This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
1. Introduction
One of the greatest inventions of Gen Z, Internet has rapidly emerged over the last two decades, connecting people and organizations together into one giant family. This connectivity has generated the urgency of Internet of Things (IoT) [1], which involves sensors, software devices, and other technologies, for the purpose of maintaining the security and privacy of humongous data transmission among other devices and systems [2]. For this sole purpose, several distinct IoT platforms have come into existence with their own unique cloud service providers (CSP) at the backend. But, like every coin has two sides, i.e., it has also led to a problematic situation when it comes to the selection of ideal CSP for a selected set of attributes that purview a finite set of requirements, to assist the process of decision-making where one has to deliberate multiple attributes, possible scenarios, market trends, and user biases [3].
According to the best of research and knowledge and observation, no compatible and comprehensive study and solutions been done for this integrated set of requirements in the field of cloud service provider selection (CSPS). However, there exist a lot of work that includes some of our set of factors quality which elaborately and accurately formulates algorithm for some quality factors and some for the technical aspects [4, 5]. Divergent from the preexisting schemes, thus, providing a flexible, realistic, and compatible methodology towards cloud service selection (CSS) considering all the possible factors under the sun required for an ideal cloud service.
1.1. Significance of the Research
In spite of the existence of many software solutions for this decision-making problem, they have been proved to be inadequate considering the distinct attributes unique to individual user.
1.1.1. Research Gaps in the IoT-Based Cloud Service Providers
The requirement of decision-making among the various cloud service providers amalgamated with IoT applications has led to the emergence of several software solutions in recent years. However, multiple demerits can be observed in the performance and efficiency of these platforms [6]. The current short comings present in the IoT-based cloud service provider solutions involve numerous dimensions including the inefficiency of the platforms to extend for supporting the heterogeneous sensing technologies. Other demerits include the proprietorship of data, providing insinuations of privacy and security [7]. The processing and sharing of information can also be counted as another gap especially in scenarios where it is essential to support novel services. The absence of assistance provided by application developers is another shortcoming faced by several IoT cloud platforms [4]. Furthermore, most of these IoT platforms do not possess the property of expansion for the addition of new components to withstand the emergence of new technologies and provide economies of scale. Lastly, the delivery of the purchased software to the respective connected devices is also not supported by a majority of the marketplaces dedicated for IoT applications.
Multicriteria Decision-Making (MCDM) techniques provide a scientific and easy solution. MCDM deals with organizing variegated attributes which come under the purview of decision-making. It specializes in handling issues where the proximity of attributes is close, and human cognitive abilities are not able to take the logical decisions. It does so by performing bargains or trade-offs by replacing one criterion by equivalent another. This paper presents an integrated set of factors that contribute the solution to the problematic issue of the selection of an optimal IoT cloud platform.
In a nutshell, the qualities mentioned below make the proposed methodology novel when compared to state-of-the-art techniques:
(1) Identification and categorization of selection attributes (SA): after thorough and detailed studying of more than fifty research papers, few factors, i.e., selection attributes (SA) were filtered out. About 90 factors were carefully studied, and explicitly observed and relevant factors were mined out by removing redundant elements and those which were similar to each other. Finally, these factors were then categorized into broad three categories after extensive reasoning and filtration, namely,
(i) Quality factors
(ii) Technical factors
(iii) Economic factors
(2) Prioritization of identified selection factors (SA): the identified selection attributes (SA) are then prioritized according to Fuzzy Set Theory. Here, prioritization is done on this basis of calculated priority weights of each selection attribute individually
(3) Development of a hybrid decision-making framework: once the selection attributes are successfully selected and filtered out and then weighed, respectively, then the hybrid decision-making framework is developed using mainly two methodologies:
(i) Fuzzy Set Theory
(ii) Matrix Multicriteria Decision-Making Method
2. Literature Review
This section of the research is concerned with the existing studies in the field of selecting optimal cloud computing service provider for IoT-based applications, where the problem of service selection has been represented as an MCDM problem. To search the relevant data, the keywords like Cloud Computing for IoT, Cloud Platforms for IoT Services, IoT based Cloud Service Selection, IoT Service Selection Attributes, and Cloud Service Selection for IoT were used. As a result of this research, a total of 104 research papers from various highly reputed journals and conferences were analyzed in detail. Now, these papers were screened by examining their primary focus, whether it is related to the cloud service selection or not. Then, in the second screening, the approaches used and the case studies mentioned along with the selection attributes (SA) which were mentioned in these research papers were deliberate to make a comparative study of the same. The comprehensive tabular literature survey is shown in Table 1.
Table 1
Citation/name | Methodology | Advantages | Disadvantages |
[8] | This study proposes a multistep approach to evaluate, categorize, and rate cloud-based IoT platforms via implementing Multicriteria Decision-Making (MCDM), probabilistic linguistic term sets (PLTSs), and finally, a probabilistic linguistic best-worst (PLBW) is used to score all platforms | Though the proposed method seems complex but a real-time implementation via case study provides cogent proof of its efficiency. It also outperforms individual scoring, classification, and evaluating methods. | The data used in the case study is limited which explains the flow of the method but falls back to prove its cogency. Moreover, inclusion of latest hybrid techniques in the domain for comparative analysis could further edify the study’s significance. |
|
|||
[9] | Cloud service provider selection approach is proposed via application of Multicriteria Decision-Making (MCDM), analytical hierarchical process (AHP), technique for order of preference by similarity to ideal solution (TOPSIS), and the best-worst method (BWM). Case study is presented to support the same. | The study successfully identifies and provides solutions the drawbacks of classical multicriteria decision-making (MCDM) approaches in terms of accuracy, time required, and complexity of computation. AHP is outperformed by proposed approach. | The use case scenario presented used stimulated scenarios and data that raises question against the cogency of the proposed study. |
|
|||
[10] | Additive manufacturing based cloud-based service providing framework is proposed to include both hard and soft services for the ease of customer use. These include data-based testing, design, 3D printing, remote control of printers, and face recognition using AI. | This study understands and provides solution to the real-time consumer or customer problems. Its feature providing framework proves to be easy, feasible, and effective. | The study only provides a framework along with it merit without any details of implementing or developing the framework for real world application. |
|
|||
[11] | The study is aimed at identifying various determinants that cause deprecation of various ministry of micro, small, and medium enterprises in India, contributing a huge impact on Indian economy. Data is collated from 500 Indian MSMEs. Multiple criteria include social influence, Internet of Things, perceived ease of use, trust, and perceived IT security risk among others. | This study evaluates real-time data from 500 MSMEs that proves its cogency. Moreover, it provides insight that can be directly deliberated by policy makers to create maximum impact. | A comparative analysis with other policy-making insight provider algorithms along with impact of implementing the recommended changes would create more clarity and value for the research. |
|
|||
[12] | A comparative analysis is performed to obtain the best cloud-based IoT platform for any business or organization by deliberating multiple criteria, functional and nonfunctional requirements among five giants, namely, Azure, AWS, SaS, ThingWorx, and Kaa IoT by application various techniques like analytical hierarchical process (AHP), |
The hierarchal method of requirement classification provides edge to the method and various statistical tests implemented on the results obtained creates increased sense of cogency or significance to the study. | The cloud-based IoT platforms are limited creating false sense of performance in terms of evaluating more than 5 platforms. Moreover, requirement classification into hierarchy is very time and effort intensive. |
|
|||
[13] | IoT applications built via cloud-based platforms are assayed for any kind of security challenge or data inconsistency issues that arise due to third party auditors, phishing attacks. It also provides strategies to prevent the same. | The objective of the study is very relevant to the need of the hour, providing valid and much needed information. It also provides recommendations handle the same. | The scope of study is limited to theoretical analysis without any real data implementation or case study to prove the cogency of the points mentioned in the paper. |
|
|||
[14] | This study poses to create a need for authorization in cloud-enabled IoT systems by assaying various security threats that such a set up encounters via two case studies in order. Proposing control-based authorization system | The aim of the study very cogent and current, deliberating recent developments of cloud-based IoT applications. The case studies presented aid to the cause of study while contributing to the significance of the proposed framework. | The framework proposed for control-based authorization lacks any sense of implementation or efforts towards prototype development. |
|
|||
[15] | An attack distribution detector is proposed to prevent malfunctioning of trust bounders in IoT-based applications, leading to severe data theft. A downsampler-encoder-based cooperative data generator is proposed to discriminate noisy data that may lead of data theft that malfunction trust boundaries. | The continuous updating and verification of the model provides it optimal results and performance to detection probable data thefts. The model outperforms primordial machine learning and deep learning techniques. | Inclusion of latest hybrid techniques in the domain for comparative analysis could further edify the study’s significance. |
|
|||
[16] | Various cogent issues with IoT middleware are brought to attention while proposing a state of art IoT middleware that can integrate with MQTT, CoAP, and HTTP as application-layer protocols. | The problem addressed by In.IoT framework is cogent, and its relevance has been shown very accurately in the study. | A comparative analysis with classical middleware and latest hybrid techniques could further edify the significance of the study. |
|
|||
[17] | An intrusion detection technique for cloud-based IoT application is proposed by implementing machine learning, to obtain state of art accuracy and in-depth analysis of source or type of intrusion. | The survey of 95 developments in intelligence-based intrusion detection techniques provides the study significant relevance and ground for comparative analysis with proposed technique. | Though the study shows optimal accuracy, false-positive results still hamper its cogency. |
This paper presents and develops a hybrid decision-making framework using two methodologies, namely, Fuzzy Set Theory and Matrix Multicriteria Decision-Making (MMCDM) where identification and categorization of 14 selection attribute are prepared into three categories, namely, quality factors, technical factors, and economic factors. After removing redundant features and filtering unnecessary information, thereby making this framework relatively less vulnerable to prerequisites and limitations as compared to available frameworks and techniques in cloud computing service selection.
3. Methodology
3.1. Security and Privacy Challenges in Cloud-Based IoT Platforms
While IoT and its applications are well explored and secure, the cloud-based IoT platforms are still comparatively less explored and nascent in nature [18]. Categorized in two purviews, static and mobile-based platforms both have variegated challenges on grounds of security and privacy. There are multiple security challenges including identity privacy that deals with protection of details of user of the cloud devices like his/her personal real-world information. Other threats include disclosure of the real-time location of user termed as location privacy [19]. Node compromising attack is also one of the most enduring threats to user’s privacy as it includes planned attacked to gain access to user’s private information [20]. Removal or addition of transmission multiple layers is a very mundane breach performed by various IoT users; it involves manipulating the concept of reward distribution when transmitting. Malicious IoT users add or remove the distribution layers to hamper the cycle or amount of reward distributed [25].
3.2. Distance-Based Approach
Distance-based approach (DBA) is an effective and efficient MCDM method. Identifying and defining the optimized state of the multiple attributes that are part of the process is the initial gradation in the proposed method. The optimal state represented by the vector OP is the set of best values of criteria over a range of alternatives. The best values can be maximum or minimum, defining the type of criteria.
Reference to Figure 1, as indicated, vector “OP” is the optimal point in a multidimensional space. It acts as a reference point to which the other values of all the alternatives are analyzed to one another quantitatively. In other words, an arithmetical difference of the current values of alternatives from their corresponding optimal values is taken, which represents the ability of the considered alternatives to achieve the optimal state. The decision-making issue which needs to be dealt with is searching for a viable solution on basis of its proximity to the optimal state.
[figure omitted; refer to PDF]
In Figure 1, “H” represents the feasible region and “Alt” as the alternative. The distance-based technique is aimed at determining a point in the “H” region and is in closest proximity to the optimal point.
To implement the above approach, let
This matrix is known as the decision matrix [
Using the following Equations (3), (4) and (5), the decision matrix is standardized to minimize the impact of different units of measurement and to simplify the process.
The final matrix is known as the standardized matrix [
The best value of each attribute is selected over the set of alternatives. The best values can be maximum or minimum values, depending on the type of attribute specified. The matrix formed using this set of values is known as the optimal matrix [
The distance of each of the alternatives from its optimal state is calculated as the numerical difference between the values of each of the attributes and their corresponding optimum counterparts. The resulting values form a matrix called the distance matrix [
Each value of this matrix is then squared and multiplied by their corresponding priority weights, as explained by Equation (9).
The resulting matrix is called the weighted distance matrix [
Equation (11) is used to calculate the composite distance, “CD” between each alternative to the optimal state.
The one-column matrix formed as a result of this equation is called the composite distance matrix [CD] as shown in (12).
The last step of this method involves calculating the rank of each alternative by using their composite distance values. The smallest value gets the 1st rank, the second smallest value gets the 2nd rank, and so on. This is how the DBA MCDM approach is used for cloud service provider selection. Below, Figure 2 represents the model development of the methodology.
[figure omitted; refer to PDF]
3.3. Estimation-of-Distribution Algorithms
These algorithms are general metaheuristics applied in optimization to represent a recent alternative to classical approaches [21]. EDAs build probabilistic models of promising solutions by repeatedly sampling and selecting points from the underlying search space. EDAs typically work with a population of candidate solutions to the problem, starting with the population generated according to the uniform distribution over all admissible solutions [22]. Many distinct approaches have been proposed for the estimation of probability distribution, such as Independent Variables, Bivariate Dependencies, and Multiple Dependencies.
4. Implementation, Results, and Discussions
Evaluating various cloud service providers using DBA (distance-based approach) methodology with Fuzzy Set Theory to calculate ranks based upon selection attributes is described by the following steps:
(1) Identification and selection of cloud service providers (CSP): with the aid of an experienced group of dedicated decision-makers, specialized in the field of Computer Science and Technology, an analysis of several cloud service providers was conducted, and 9 most widely used CSPs, namely, (1) Amazon Web Services(AWS), (2) Digital Ocean, (3) Google Cloud Platform, (4) Microsoft Azure, (5) RackSpace, (6) SoftLayer, (7) IBM Smart Cloud Enterprise, (8) GoGrid, and (9) Google Compute Engine, were filtered out by evaluating them on various conceptual and practical criteria based on both quality and usability, thereby selecting them after immense brainstorming sessions and collective use of elimination principle
(2) Identification of selection attributes: three major factors were identified which were, namely, quality factors, technical factors, and economic factors. They were further classified as: quality factors (functionality, reliability, usability, efficiency, maintainability, and portability), technical factors (storage capacity, CPU performance, memory utilization, platform design, and network speed), and economic factors (service induction cost, maintenance cost, and promotion cost) after the detailed analysis and intensive study of the cloud service providing industry and its various prerequisites along with understanding the market where this industry thrives (Figure 3).
(3) Application of Fuzzy Set Theory: fuzzy logic forms its basis upon human acumen of decision-making regarding vague and nebulous information. It grossly distinguishes real-world problems based upon human comprehensive skills rather than absolute Boolean logic. In other words, the fuzzy system implements scales rather than 0/1 for coherent human understanding where 0 represents absolute fallacy, 1 represents absolute truth, and the middle values represent the fuzziness or the fuzzy values. In this study, we have implemented a triple fuzzy number scale which uses a triplet set of the form [a, b, c] with a sensory scale (Tables 2 and 3) [28]. A survey was conducted among a group of 40 selected experts associated with the technical field. The (Table 2) questionnaire consisted of 14 pristine questions, based upon which a priority weights matrix was created consisting of the weights or values of the assorted attributes. While in the second questionnaire (Table 3), the nine already selected CSPs were appraised on the grounds of the 14 categorized selection attributes by an adept team of 5 experts. The extracted data from the questionnaires mentioned above were converted from a literal scale to TFN (Triple Fuzzy Number) scale, thereby averaged to a fuzzy number
(4) Determination of weights and performance ratings: the expert-assigned linguistic terms were first converted into corresponding TFNs using the fuzzy scale and then defuzzied to get crisp score values. The data was extracted from the questionnaires and then evaluated using a combination of the mathematical formulas and concepts of aggregation and average
(5) Creating performance rating matrices: a decision matrix of the performance ratings (Figure 4(a)) and a single-row matrix of the priority weights (Figure 4(b)) were created under the supervision of expert guidance using the fuzzy scale and MCDM
(6) Calculating standardized matrix: root mean square of each selection attributes is carefully evaluated; furthermore, the mean previously determined is subtracted from each value and simultaneously divided by the corresponding root mean square of that particular selection attribute to get the standardized matrix (Figure 5).
(7) Creating optimal and distance matrix: the optimal matrix is estimated by targeting the best values of each selected attribute of the standardized matrix (Figure 6(a)), i.e., the maximum values for quality and technical factors and minimum values for economic factors. Additionally, the distance matrix is calculated by finding the distance between each value of a particular selection attribute with its corresponding best value (Figure 6(b)).
(8) Calculating weighted and composite distance matrix: by squaring the respective values of the distance matrix and multiplying them to the corresponding priority weights, the weighted distance matrix was obtained (Figure 7(a)). The matrix formed was then used to evaluate the composite distance matrix by calculating the square root of the total sum of each alternative (Figure 7(b)).
(9) Ranking of cloud service providers: finally, the alternatives are ranked in decreasing order of their corresponding values in the composite distance matrix. Therefore, the least rank or rank 1 is most preferable while the maximum rank, i.e., rank 9, is least preferable considering the given set of alternatives (Table 4).
[figure omitted; refer to PDF]
Table 2
TFN scale for priority weights.
Symbols | TFN values |
Extremely most important (EMI) | [1, 1, 1] |
Very most important (VMI) | [0.8, 0.9, 1] |
Most important (MI) | [0.6, 0.7, 0.8] |
Important (I) | [0.4, 0.5, 0.6] |
Less important (LI) | [0.2, 0.3, 0.4] |
Very less important (VLI) | [0.0, 0.1, 0.2] |
Extremely less important (ELI) | [0.0, 0.0. 0.0] |
Table of TFN scale for importance of the 14 attributes during cloud service provider selection.
Table 3
TFN scale of performance ratings.
Symbols | TFN values |
Very high (VH) | [1, 1, 1] |
High (H) | [0.8, 0.9, 1] |
Above average (AA) | [0.6, 0.7, 0.8] |
Average (A) | [0.4, 0.5, 0.6] |
Below average (BA) | [0.2, 0.3, 0.4] |
Low (L) | [0.0, 0.1, 0.2] |
Very low (VL) | [0.0, 0.0. 0.0] |
Table of TFN scale for performance ratings of the 9 CSPs over the selection attributes.
[figures omitted; refer to PDF]
[figure omitted; refer to PDF]
[figures omitted; refer to PDF]
[figures omitted; refer to PDF]
Table 4
Rank of cloud service providers.
Cloud service providers | Composite distances | Rank |
Amazon Web Services | 2.079 | 8 |
Digital Ocean | 1.747 | 2 |
Google Cloud Platform | 1.844 | 5 |
Microsoft Azure | 1.852 | 7 |
RackSpace | 1.807 | 4 |
SoftLayer | 1.800 | 3 |
IBM Smart Cloud Enterprise | 1.850 | 6 |
GoGrid | 1.624 | 1 |
Google Compute Engine | 2.085 | 9 |
Table for ranking of various cloud service providers.
The selection of cloud service providers is a problematic task as many decision-making parameters are taken into consideration like security, cost optimization, availability, reliability, and fault tolerance, to name a few. Most of the mentioned factors are not constant and individualistic wherein every consumer who requires a cloud service provider has an almost unique set of demands and requisites, each having selected set of attributes has a different weight than other, i.e., prioritized attributes are not rare. Considering the presented scenario, Multicriteria Decision-Making technique has shown significant efficacy and is implemented in the field widely as it provides both individualistic and concurrent results.
Table 4 shows the ranking of nine cloud service providers based on fourteen carefully discerned attributes categorized in three categories, namely, quality factors (functionality, reliability, usability, efficiency, maintainability, and portability), technical factors (storage capacity, CPU performance, memory utilization, platform design, and network speed), and economic factors (service induction cost, maintenance cost, and promotion cost). The step-by-step gradation procedure described above where priority weights and decision matrix are extracted from surveys data using a fuzzy scale, which is then optimized-standardized and refined by priority weights as extracted from user survey data proves to be a simple, effective, and reliable method of action for selection of optimal cloud service provider. Figure 8 shows the graphical representation of the same.
[figure omitted; refer to PDF]
5. Conclusion and Future Work
Taking into consideration the current extensive use in the cloud-based IoT services for building computation, storage, infrastructure, and other needs has led to a greater demand for an efficient methodology to drive which given cloud service provider meets one’s unique and individualistic demands for fulfilling ever-changing solutions in the field of IoT. Given the scenario of current cloud-based IoT applications with multiple service providers and vivid requirements, a lot of decision-making criteria and methodologies already exist, some of which include TOPSIS that is a useful and straightforward technique for ranking several possible alternatives according to closeness to the ideal solution, or AHP, or VIKOR which is based on the aggregating fuzzy merit that represents the closeness of an alternative to the ideal solution by compromising between two or more options to get a unified opinion between multiple criteria, and PROMETHEE compares various measures available by the technique of outranking.
Despite the preexisting techniques to classify, evaluate, and rate various IoT-based cloud service providers due to continuously changing set of attributes, challenges user’s privacy and security, user authentication, location privacy, disparate demands of customers, and colossus pool of available attributes ranging from performance, cost optimization to quality, it becomes very peculiar to get virtually concurrent results for one’s ever-changing characteristics and agility even after discerning the given set of methodologies in the available literature. Therefore, this research meets all the scenarios mentioned above, demands and unique characteristics by using an optimized matrix methodology aided by distance-based approach (DBA), some of its salient features are as follows:
(a) Considering a broad set of categories that are further graded into subattributes, i.e., performance, technical and economic factors are individually optimized to get ultimate efficacy
(b) Simple, straightforward, reader-friendly, and easily captured and understood by anyone concept and procedure
(c) It is obtained by taking into consideration priorities among attributes as extracted from a user by surveyed data
Conclusively, in the presented research methodology, a distance-based approach with an optimized approach to consider priorities as set by data extracted from user survey in a simple, lucid yet compelling procedure to select an ideal cloud service provider for IoT applications. This study finds nine alternatives or popular cloud service providers and 14 attributes or deciding criteria.
Privacy and security are the two most emerging challenges in IoT applications as provided by cloud service providers due to the nascent nature of the field. Though IoT-based applications have already been explored from the aspects of privacy and security, implementing IoT applications via cloud-based platforms leads to a new set of possible threats. In future work, this study intends to evaluate variegated cloud-based IoT platforms from the aspects of security and privacy by analysing the same under the purview of three criteria. Firstly, the future work will deal with user’s individualistic threats of privacy and security like location privacy, breach of personal information, protection of user’s hardware and software devices, and user profile authentication. Other criteria include privacy and security challenges for a multilevel organization, namely, secure route establishment, isolation of malicious nodes, self-stabilization of the security protocol, and preservation of location privacy. Lastly, this study would assay multiple case studies of leading cloud-based IoT platforms’ breach of security and privacy to perform a comparative analysis of the same.
Consent
All the authors of this paper have shown their participation voluntarily.
Authors’ Contributions
Alakananda Chakraborty is responsible for the methodology; Muskan Jindal for the software and data curation; Mohammad R. Khosravi for the data curation and writing—original draft preparation; Achyut Shankar for the visualization and investigation; Prabhishek Singh for the supervision; Manoj Diwakar for the software and validation; and Achyut Shankar for the writing—reviewing and editing.
[1] R. Sikarwar, P. Yadav, A. Dubey, "A survey on IOT enabled cloud platforms," 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), pp. 120-124, DOI: 10.1109/CSNT48778.2020.9115735, .
[2] N. Almolhis, A. M. Alashjaee, S. Duraibi, F. Alqahtani, A. N. Moussa, "The security issues in IoT-cloud: a review," 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), pp. 191-196, DOI: 10.1109/CSPA48992.2020.9068693, .
[3] M. Ullah, P. H. Nardelli, A. Wolff, K. Smolander, "Twenty-one key factors to choose an IoT platform: theoretical framework and its applications," 2020. https://arxiv.org/pdf/2004.04924
[4] H. M. Alabool, A. K. Mahmood, "Trust-based service selection in public cloud computing using fuzzy modified VIKOR method," Australian Journal of Basic and Applied Sciences, vol. 7 no. 9, pp. 211-220, 2013.
[5] Z. Rehman, O. K. Hussain, F. K. Hussain, "Parallel cloud service selection and ranking based on QoS history," International Journal of Parallel Programming, vol. 42 no. 5, article 276, pp. 820-852, DOI: 10.1007/s10766-013-0276-3, 2014.
[6] P. Ganguly, "Selecting the right IoT cloud platform," 2016 International Conference on Internet of Things and Applications (IOTA), pp. 316-320, DOI: 10.1109/IOTA.2016.7562744, .
[7] P. Varga, J. Peto, A. Franko, D. Balla, D. Haja, F. Janky, G. Soos, D. Ficzere, M. Maliosz, L. Toka, "5G support for industrial IoT applications–challenges, solutions, and research gaps," Sensors, vol. 20 no. 3,DOI: 10.3390/s20030828, 2020.
[8] M. Lin, C. Huang, Z. Xu, R. Chen, "Evaluating IoT platforms using integrated probabilistic linguistic MCDM method," IEEE Internet of Things Journal, vol. 7 no. 11, pp. 11195-11208, DOI: 10.1109/JIOT.2020.2997133, 2020.
[9] A. E. Youssef, "An integrated MCDM approach for cloud service selection based on TOPSIS and BWM," IEEE Access, vol. 8, pp. 71851-71865, DOI: 10.1109/ACCESS.2020.2987111, 2020.
[10] Y. Wang, Y. Lin, R. Y. Zhong, X. Xu, "IoT-enabled cloud-based additive manufacturing platform to support rapid product development," International Journal of Production Research, vol. 57 no. 12, pp. 3975-3991, DOI: 10.1080/00207543.2018.1516905, 2018.
[11] V. S. Narwane, B. E. Narkhede, R. D. Raut, B. B. Gardas, P. Priyadarshinee, M. S. Kavre, "To identify the determinants of the CloudIoT technologies adoption in the Indian MSMEs: structural equation modelling approach," International Journal of Business Information Systems, vol. 31 no. 3, pp. 322-353, DOI: 10.1504/IJBIS.2019.101110, 2019.
[12] A. Mijuskovic, I. Ullah, R. Bemthuis, N. Meratnia, P. Havinga, "Comparing apples and oranges in IoT context: a deep dive into methods for comparing IoT platforms," IEEE Internet of Things Journal, vol. 8 no. 3, pp. 1797-1816, DOI: 10.1109/JIOT.2020.3016921, 2021.
[13] L. Surya, "Security challenges and strategies for the IoT in cloud computing," International Journal of Innovations in Engineering Research and Technology ISSN, vol. 3, pp. 2394-3696, 2016.
[14] S. Bhatt, A. T. Lo’ai, P. Chhetri, P. Bhatt, "Authorizations in cloud-based internet of things: current trends and use cases," 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC), pp. 241-246, DOI: 10.1109/FMEC.2019.8795309, .
[15] M. M. Hassan, M. R. Hassan, S. Huda, V. H. C. de Albuquerque, "A robust deep learning enabled trust-boundary protection for adversarial industrial IoT environment," IEEE Internet of Things Journal, vol. 8,DOI: 10.1109/JIOT.2020.3019225, 2020.
[16] M. A. da Cruz, J. J. Rodrigues, P. Lorenz, V. Korotaev, V. H. C. de Albuquerque, "In. IoT—a new middleware for internet of things," IEEE Internet of Things Journal, vol. 8,DOI: 10.1109/JIOT.2020.3041699, 2020.
[17] K. A. da Costa, J. P. Papa, C. O. Lisboa, R. Munoz, V. H. C. de Albuquerque, "Internet of Things: a survey on machine learning-based intrusion detection approaches," Computer Networks, vol. 151, pp. 147-157, DOI: 10.1016/j.comnet.2019.01.023, 2019.
[18] S. Satyadevan, B. S. Kalarickal, M. K. Jinesh, "Security, trust and implementation limitations of prominent IoT platforms," Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), pp. 85-95, DOI: 10.1007/978-3-319-12012-6_10, .
[19] X. Li, Q. Wang, X. Lan, X. Chen, N. Zhang, D. Chen, "Enhancing cloud-based IoT security through trustworthy cloud service: an integration of security and reputation approach," IEEE Access, vol. 7, pp. 9368-9383, DOI: 10.1109/ACCESS.2018.2890432, 2019.
[20] C. Stergiou, K. E. Psannis, B. G. Kim, B. Gupta, "Secure integration of IoT and cloud computing," Future Generation Computer Systems, vol. 78, pp. 964-975, DOI: 10.1016/j.future.2016.11.031, 2018.
[21] J. Zhou, Z. Cao, X. Dong, A. V. Vasilakos, "Security and privacy for cloud-based IoT: challenges," IEEE Communications Magazine, vol. 55 no. 1, pp. 26-33, DOI: 10.1109/MCOM.2017.1600363CM, 2017.
[22] M. Hauschild, M. Pelikan, "An introduction and survey of estimation of distribution algorithms," Swarm and Evolutionary Computation, vol. 1 no. 3, pp. 111-128, DOI: 10.1016/j.swevo.2011.08.003, 2011.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2021 Alakananda Chakraborty et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
With the growing emergence of the Internet connectivity in this era of Gen Z, several IoT solutions have come into existence for exchanging large scale of data securely, backed up by their own unique cloud service providers (CSPs). It has, therefore, generated the need for customers to decide the IoT cloud platform to suit their vivid and volatile demands in terms of attributes like security and privacy of data, performance efficiency, cost optimization, and other individualistic properties as per unique user. In spite of the existence of many software solutions for this decision-making problem, they have been proved to be inadequate considering the distinct attributes unique to individual user. This paper proposes a framework to represent the selection of IoT cloud platform as a MCDM problem, thereby providing a solution of optimal efficacy with a particular focus in user-specific priorities to create a unique solution for volatile user demands and agile market trends and needs using optimized distance-based approach (DBA) aided by Fuzzy Set Theory.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details






1 Amity School of Engineering and Technology, Amity University Uttar Pradesh, Noida, India
2 Department of Computer Engineering, Persian Gulf University, Iran
3 Graphic Era Deemed to be University Dehradun, India