Securing Cloud-Based Internet of Things: Challenges and Mitigations
- PMID: 39796870
- PMCID: PMC11723188
- DOI: 10.3390/s25010079
Securing Cloud-Based Internet of Things: Challenges and Mitigations
Abstract
The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a paradigm shift in the digital landscape. However, these technological strides have introduced new challenges, particularly in cybersecurity. IoT devices, inherently connected to the internet, are susceptible to various forms of attacks. Moreover, IoT services often handle sensitive user data, which could be exploited by malicious actors or unauthorized service providers. As IoT ecosystems expand, the convergence of traditional and cloud-based systems presents unique security threats in the absence of uniform regulations. Cloud-based IoT systems, enabled by Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) models, offer flexibility and scalability but also pose additional security risks. The intricate interaction between these systems and traditional IoT devices demands comprehensive strategies to protect data integrity and user privacy. This paper highlights the pressing security concerns associated with the widespread adoption of IoT devices and services. We propose viable solutions to bridge the existing security gaps while anticipating and preparing for future challenges. This paper provides a detailed survey of the key security challenges that IoT services are currently facing. We also suggest proactive strategies to mitigate these risks, thereby strengthening the overall security of IoT devices and services.
Keywords: IaaS; IoT privacy; IoT security; cloud; security.
Conflict of interest statement
The authors declare no conflicts of interest.
Figures




Similar articles
-
Device-Based Security to Improve User Privacy in the Internet of Things †.Sensors (Basel). 2018 Aug 14;18(8):2664. doi: 10.3390/s18082664. Sensors (Basel). 2018. PMID: 30110880 Free PMC article.
-
Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance.Front Artif Intell. 2024 May 15;7:1397480. doi: 10.3389/frai.2024.1397480. eCollection 2024. Front Artif Intell. 2024. PMID: 38845684 Free PMC article. Review.
-
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.Sensors (Basel). 2019 Apr 14;19(8):1788. doi: 10.3390/s19081788. Sensors (Basel). 2019. PMID: 31013993 Free PMC article.
-
Security Requirements for the Internet of Things: A Systematic Approach.Sensors (Basel). 2020 Oct 19;20(20):5897. doi: 10.3390/s20205897. Sensors (Basel). 2020. PMID: 33086542 Free PMC article.
-
A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis.Sensors (Basel). 2020 Jun 28;20(13):3625. doi: 10.3390/s20133625. Sensors (Basel). 2020. PMID: 32605178 Free PMC article. Review.
Cited by
-
Large Language Model-Powered Protected Interface Evasion: Automated Discovery of Broken Access Control Vulnerabilities in Internet of Things Devices.Sensors (Basel). 2025 May 5;25(9):2913. doi: 10.3390/s25092913. Sensors (Basel). 2025. PMID: 40363350 Free PMC article.
-
Advancements in Biomedical Sensors for Early Detection of Failure in Hip and Knee Implants: Scoping Review on Potential Sensors for Implant Integration.Ann Biomed Eng. 2025 Jul 2. doi: 10.1007/s10439-025-03780-5. Online ahead of print. Ann Biomed Eng. 2025. PMID: 40603592 Review.
-
Gel-Based Self-Powered Nanogenerators: Materials, Mechanisms, and Emerging Opportunities.Gels. 2025 Jun 12;11(6):451. doi: 10.3390/gels11060451. Gels. 2025. PMID: 40558750 Free PMC article. Review.
References
-
- Kumar S., Tiwari P., Zymbler M. Internet of Things is a revolutionary approach for future technology enhancement: A review. J. Big Data. 2019;6:1–21. doi: 10.1186/s40537-019-0268-2. - DOI
-
- Kamal M., Aljohani A., Alanazi E. IoT meets COVID-19: Status, Challenges, and Opportunities. arXiv. 20202007.12268
-
- Tabrizi S.S., Ibrahim D. A Review on Cloud Computing and Internet of Things. Int. J. Comput. Inf. Eng. 2017;11:493–498.
-
- Alrawi O., Lever C., Antonakakis M., Monrose F. Sok: Security evaluation of home-based iot deployments; Proceedings of the 2019 IEEE Symposium on Security and Privacy; San Francisco, CA, USA. 13–23 May 2019; pp. 1362–1380.
-
- Apthorpe N., Reisman D., Feamster N. A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic. arXiv. 20171705.06805
Publication types
Grants and funding
LinkOut - more resources
Full Text Sources
Research Materials