(5), 666–674 (2020)
Farooq, M., Khan, M.H.: Artificial intelligence-based approach on cybersecurity challenges and opportunities in the Internet of Things & edge computing devices. Int. J. Eng. Comput. Sci. 12(07), 25763–25768 (2023)
Chanal, P.M., Kakkasageri, M.S., Manvi, S.K.S.: Security and privacy in the internet of things: computational intelligent techniques-based approaches. In: Recent Trends in Computational Intelligence Enabled Research, pp. 111–127. Academic Press, Amsterdam (2021)
Sani, A.S., Yuan, D., Jin, J., Gao, L., Yu, S., Dong, Z.Y.: Cyber security framework for Internet of Things-based Energy Internet. Futur. Gener. Comput. Syst. 93, 849–859 (2019)
Miloslavskaya, N., Tolstoy, A.: Internet of Things: information security challenges and solutions. Clust. Comput. 22, 103–119 (2019)
Awotunde, J.B., Misra, S.: Feature extraction and artificial intelligence-based intrusion detection model for a secure Internet of Things networks. In: Illumination of artificial intelligence in cybersecurity and forensics, pp. 21–44. Springer, Cham (2022)
Chen, S., Wen, H., Wu, J., Lei, W., Hou, W., Liu, W., Jiang, Y.: Internet of Things based smart grids supported by intelligent edge computing. IEEE Access 7, 74089–74102 (2019)
Abdullayeva, F.: Cyber resilience and cyber security issues of intelligent cloud computing systems. Results Control Optim. 12, 100268 (2023)
Da Costa, K.A., Papa, J.P., Lisboa, C.O., Munoz, R., de Albuquerque, V.H.C.: Internet of Things: a survey on machine learning-based intrusion detection approaches. Comput. Netw. 151, 147–157 (2019)
Abualigah, L., Al-Ajlouni, Y.Y., Daoud, M.S., Altalhi, M., Migdady, H.: Fake news detection using recurrent neural network based on bidirectional LSTM and GloVe. Soc. Netw. Anal. Min. 14(1), 1–16 (2024)
Tumula, S., Ramadevi, Y., Padmalatha, E., Kiran Kumar, G., Venu Gopalachari, M., Abualigah, L., Chithaluru, P., Kumar, M.: An opportunistic energy-efficient dynamic self-configuration clustering algorithm in WSN-based IoT networks. Int. J. Commun. Syst. 37(1), e5633 (2024)
Author information
Authors and Affiliations
Contributions
All authors read and approved the final paper.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interest regarding the publication of this paper.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Mughaid, A., Obeidat, I., Abualigah, L. et al. Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things. Int. J. Inf. Secur. 23, 2123–2137 (2024). https://doi.org/10.1007/s10207-024-00832-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-024-00832-0