(Received: 13-Jun.-2020, Revised: 9-Aug.-2020 , Accepted: 9-Sep.-2020)
In this era of communication and networking technology, Internet of Things adds to the existing technological era and brings revolution to the Information Technology world. Internet of Things consists of interconnected devices which may be digital, physical or mechanical devices equipped with unique identifiers and having the capability to transmit the sensed information to other devices autonomously. Internet of Things is recognized as being composed of resource constraint devices in terms of processing competency, storage capacity and power resources. To cope up these constraints, existing computing technology known as cloud computing can be used to facilitate the Internet of Things system by offloading its processing and storage requirements. In this paper, we have provided the necessity and benefits of Cloud and IoT integration. Further, the paper has identified several research issues that arise due to Cloud-IoT integration. Among the several research issues, it was observed that security and privacy concerns are pivotal in Cloud-IoT integration and need to be addressed to make the integration successful. The core security and privacy threats have been identified and the existing security mechanisms have also been researched in this paper. The paper also highlights open security and privacy research issues in the Cloud-IoT paradigm. This paper can act as a baseline for the research that is needed in the area of security and privacy issues in the Cloud-IoT or Cloud of Things paradigm.

[1] K. Lounis and M. Zulkernine, "Attacks and Defenses in Short-range Wireless Technologies for IoT," IEEE Access, vol. 8, pp. 88892-88932, DOI: 10.1109/ACCESS.2020.2993553, 2020.

[2] S. Kumar, P. Tiwari and M. Zymbler, "Internet of Things Is a Revolutionary Approach for Future Technology Enhancement: A Review," Journal of Big Data, vol. 6, Article no. 111, 2019.

[3] O. Mashal, T-Y. Alsaryrah, C-Z. Chung, Z. Yang, W.-H. Kuo et al., "Choices for Interaction with Things on Internet and Underlying Issues," Ad Hoc Networks, vol. 28, pp. 68–90, 2015.

[4] O. Said and M. Masud, "Towards Internet of Things: Survey and Future Vision," International Journal of Computer Networks, vol. 5, no. 1, pp. 1–17, 2013.

[5] F. Firouzi, K. Chakrabarty and S. Nassif, "Intelligent Internet of Things: From Device to Fog and Cloud," Springer, Cham, DOI:, 2020.

[6] H. F. Atlam, A. Alenezi, R. J. Walters and G. B. Wills, "An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things," Proc. of the 2nd International Conference on Internet of Things, Big Data and Security, pp. 1–8, [Online], available: papers/2017/62926/62926.pdf, 2017.

[7] S. Rabhakar, "Network Security in Digitalization: Attacks and Defence," International Journal of Research in Computer Applications and Robotics, vol. 5, no. 5, pp. 46–52, 2017.

[8] B. Ali and A. I. Awad, "Cyber and Physical Security Vulnerability Assessment for IoT-based Smart Homes," Sensors, vol. 18, no. 3, Article no. 817, 2018.

[9] A.Sanzgiri and D. Dasgupta, "Classification of Insider Threat Detection Techniques," Proc. of the 11th Annual Cyber and Information Security Research Conference, p. 25, ACM, Oak Ridge, USA, 2016.

[10] P. Sethi and S. Sarangi, "Internet of Things: Architectures, Protocols and Applications," Journal of Electrical and Computer Engineering, vol. 2017, Article ID 9324035, pp. 1-25, DOI: 10.1155/2017/9324035, 2017. 

[11] T. Qiu, N. Chen, K. Li, M. Atiquzzaman and W. Zhao, "How Can Heterogeneous Internet of Things Build Our Future: A Survey," IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2011- 2027, DOI: 10.1109/COMST.2018.2803740, 2018.

[12] G. Daly et al. "Cloud Customer Architecture for IoT," Cloud Standards and Customer, Council Whitepaper, [Online], Available: Architecture-for-IoT.pdf, 2016.

[13] Z. Qureshi, N. Agrawal and D. Chouhan, "Cloud Based IoT : Architecture, Application, Challenges and Future," International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 3, no. 7, pp. 359–368, 2018.

[14] J. Zhou et al., "Cloud Things: A Common Architecture for Integrating the Internet of Things with Cloud Computing," Proceedings of the IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Whistler, BC, pp. 651-657, DOI: 10.1109/CSCWD.2013.6581037, 2013.

[15] I. Odun-Ayo, C. Okereke and E. Orovwode, "Cloud Computing and Internet of Things: Issues and Developments," Proceedings of the World Congress on Engineering (WCE 2018), vol. I, London, U.K., [Online], Available:, July 2018.

[16] D. Salvatore, M. Giovanni and P. Antonio, "A Utility Paradigm for IoT: The Sensing Cloud," Pervasive and Mobile Computing, vol. 20, pp. 127-144, [Online], Available: 09.006, 2015.

[17] H. Atlam, A. Alenezi, A. Alshdadi, R. Walters and G. Wills, "Integration of Cloud Computing with Internet of Things: Challenges and Open Issues," Proc. of IEEE International Conference on Internet of Things (iThings) and IEEE Green Comp. and Com. (GreenCom), pp. 670-675, Exeter, UK, 2017.

[18] S. Christos, E. P. Kostas, K. Byung-Gyu and G. Brij, "Secure Integration of IoT and Cloud Computing," Future Generation Computer Systems, vol. 78, no. 3, pp. 964-975, 2018.

[19] F. Alhaidari, A. Rahman and R. Zagrouba, "Cloud of Things: Architecture, Applications and Challenges," Journal of Ambient Intelligence and Humanized Computing, [Online], Available:, 2020.

[20] M. B. Yassein, I. Hmeidi, A. Alsmadi and M. Shatnawi, "Cloud Computing Role in Internet of Things: Business Community Survey," Proc. of the 11th Int. Conf. on Information and Communication Systems (ICICS), pp. 343-348, DOI: 10.1109/ICICS49469.2020.239533, Irbid, Jordan, 2020.

[21] D. Kelaidonis, A. Rouskas, V. Stavroulaki, P. Demestichas and P. Vlacheas, "A Federated Edge Cloud- IoT Architecture," Proc. of IEEE European Conference on Networks and Communications (EuCNC), pp. 230-234, DOI: 10.1109/EuCNC.2016.7561038, Athens, Greece, 2016.

[22] L.Celic and R. Magjarevic, "Seamless Connectivity Architecture and Methods for IoT and Wearable Devices," Automatika. vol. 61, pp. 21-34, 2020.

[23] T. Bhattasali, R. Chaki and N. Chaki, "Secure and Trusted Cloud of Things," Proc. of the Annual IEEE India Conference (INDICON), pp. 1-6, Mumbai, India, 2013.

[24] S. Kamburugamuve, L. Christiansen and G. Fox, "A Framework for Real Time Processing of Sensor Data in the Cloud," Journal of Sensors, vol. 2015, Article ID 468047, pp. 1-11, 2015.

[25] L. Hou et al., "Internet of Things Cloud: Architecture and Implementation," IEEE Communications Magazine, vol. 54, no. 12, pp. 32-39, DOI: 10.1109/MCOM.2016.1600398CM, Dec. 2016.

[26] R. K. Dwivedi, S. Singh and R. Kumar, "Integration of Wireless Sensor Networks with Cloud: A Review," Proc. of the 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence), pp. 114-119, DOI: 10.1109/CONFLUENCE.2019.8776968, Noida, India, 2019.

[27] S. M. Babu, A. J. Lakshmi and B. T. Rao, "A Study on Cloud Based Internet of Things: CloudIoT," Proc. of IEEE Global Conference on Communication Technologies (GCCT), pp. 60-65, DOI: 10.1109/GCCT.2015.7342624, Thuckalay, India, 2015.

[28] M. Korunoski and M. Gushev, "Evaluating the Scalability of a Big Data IoT Cloud Solution," Proc. of the 18th IEEE Int. Conf. on Smart Technologies (EUROCON 2019), pp. 1–5, Novi Sad, Serbia, 2019.

[29] U. Onoriode and G. Kotonya, "IoT Architectural Framework: Connection and Integration Framework for IoT Systems," First Workshop on Architectures, Languages and Paradigms for IoT EPTCS 264, Electronic Proceedings in Theoretical Computer Science, pp. 1-17, DOI: 10.4204/EPTCS.264.1, 2018.

[30] C. Modi, D. Patel, B. Borisaniya and H. Patel, "A Survey of Intrusion Detection Techniques in Cloud," Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42–57, 2013.

[31] S. Yangui, R. H. Glitho, F. Belqasmi, M. J. Morrow and P. A. Polakos, "IoT End-user Applications Provisioning in the Cloud: State-of-the-Art," Proc. of IEEE International Conference on Cloud Engineering (IC2E), pp. 232-233, DOI: 10.1109/IC2E.2016.43, Berlin, Germany, 2016.

[32] M. Elkhodr, S. Shahrestani and H. Cheung, "The Internet of Things: New Interoperability, Management and Security Challenges," International Journal of Network Security & Its Applications, vol. 8, no. 2, pp. 85-102, 2016.

[33] P. Zdankin and T. Weis, "Longevity of Smart Homes," Proc. of IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 1-2, DOI: 10.1109/PerComWorkshops48775.2020.9156155, Austin, TX, USA, 2020.

[34] P. Sarwesh, N. S. V. Shet and K. Chandrasekaran, "Energy Efficient and Reliable Network Design to Improve Lifetime of Low Power IoT Networks," Proc. of the International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 117-122, DOI: 10.1109/WiSPNET.2017.8299731, Chennai, India, 2017.

[35] C. Butpheng, K.-H. Yeh and H. Xiong, "Security and Privacy in IoT-Cloud-Based e-Health Systems: A Comprehensive Review," Symmetry, vol. 12, no. 7, Article ID 1191, 2020.

[36] S. Aguzzi et al., "Definition of a Research and Innovation Policy Leveraging Cloud Computing and IoT Combination," Report by European Commission, [Online], Available: single-market/en/news/definition-research-and-innovation-policy-leveraging-cloud-computing-and-iot- combination, 2015.

[37] Y. Chen, "IoT, Cloud, Big Data and AI in Interdisciplinary Domains," Simulation Modeling Practice and Theory," vol. 102, 2020, DOI: 10.1016/j.simpat.2020.102070, 2020.

[38] R. Saboori, B. Sharma, N. Kumar and G. Gupta, "IoT-based Healthcare Support Services for Arrhythmia: A Review," Journal of Xi'an University of Architecture & Technology, vol. XII, no. VI, pp. 1035-1039, 2020.

[39] D. M. Donno, A. Giaretta, N. Dragoni, A. Bucchiarone and M. Mazzara, "Cyber-storms Come from Clouds: Security of Cloud Computing in the IoT Era," Future Internet, vol. 11, Article ID 127, DOI: 10.3390/fi11060127, 2019.

[40] A. Adamou et al., "Enabling Privacy and Security in Cloud of Things: Architecture, Applications, Security & Privacy Challenges," Applied Computing and Informatics, Elsevier, [Online], Available:, 2019.

[41] A. Sajid, H. Abbas and K. Saleem, "Cloud-assisted IoT-based SCADA Systems Security: A Review of the State-of-the-Art and Future Challenges," IEEE Access, vol. 4, pp. 1375-1384, 2016.

[42] F. Md Sadek et al., "Threat Taxonomy for Cloud of Things," In Book: Internet of Things and Big Data Analysis: Recent Trends and Challenges, Edition 1, Chapter 5, pp. 149-190, United Scholars Publications, 2016.

[43] M. Babaghayou, N. Labraoui and A. A. A. Ari, "EPP: Extreme Points Privacy for Trips and Home Identification in Vehicular Social Networks," Proc. of the 3rd Edition of the National Study Day on Research on Computer Sciences (JERI2019), [Online], Available: 2351/paper_67.pdf, Saida, Algeria, 2019.

[44] R. Roman, J. Zhou and J. Lopez, "On the Features and Challenges of Security and Privacy in Distributed Internet of Things," Computer Networks, vol. 57, no. 10, pp. 2266-2279, 2013.

[45] S. Babar, A. Stango, N. Prasad, J. Sen and R. Prasad, "Proposed Embedded Security Framework for Internet of Things," Proc. of the 2nd IEEE International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), pp. 1–5, Chennai, India, 2011.

[46] C. Modi, D. Patel, B. Borisaniya et al., "A Survey on Security Issues and Solutions at Different Layers of Cloud Computing," Journal of Supercomputing, vol. 63, pp. 561–592, 2013.

[47] D. Catteddu and G. Hogben, "The European Network and Information Security Agency (ENISA): Emerging and Future Risk Programme." Computing, vol. 72, no. 1, pp. 2009–2013, 2009.

[48] Y. A. Hamza and M. D. Omar, "Cloud Computing Security : Abuse and Nefarious Use of Cloud Computing," Int. Journal of Computational Engineering Research, vol. 3, no. 6, pp. 22-27, 2013.

[49] Y. Zhang, D. Zheng, R.H. Deng, "Security and Privacy in Smart Health: Efficient Policy-hiding Attribute-based Access Control, " IEEE Internet of Things Journal, vol. 5, no. 3, pp. 2130-2145, 2018.

[50] Z. H. Hu, "The Research of Several Key Questions of Internet of Things," Proc. of IEEE International Conference on Intelligence Science and Information Engineering, pp. 362-365, Wuhan, China, 2011.

[51] H. Suo, J. Wan, C. Zou and J. Liu, "Security in the Internet of Things: A Review," Proc. of the International Conference on Computer Science and Electronics Engineering, pp. 648-651, DOI: 10.1109/ICCSEE.2012.373, Hangzhou, 2012.

[52] A. Alsaidi, "Security Attacks and Countermeasures on Cloud-assisted IoT Applications," Proc. of IEEE International Conference on Smart Cloud, pp. 213–217, NY, USA, 2018.

[53] K. N. Pallavi, V. R. Kumar and S. Srikrishna, "Comparative Study of Various Lightweight Cryptographic Algorithms for Data Security between IoT and Cloud," Proc. of the 5th International Conference on Communication and Electronics Systems (ICCES), pp. 589-593, DOI: 10.1109/ICCES48766.2020.9137984, Coimbatore, India, 2020.

[54] I. K. Dutta, B. Ghosh and M. Bayoumi, "Lightweight Cryptography for Internet of Insecure Things: A Survey," Proc. of the 9th IEEE Annual Computing and Communication Workshop and Conference (CCWC), pp. 0475-0481, DOI: 10.1109/CCWC.2019.8666557, Las Vegas, NV, USA, 2019.

[55] D. Kishore Kumar, G.Venkatewara Rao and G.Srinivasa Rao, "Cloud Computing: An Analysis of Its Challenges & Security Issues," Int. J. of Computer Science and Network (IJCSN), vol. 1, no. 5, 2012.

[56] X. Wang, Z. Ning, M. Zhou, X. Hu, L. Wang, B. Hu, R.Y. Kwok and Y. Guo, "A Privacy Preserving Message Forwarding Framework for Opportunistic Cloud of Things," IEEE Internet of Things Journal, vol. 5, no. 6, pp.5281–5295, 2018.

[57] S. Sharma, M. A. R. Shuman, A. Goel, A. Aggarwal, B. Gupta, S. Glickfield and I. D. Guedalia, "Context-aware Actions among Heterogeneous Internet of Things Devices," US Patent App., 14/187,156, 2014.

[58] A. Hameed and A. Alomary, "Security Issues in IoT: A Survey," Proc. of the International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), pp. 1-5, DOI: 10.1109/3ICT.2019.8910320, Sakhier, Bahrain, 2019.

[59] P. Eugster, S. Kumar, S. Savvides and J. J. Stephen, "Ensuring Confidentiality in the Cloud of Things," IEEE Pervasive Computing, vol. 18, no. 1, pp. 10-18, DOI: 10.1109/MPRV.2018.2877286, 2019.

[60] H. Zhu et al., "A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature," IEEE Access, vol. 7, pp. 90036–90044, 2019.

[61] F. Daneshgar, O. A. Sianaki and A. Ilyas, "Overcoming Data Security Challenges of Cloud of Things: An Architectural Perspective," Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2019), Part of the Advances in Intelligent Systems and Computing, vol. 993, Springer, Cham, DOI: 10.1007/978-3-030-22354-0_58, 2020.

[62] P. Eugster, S. Kumar, S. Savvides and J. Stephen, "Ensuring Confidentiality in the Cloud of Things," IEEE Pervasive Computing, vol. 18, pp. 10-18, DOI: 10.1109/MPRV.2018.2877286, 2019.

[63] K. Mwangi, M. Shedden and J. Mandu, "Modelling Malware Propagation on the Internet of Things Using an Agent-based Approach on Complex Networks," Jordanian Journal of Computers and Information Technology (JJCIT), vol. 6, no. 1, pp. 26-40, 2019.

[64] Y. Hyunsik and K. Young, "Design and Implementation of High-availability Architecture for IoT- Cloud Services," Sensors, vol. 19, no. 15, Article ID 3276, 2019.

[65] M. A. Khan, S. Member and M. Y. Khan, "A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-based Medical Sensor Data," IEEE Access, vol. 8, pp. 52018–52027, 2020.

[66] B. Adil and M. Ajaz, "Securing Communication in MQTT-enabled Internet of Things with Lightweight Security Protocol," EAI Endorsed Transactions on Internet of Things, vol. 3, no. 12, Article ID 154390, DOI: 10.4108/eai.6-4-2018.154390, 2018.

[67] B. Alohali, M. Merabti and K. Kifayat, "A Secure Scheme for a Smart House Based on Cloud of Things (CoT)," Proc. of the 6th IEEE Computer Science and Electronic Engineering Conference (CEEC), pp. 115–120, Colchester, UK, 2014.

[68] T. D. P. Bai and S. A. Rabara, "Design and Development of Integrated, Secured and Intelligent Architecture for Internet of Things and Cloud Computing," Proc. of the 3rd IEEE International Conference on Future Internet of Things and Cloud, pp. 817–822, Rome, Italy, 2015.

[69] S. Kumari, X. Li, F. Wu, A. K. Das, K.-K. R. Choo and J. Shen, "Design of a Provably Secure Biometrics-based Multi-cloud-server Authentication Scheme," Future Generation Computer Systems, vol. 68, pp. 320–330, 2017.

[70] A. Alrawais, A. Alhothaily, C. Hu and X. Cheng, "Fog Computing for the Internet of Things: Security and Privacy Issues," IEEE Internet Computing, vol. 21, no. 2, pp. 34–42, 2017.

[71] V. Valter, A. Aleksandar, P. Krešimir, M. Miljenko and Z. Ivana, "Adaptable Secure Communication for the Cloud of Things," Journal of Software: Practice and Experience, vol. 47, no. 3, pp. 489-501, 2017.

[72] K. Sundus and I. Almomani, "Mobility Effect on the Authenticity of Wireless Sensor Networks," Proc. of IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pp. 286-292, DOI: 10.1109/JEEIT.2019.8717497, Amman, Jordan, 2019.

[73] B. Alohali, "Security in Cloud of Things (CoT)," In Book: Cloud Security: Concepts, Methodologies, Tools and Applications," IGI Global, pp. 1188–1212, DOI: 10.4018/978-1-5225-8176-5, 2019.