Cloud of Things: Architecture, Applications and Challenges: Fahd Alhaidari Atta Rahman Rachid Zagrouba
Cloud of Things: Architecture, Applications and Challenges: Fahd Alhaidari Atta Rahman Rachid Zagrouba
https://doi.org/10.1007/s12652-020-02448-3
ORIGINAL RESEARCH
Abstract
Nowadays, Cloud Computing and Internet of Things (IoT) are amongst the most emerging internet technologies
playing a vital role in our daily lives. In the near future, their usage is expected to be increased exponentially
that is making them the important technologies of the future internet. Cloud Computing provides access to
unlimited capacities and capabilities, such as computation, processing, and storage through a shared group of
resources. That can easily be acquired and dynamically assigned to potential IoT based applications. Because,
IoT devices and applications are rather defcient in terms of these capabilities. This paper is primarily dedicated
to investigating the integration of technologies of Mobile Computing, Cloud Computing and IoT; coined as
Cloud of Things (CoT), its characteristics, architectures, potential challenges with possible solutions and
applications.
Keywords Cloud Computing · Mobile Computing · Cloud of Things · IoT · MCC · CoT issues and
challenges · CoT applications
Vol.:(0123456789) 13
F. Alhaidari et al.
13
Cloud of Things: architecture, applications and challenges
13
F. Alhaidari et al.
users provided with services available on a cloud in virus scanning, and authenti
the mobile device. These services operate on mobile cation (Qi and Gani 2012; Dinh et al. 2013).
devices (smartphones and their variants) for the 3) Storage capacity/accessibility
users as if they were operating on conventional Storage is one of the main concerns in mobile
devices such as personal comput devices, people face the full-storage problem in
ers or laptops (Perez and Kumar 2017). It is predicted their mobile devices. With MCC, people can use
that by 2025, each human being will own an average sharing on cloud feature, it enables them to
of six mobile devices summing up to 50 billion more upload data such as images on the clouds and
devices (Bhullar et al. 2014). can easily access any time. It also provides
MCC has supported mobile devices with serval backup and recovery (Qu et al. 2017). There are
features which enhanced its performance to its users many examples of applications that support
and provides convenience in many ways. In the sharing on the cloud, the frst example is Amazon
following points, we dis cuss few advantages of MCC Simple Ser vice Storage, which allows users to
in general. upload fles. Another example is image photo
sharing, it allows users to upload photos.
1) Battery lifetime Examples of applications based on image photo
Enhancing CPU performance to reduce power con sharing are Flicker, Facebook (Dinh et al. 2013),
sumption require changing in the structure of and ShoZu (Oludele and Oluwabukola 2016),
mobile devices or need an advanced or new respectively.
hardware, which will result in increasing the cost 4) Dynamic provisions
of these devices (Jin et al. 2019). To solve the Dynamic provisions are an efective way for service
problem of large power com putation by avoiding providers, they can run the applications without
long application execution time on mobile resource
devices. There is a technique called consump tion reservations (Dinh et al. 2013; Oludele and
ofoading (Wu 2018), the target of this technique is Oluwabu kola 2016).
migrating large computation with complex 5) Scalability
processing from limited resources like mobile The Cloud can scale services based on the users’
devices to capable machines like a cloud (Qi and needs (Qu et al. 2017). Internet service providers
Gani 2012; Dinh et al. 2013). (ISPs) can efectively expand application and
2) Reliability service without or with a small constraint on the
With storage capability in cloud computing, people resource usage (Oludele and Oluwabukola 2016;
can easily store and retrieve data and run Shamim et al. 2015).
applications on the clouds, this feature will Few essential characteristics of MCC. These charac
eliminate the risk of data lost on mobile devices. teristics are namely the Flexibility or Elasticity,
MCC can be used as a comprehen Scalabil ity of Infrastructure, Broad Network
sive data security model for users and service Access, Location Independence, and reliability
providers. There are numbers of security services (Sharma and Soni 2013; Rajak and Shukla 2018).
can be provided remotely to the users, examples Figure 3 shows the overall architecture of a typical
of these services are: malicious code detection, mobile cloud computing environment.
2.1 Applications of mobile cloud computing application is represented by mobile brokerage.
Mobile brokerage is a stock market service available
There are several applications of MCC (Yang and on mobile devices which enables users to interact
Hwang 2013; Alnanih et al. 2013; Gavalas et al. with the market online in a timely manner, regardless
2014; Elazhary et al. 2017a, b; Ozinga et al. 2017; of location limitations (Oludele and Oluwabukola
Harari et al. 2017), here few of them are discussed. 2016; Rountree and Castrillo 2014; Kaur and Kaur
2014; Vinh 2018). 2) Mobile healthcare
1) M-commerce Mobile healthcare ofers convenient help to access
Mobile commerce, also as known as the next gen healthcare resources such as health records
eration E-commerce, it refers to the trading of goods efciently and easily (Dash et al. 2019; Rahman
or services through internet-enabled mobile devices et al. 2018a, b; Mosa et al. 2012). Mobile cloud
such as smartphones, tablets, and PDAs. Mobile computing applications in healthcare schemes
banking is one example of mobile commerce, many are:
banks nowa days make use of mobile cloud • Enabling the healthcare providers to monitor the
computing technology to make their services easily patient at anytime and anywhere using broadband
and reachable by their clients. Through your bank wireless communication technologies. This may
mobile application, you can make online fnancial be one way or two-way communication, that is
transactions, access your account infor mation, just alert or alert and response.
purchase and stocks. Similarly, another M-com merce • Managing and coordinating emergency vehicles
when ever a call received for accident or incident.
13
Cloud of Things: architecture, applications and challenges
Fig. 3 MCC architecture (Perez rate (Rahman et al. 2018; Afolabi 2014; Rimale
and Kumar 2017) et al. 2016; Doswell et al. 2013; Lee and Kim
2013; Agca and Özdemir 2013; Karkar et al.
2017). Mobile Learning can provide many
advantages for students and teachers,
summarized as fol lows:
• Easy communication between students and
teachers. • Easy evaluation for student’s
understanding. • Timeliness and remote access.
13
F. Alhaidari et al.
• End to end security: In order to prohibit unauthorized Several attacks against IoT have been discussed
entities from intercepting and accessing the data, such as malicious node insertion, modifcation of data
secure communication between IoT devices is and codes, availability attacks, and unauthorized
required. access. Malicious node insertion (Deogirikar and
• Connectivity: IoT needs to connect various devices Vidhate 2017) threatens the availability of IoT network
and each of these devices has diferent capabilities where the attacker exploits the hidden station
so, con necting all of these devices with diferent problem to disrupt any legitimate node. Code
capabilities must be taken into consideration. exploitation (Shrivastava et al. 2017) modifes the
• Trust and authentication: To ensure that the data is program code to make it malfunction. (Tanaka et al.
pro vided by legitimate devices and being protected 2016) discussed JTAG exploitation attack which is
against several attacks such as malicious node considered a physical attack that targets the JTAG
injection attacks. port to do several exploitations targeting IoT
• Management of identity: With weak security mecha Confdentiality, Integrity, and Availability. IoT devices
nisms implementation, an identity management can be compromised by vulnerabilities related to
issues will appear. energy consumption, memory usage, and number of
• Attack resistance: Since the IoT devices have limited IoT devices (Sandoval et al. 2019; Vishwakarma and
resources, various types of attacks that targeting Lee 2018).
the resources consumption can occur and thus it Several studies worked on addressing the security
requires strong attack-resistant solutions. aspects and challenges of IoT. To improve the
security of IoT, IoT devices should be segmented into system need to delete the legacy services or disable
its network and have net work access restricted the services that are not going to be used.
(Roman et al. 2018). In (Gope and Sikdar 2019) the (Tanaka et al 2016) discussed the availability
authors proposed a novel two factor authen tication issues in IoT such as: (1) the increasing number of
scheme for privacy-preserving of IoT devices, the IoT devices which led to increasing the attack
proposed solution allows an IoT device to perform surface. (2) Detecting attacks is harder since the IoT
anony mous communicate with the server located at system requires minimum human con
the data and control unit. The advantage of the tribution and lack of administrator. (3) The attack can
proposed scheme is it remains secure under a stay for a long time because of the long-life cycles.
physical attack with the access to an IoT device. Here, they proposed using Hitachi’s model to address
(Grifn 2017) discussed a biometrics-based such concerns. Hitachi’s model is a layered
authentica tion which is one of the techniques that architecture that has three layers including cloud,
used to enhance the security in IoT devices by sensors, and relay devices which can be a router,
enforcing the access control mechanism. The switch or gateway that collect the sensors data. The
combination of biometrics-based authen tication factor idea of the model is to detect the behaviors that are
with other factors can make the multi-factor and two normal at a specifc time and then become suspicious.
sides authentication easier and reduce the need for a They used diferent monitoring and detection models
high cost. including internal monitoring that can spot suspicious
In (Gope et al. 2019), authors proposed a behavior by monitoring the removal or insertion
lightweight mutual user authentication protocol that actions of USB and the installation of programs, trafc
authenticates the communication between a user, monitoring to detect anomaly trafc like backdoor
who is asking for accessing sessions, and cyber kill chain to evaluate the risk by
IWSN through the user trusted device, and a required utilizing the fshy action taken from the other
sensor node that is accessed through the IWSN monitoring and detecting models.
gateway. To perform such mutual authentication, they (AlDoaies and Almagwashi 2018) discussed using
proposed using lightweight cryptographic primitives Block Chain technology (BC) to secure the dynamic
including hashing and physically unclonable function IoT environ ment. BC is a distributed ledger that
(PUF) as the main components of chal contains a set of veri fed blocks that will match the
lenge and response protocol between the user device IoT’s dynamic nature and
and the gateway as well as between the gateway and exceed the traditional security frameworks’ central
the sen sor node. Moreover, they considered physical author ity problem. According to the research, the BC
layer security of the sensor nodes as a phase of the enhances the application layer’s security level, which
proposed approach where they used PUF function of can be used as a system defense versus any attack,
the sensor node as a part of authentication process minimizing the delay and overriding a single point of
and thus being able to detect any physical tempering failure issue. Moreover, since BC depends on a
on the senor nodes. digital signature and hash-function cryptographic
(Choi et al. 2018) proposed a hardening scheme to approaches, all transmitted data are digitally signed
enhance the security and minimize the vulnerability in and time-stamped to increase the reliability in the IoT
IoT devices. System hardening is a technique used to environment.
set a vari ety of functions in a system to enhance (Yasir et al. 2016) discussed the use of Social IoT
security and reduce the threats and security (SIoT) recommendation services between diferent
vulnerabilities, for example, OS hardening in the IoT applications.
13
Cloud of Things: architecture, applications and challenges
SIoT uses a perception layer to sensing and gathering concerns in detail includ ing integrity, confdentiality,
infor mation from IoT devices and then IoT devices availability as well as scalabil ity issues. These
can create social relationships among themselves concerns are resulted from the capacity and
based on the collected data. In order to use this data, computation power limitations of IoT nodes which
information is forwarded to the network layer and make deploying regular security protocols impractical
then forwarded to the upper layer for storage. Finally, on IoT environment. However, several studies were
data can be used by the social IoT recom mendation discussed in this paper on addressing some security
system to build and maintain social relations and concerns by propos ing diferent security techniques
profles. considering light-weight protocols that can be applied
As a summary, IoT provides many applications and on IoT environment. Among these techniques
car rying their activities through internet connections discussed in this paper are: (1) techniques for
and thus one of the main challenges and concerns is authentication such as two factor authentication
the security risks. Many studies have discussed such schemes (Gope and Sikdar 2019), a biometrics-
based authentication and access control (Grifn 2017), process between application and data. In IoT,
and lightweight crypto graphic mutual user collect ing data and sharing them can be ofered at
authentication (Gope et al. 2019). (2) Techniques that low-priced through automation. Also, it ofers
rely on monitoring and detection methods such as custom-made uni versal application. On the other
hardening the OS systems (Choi et al. 2018) and hand, Cloud employs personalized and integrated
Hitachi’s monitoring model for detecting abnormal apps by employing these apps, the Cloud can
behav iors within IoT environment (Tanaka et al. reach and run whatever and when ever they want.
2016). (3) Tech niques based on application layer’s Likewise, the outcome for the connec tion in Cloud
security level such as BlockChain technology for is adequate and inexpensive. It is true that
providing more reliability in the IoT environment integrating Cloud to IoT will enhance the
(AlDoaies and Almagwashi 2018) and trusting model connectivity/ accessibility of devices, but it may
based on Social IoT (SIoT) recommendation services cause some issues considering specifc
(Yasir et al. 2016). circumstances (Aazam et al. 2014; He et al. 2014;
Wang and Deters 2009).
2) Storage
4 Cloud of things IoT contains a massive amount of information source.
It performs collecting, processing, and sharing a
Day by day, the amount of data is expanding, soon large amount of data. Cloud is the most efective
will be a must to use external storage to store the solution to provide an on-demand unlimited virtual
interacted devices data. Furthermore, knowledge can low-cost storage to the data produced by IoT
be extracted from the stored data to provide valuable (Aazam et al. 2014).
information. Sadly, this trig 3) Computation
gers the need for additional processing on the IoT does not allow complex locality processing, which
external stor age, which Cloud Computing provides is a limited processing feature. Whereas Cloud
along with unlimited computational capability. Comput ing provides unlimited processing (Aazam
However, this feature is applied in IoT in a limited et al. 2014). B. Architecture design for CoT
manner and IoT devices can take advan tage of the CoT architecture allows dynamic addition of IoT
unlimited storage and computational capabilities devices as depicted in Fig. 4.
available on the cloud servers. IoT deals with real- The idea of such architecture is to provide a frame
world things to the contrary Cloud Computing cope work facilitating the integration of various
with virtual resources. Cloud can take advantage of components and layers to utilize the power of
the feature that IoT covers and deals with the real- cloud computing for processing, managing, and
world thing, reaching realistic scenarios. This brings transforming information related to IoT
us to the integration of both Cloud Computing and environment. Figure 4 shows the key lay ers,
IoT, now called “CoT” which stands for namely sensing layer, communication layer,
“Cloud of Things.” (Stergiou et al. 2018; Aazam et al. control layer, and actuation layer.
2014). It is also termed as CloudIoT in some The frst layer, sensing layer, is responsible of gath
researches (Abdelwa hab et al. 2016a, b; ering information from various sensors that can be cat
Krishnamurthy 2016). egorized based on the sensor type (homogeneous or
a heterogeneous), sensor methodology (like active or
A. Drivers of the integration passive), or number of sensing parameters (one
Since both IoT and Cloud Computing can complete param eter like body temperature, many parameters
each other, there are drivers lead to generate such like sig nals generated by electrocardiogram (ECG)
inte gration, that comes in three categories system). This layer involves sensor and recognition
(Aazam et al. 2014). technologies that provides information about people,
1) Communication objects, and environmental conditions. It represents
The key feature of Cloud and IoT are the sharing sources of the
13
F. Alhaidari et al.
Fig. 4 CoT architecture design (Abdelwahab et al. 2016a, b) considering the human
13
Cloud of Things: architecture, applications and challenges
Table 1 CoT issues
Issue Brief description
vice discovery approaches do not efectively adapt damaged and leaked. Moreover, CoT security
to the features of CoT services, especially that considerations must
there is no new standard language for describing contemplate security from multiple facets (Albishi
the CoT services in a formal way, and concerning et al. 2017). For example:
the solution of extending the traditional web Data at rest: Data housed in applications and data
services technologies like OWL-S with new bases on-premises or in the Cloud is said to be “at
attributes or WSDL with DPWS or COAP services rest.” Most organizations rely on conventional
has to take in consideration the balance between perimeter-based defenses, such as frewalls and
to be lightweight to support the limit capabilities of anti-virus programs, to protect data at rest.
devices and to adapt to the IoT services features However, hackers fnd these troves of data
(Aziez et al. 2017). irresistible; hence, the Broadband Internet Techni
5) Location of data storage cal Advisory Group and Cloud Security Alliance
For critical, latency, and time-sensitive data, location (BIT AGCS) recommend employing a combination
is very important. Therefore, it is essential to store of hard ware and software encryption techniques
the multimedia data in a physical location that is to ensure the security and integrity of data at rest.
close to the user to minimize the time needed to Data in use: Data “in use” by an application or gate
access them, which will lead to minimizing the way must be accessible to users and devices,
latency (Stergiou et al. 2018). making it the hardest form of data to secure. With
Solution: Time-sensitive data should be allocated. in-use data, security depends on the strength of
Moreover, as a solution, Infrastructure-as-a- authentication pro cedures and the number of
Service (IaaS) providing IoT-compatible technical users and devices accessing the data.
loads and backend services for example, extract, Data in fight: The data in the channel, such as from
transform and load (ETL) processes which the device to the Cloud. In this regard, well-
synchronize to connected devices and data; established Internet communication protocols
Example: Azure (Microsoft Azure 2019), Amazon armed with modern cryptography algorithms make
Web Services (AWS) (Amazon 2019) and it virtually impossible for hackers to decipher data
Salesforce (SalesForece 2019) etc. in transmission. While many IoT devices support
6) Unnecessary communication of data multiple security protocols, few enable them as
At some point when the data is not required, upload part of their initial confguration. At a minimum, IoT
ing them to the Cloud will not be necessary. In this devices that connect to mobile applica
situ ation, gateway device must determine when it tions or remote gateways should employ HTTPS,
is needed to stop the data uploading or the data trans port layer security (TLS), secure fle transfer
generation, so the resources of the Cloud and protocol (SFTP), DNS security extensions, and
network will not be con sumed, that will also other encryption protocols. Moreover, separating
optimize the utilization of power. For this purpose, information-only data from action data—using
the gateway device should have the ability to do encrypted, one-way, outbound communications—
extra processing before sending it to the Cloud limits vulnerability should the data be intercepted
(Stergiou et al. 2018). while in fight.
7) Security and privacy 8) Heterogeneity
As mentioned before in this paper, security is a major Existence of several devices having diferent oper
concern in both IoT side and Cloud side. The ating systems, vendors, following diferent
integra tion between them expected to operating standards is another possible issue in
compromise security and to be exposed to CoT (Sahmim and Gharsellaoui 2017). To
diferent security attacks, such as session riding, mitigate this issue, either the devices can be
SQL injection, cross-site scripting, and side- selected from same vendor which is not possible
channel, in addition to several vulnerabilities, such in many cases. Otherwise selection of appro priate
as session hijacking and virtual machine escape. middleware and protocols can help reducing this
Simi larly, privacy would also be an issue; issue which may end up with poor performance.
concerns will arise when applications move into Solution: Appropriate protocols and middleware can
the Cloud due to the lack of trust in service be in place. Moreover, fully managed IoT
providers and the lack of knowledge about the deployments including standard hardware,
physical data location. So, critical or sensitive confgurable software, connectivity services, and
information should be stored virtual storage server device management for exam
that is in a known and trusted physical location ple, over-the-air (OTA) upgrades, for example:
(Stergiou et al. 2018). Particle (Particle 2019). In addition, Fog nodes
Solution: Critical data prevented from being are designed by diverse constructors’ providers
and come in various pat terns and demand to be diferent platforms.
deployed depending on their relevant platforms. 9) Performance
So, the fog nodes have the capability to work on
13
Cloud of Things: architecture, applications and challenges
The performance aspect of CoT depends upon vari 10) Big Data
ous factors like communication links being used Whenever, it is thought of cloud computing, Big data
for data transfer, computational efciency related is an essential part of provided services.
services of associated cloud and storage access- Moreover, the data being collected from IoT
delay etc. To overcome this issue, fog, edge and devices can be integrated and analyzed by the
mist computing breakpoints can be utilized so that cloud. The possible issues associ
the workload can be balanced over certain links ated with Big data that can contribute to CoT as
and overall performance can be improved. well are mainly, data communication, storage,
Solution: Edge, Fog and Mist computing may be access mecha nism and processing of data. The
investigated. In addition, the practice of using a countermeasures in this regard are somewhat like
network of remote servers hosted on the Internet the performance related issue.
to store, man age, and process data, rather than a Solution: Appropriate middleware processing tech
local server or a per sonal computer. Cloud niques can be used. Moreover, tools managing
Computing can be a heavyweight and dense form data rout ing from IoT devices can play a
of computing power and it is an integral part of signifcant role. In addi tion, third-party services, as
CoT. Moreover, Fog computing is classifed data well as analytics to extract
processing toward the CoT devices. The fog insights from IoT data can be a plus for example,
permits data processing to be done relying on Clear blade (ClearBlade 2019) and ThingSpeak
application needs, available networking, and (ThingSpeak 2019) etc.
computing resources. Hence, fog cuts the total of
data demanded to be sent to the cloud, which
saves network bandwidth. Summary
Only required data should be distributed and com Section 5 presented a summary of possible
municated. Moreover, solutions for the following issues: Energy Efciency,
• Identify and classify data collected throughout your Resource Alloca tion, Identity Management, Service
CoT ecosystem and learn their corresponding Discovery, Location of Data Storage, Unnecessary
business use case. Communication of Data, Secu rity and Privacy,
• Identify and execute on opportunities to stop Heterogeneity, Performance, and Big Data. As a
collecting unused data or adjusting summary to the CoT issues and their possible
their granularity and retention time. solutions, it is worth mentioning that both factors are
• Consider using tokenization and one- subject to the type of application and domain where
way cryptographic hashing wherever you don’t the CoT is deployed. It is not necessary that all the
need specifc data in its entirety. issues may arise in all type of applications/domain.
• Consider using asymmetric cryptography to protect This section just summarizes and com prehends the
data at rest on CoT devices and devices that are possible issues and possible solution a typi cal CoT
only responsible for temporarily collecting and environment may have. So accordingly, a suitable
batching data and periodically submitting the data solution may be chosen/adapted by the service
to other systems for processing. providers or the solution experts. As far as the cost of
• Only store and transmit data to central systems with deployment is concerned, depending upon the
strong ownership and strict security controls. requirements, trade-ofs can be made between
• Follow the principle of least privilege in granting various solutions.
access to any collected data.
• Identify and consider the unique capabilities of your
CoT devices. This could include mobility, actuation,
sensory data collection and transmission, and 6 Cloud of Things applications
ownership trans fers that impact your regulatory and
legal compliance. The emerge of Cloud of Things technology is making
• Consider privacy and transparency expectations of a sig nifcant impact on the way people are living their
your customers and corresponding legal every day life. A generic architectural framework of
requirements in the jurisdictions where you CoT is given in Fig. 7 (Abdelwahab et al. 2016a, b). It
manufacture, distribute, and operate your CoT is comprised of three tiers namely the Cloud tier, the
devices and systems. cloud agent tier and the CoT tier. This framework is
equally useful for all the possible applications like in the form for sensors’ output.
healthcare, smart cities etc. men tioned afterwards. In Fig. 7, Sensor network virtualization in sensing
The major set of associated CoT devices assumed as a service using diferent cloud agents near the
are the sensing devices that are widely used in edge. Arrows and numbers illustrate the diferent
healthcare, vehicular networks and other wireless steps and messages sequence. Five main steps are
sensor networks. Consequently, the data collected is involved in terms of service acquisition.
13
F. Alhaidari et al.
• Firstly, tier clouds are conventional cloud computing vices of IoT systems are managed to generate a
platforms, and cloud agents are edge computing business model and fowcharts, which are done on
plat form with evolved rule for sensing as a service the business layer (Ghanbari et al. 2019).
the cloud user will submit the request duly Below are some application benefting from Cloud of
received by the frst-tier clouds. Things are listed along with a short description and
• Secondly, the frst-tier clouds send the request to the potential challenges related to each application
appropriate associated cloud agent. This optimized (Aazam et al. 2014; Uma et al. 2017).
device virtualization will serve as virtual sensor
networks by exploiting the discovered sensing 1. Healthcare
resources In health sector, Cloud of Things is used to simplify
• At the third step, the cloud agent communicates with the healthcare process and the quality of the
the cloud of thing network associated with service given. Through diferent wearables, such
corresponding set of CoT devices. as watches, and other sensors data is collected
• At the fourth step, this information is sent back to frst on a regular basis, and the integration of the
tier clouds via the same agent referred to in the step Cloud enables having all the heavy algorithms run
3. • Finally, the frst-tier cloud submits the response to on the Cloud especially that these wearables
the user after due processing on the data delivered have a limited computational capacity and battery
by the CoT tier. (Aazam et al. 2014). Reports then are sent to the
authorized healthcare providers and patients to
The frst tier plays a role of receiving the request from help notice any changes in the patients’ health.
Cloud users as a sensing task and then reformat it to This beneft is noticeable especially in ambient
be processed and interpreted later by Cloud agents. assisted living systems that are aimed at people
The sens ing task should hold parameters that allow with chronic medical conditions and disabilities
Cloud agents to decide about the source of required (Carr and Doleac 2016). Figure 7 shows a typical
information, query parameters, CoT category, and CoT based healthcare architecture (Dang et al.
other parameters that might support and clarify user 2019). It is mainly comprised of three layers, akin
task requirements. To do such pro cess, Cloud tire to the concept given in Fig. 5. The sensors, the
involves integration of several resources including agents and the processing clouds. The sensors
storages, analysis, and transformation tools. Based are the CoT devices collecting sensory data like
on the sensing task, Cloud agent captures data from body sensors, patient health record
CoT tier and return results back to the Cloud tier (PHR)/electronic medical record (EMR) data
which in turn can process, analyze, and store such (Mahmoud et al. 2018; Bharadwaj et al. 2017;
data to send required results back to the Cloud user. Medina et al. 2018; Baig et al. 2015) and remote
The underlying CoT frame work includes the physical monitoring data
sensors and actuators, which are referred to the
perception layer (CoT). The produced data in this
layer is passed to the middleware layer (cloud agents)
by a network layer. The secure channels for moving
data use
etc. This is duly processed at the associated of that would not be possible without the help of
clouds and conveyed by the agents. both technologies (Aazam et al. 2014; Korczak
Challenges: Privacy, legal and social aspects, large and Kijewska 2019; Iwan and Malecki 2016;
scale, security, reliability, performance, and heteroge Jabeur et al. 2017; Karakikes and Nathanail 2017;
neity (Aazam et al. 2014; Munir 2018; Chowdary and Witkowski 2017). Figure 6 shows a typical
Yakobu 2016; Farahzadi et al. 2018; Patel and architecture of smart homes (Razvi et al. 2015).
Parmar 2016). To overcome this issue, advanced As mentioned earlier in Fig. 7, the three tiers are
security stand ards should be followed for end to end appar ent. Namely, the CoT based devices to
encryption. 2. Smart homes sense the data, the agents to convey the data and
In smart homes, many technologies beneft from IoT the cloud layer to process the data.
and Cloud Computing. Lightning, heating, Challenges: Reliability, performance, and heteroge
controlling the windows blinders and making a neity (Aazam et al. 2014).
person’s morning cofee (Cubo et al. 2014). In all 3. Smart logistics
these applications, user’s data is collected and
analyzed and is communicated with all these
devices to make the ultimate experience a user
Fig. 9 Working model of Shot mance, and heterogeneity (Aazam et al. 2014).
Spotter (Uma et al. 2017)
13
F. Alhaidari et al.
allowing the right individuals at the right times to investigated. Like encryption standards, intrusion
access the right resources for the right reasons. detection, frewalls and other state of the art
Moreover, there is an unavoidable threat has been surveillance mechanisms. Since security and
considered under some two reasons, one of them privacy is a big area to cover in CoT, the
is that there is a massive number of connected techniques and methodologies are also great in
devices in CoT. Second, is the key management, number (Sahmim and Gharsellaoui 2017;
public key infrastruc DeDonno et al. 2019). Following is the gist of
ture is unable either to manage the load or either such approaches other than those mention.
the storage of it. As been knowing that CoT has a • Steganography
lot of connected objects, because of that applying • Digital watermarking
public key cryptosystem neither do the old- • Obfuscation
fashioned cryptography is not achievable in CoT • Anonymization
even when applying it with strict calculation. In • Sticky policy
conclusion, PKI cannot be applied regarding the • Trusted platform module
CoT (Botta et al. 2016; Renner et al. 2014). • Data segmentation
Suggested solution: Instead of using one standard • Trusted third party mediator
for end to end channel, the use of multiple • Identity and access management
technologies in diferent segments can be • Key and security management
2) Heterogeneity communication models like Bluetooth and ZigBee
Before the integration of the Cloud, IoT applications by injecting them into a device Cloud.
and devices were thought of as isolated vertical Middleware at runtime and protocols in the gateway
solu tions, in which all system components are are to be regulated by a mapping approach.
tightly cou pled to the specifc application context. Moreover, to fexibly handle huge number of IoT
However, with the introduction of the Cloud, devices over the cloud, IPv6 address space can
diferent IoT applications will have the ability to be a practical choice which supports pervasive
communicate with each other if the heterogeneity networking and can be more reasonable in the
problem is solved. This challenge is amplifed if dynamic environment.
the user chooses multiple Cloud services to 5) Performance
increase the performance of the system (Aazam There are many qualities of service measures that
et al. 2014). are requested from CoT applications, such as
Suggested solution: To overcome this issue, one communica tion and computation speed and
pos sible solution is to investigate and provide an storage consumption also the access control
automatic device integration mechanism. That will mechanism (the time it takes to get the
start building the process from one end to other credentials verifed). Among these, the most
while resolving issues at each segment by a challenging one is communication for obtaining a
middleware semantic interoper ability (Heiler sta ble, acceptable network performance to reach
1995). the Cloud (Aazam et al. 2014).
3) Reliability Suggested solution: This issue can be resolved by
In critical applications, such as HealthCare applica provision of device bufering and some modifed ver
tions, this challenge is signifcant. Although when sion of CODA for disconnection handling (Kistler and
intro ducing the Cloud, it ofoaded heavy Satyanarayanan 1992) and other efcient synchroniza
computational work tion techniques for the virtual databases may be
from the IoT to the Cloud; it created uncertainty, investi gated (Li et al. 2017; Kekgathetse and Letsholo
which is the availability of the datacenter itself 2016). 6) Legal and social aspects
(Aazam et al. 2014). When building a system based on devices that are
Suggested solution: This is mainly associated with owned by diferent users and storing it in the Cloud,
Cloud side availability. Then Cloud resource manage there are two aspects: The Cloud service provider
ment system must be upgraded to consider the must adhere to international law and users must
Quality of Service required by the IoT devices at a agree to share their data to help build and
certain time. 4) Large scale improve the system (Aazam et al. 2014).
The Cloud has enabled real-time processing of the Suggested solution: A trust agreement can be estab
data originating from the huge number of IoT lished before each user/device integrated to the
devices. Sometimes, these devices can reach CoT. It can be a modifed/updated version of
hundreds of thou sands creating storage and tradition service level agreement (SLA) used in
communication delay issues that all must be Cloud Computing envi ronments. (Govindaraj and
tackled (Aazam et al. 2014). Jaisankar 2017; Wu 2018; Horvath and Agrawal
Suggested solution: To mitigate the scaling issues, 2015; Hussain et al. 2014; Marud hadevi et al.
one possible solution is to implement 2015).
13
Cloud of Things: architecture, applications and challenges
Summary: Section 6 presented a summary for applications are also enumerated along with their
each of the discussed challenges in CoT including suggested solutions in general.
Security and Pri vacy, Heterogeneity, Reliability,
Large Scale, Performance, as well as Legal and
Social Aspects. Moreover, this sec tion encompasses
7 Conclusion
the potential applications/application areas where
CoT can be utilized efectively. In this regard, seven
From the impact that it has, the Cloud of Things is
diferent application areas are mentioned. Although
becoming the next big thing in terms of Information
there could be limitless application areas like Industry
and Communica tion Technology (ICT). In this paper,
4.0 standard is purely based on these advanced
frstly, the mobile and cloud computing (MCC)
technologies like CoT (IoT+Cloud), Artifcial
technologies and the IoT technol ogy alongside their
Intelligence, 3D printing, augmented reality,
benefts and issues are discussed. Sec ondly, the
blockchain etc. (Machado et al. 2020). Later, the
Cloud of Things (CoT) is introduced along with its
possible challenges that may be faced during these
drivers of integration, the architecture, and the international conference on internet of things (iThings) and
possible issues in integration. Finally, a potential list IEEE green computing and communications (GreenCom) and
IEEE cyber, physical and social computing (CPSCom) and
of applications is discussed where CoT seems IEEE SmartData
promising and the challenges it may face. In addition Aziez M, Benharzallah S, Bennoui H (2017) Service discovery
to that, some general challenges to the CoT are for the internet of things: comparison study of the
debated and their possible solutions are also approaches. In: Proceedings of 4th international
conference on control, decision and information
proposed. The researchers and scholars of related technologies (CoDIT), Barcelona, pp 599–604
areas are encouraged to explore these challenges, Baig MM, GholamHosseini H, Connolly MJ (2015) Mobile
investigate the pro posed as well as other possible health care applications: system design review, critical issues
solutions to help the imple menters and developers of and challenges. Australas Phys Eng Sci Med 38:23–38
the CoT applications, to mitigate them. Baktayan A, Zahary A (2018) A review on cloud and fog
computing integration for IoT: platforms perspective. EAI
Endorsed Trans Internet Things 4(14):1–17
Bharadwaj SA, Yarravarapu D, Reddy SCK, Prudhvi T,
Sandeep K, Reddy OSD (2017) Enhancing healthcare
References using m-care box (monitoring non-compliance of
medication). In: Proceed ings of the 2017, international
Aazam M, Hung PP, Huh EN (2014) Cloud of ihings: integrating conference on I-SMAC (IoT in social, mobile, analytics
internet of things with cloud computing and the issues and cloud) (I-SMAC), Palladam, India, pp 352–356
involved. In: Proceedings of 11th international bhurban Bhullar J, Mancilla A, Nijjar A, Teixeira A (2014) The future of
conference on applied sciences & technology (IBCAST) mobile computing in 2025. Storify. https://storify.com/mobil
Islamabad, Pakistan, pp 414–419 ecomputing/the-future-of-mobilecomputing-in-2025.
Abdelwahab S, Hamdaoui B, Guizani M, Znati T (2016a) Cloud Accessed 11 May 2020
of things for sensing-as-a-service: architecture, Bittencourt L, Immich R, Sakellariou R, Fonseca N, Madeira E,
algorithms, and use case. IEEE Internet Things J Curado M, Villas L, DaSilva L, Lee C, Rana O (2018) The
3(6):1099–1112 internet of things, fog and cloud continuum: integration
Abdelwahab S, Hamdaoui B, Guizani M, Znati T (2016b) Cloud and challenges. Internet Things 3(4):134–155
of things for sensing-as-a-service: architecture, Botta A, Donato W, Persico V, Pescapé A (2016) Integration of
algorithms, and use case. Proc IEEE Internet Things J cloud computing and internet of things: a survey. Future
3(6):1099–1112 Gener Comput Syst 56:684–700
Afolabi OA (2014) On mobile cloud computing in a mobile Carr JB, Doleac JL (2016) The geography, incidence, and
learning system. J Inf Eng Appl 4(5):82–87 underreport ing of gun violence: new evidence using
Agca R, Özdemir S (2013) Foreign language vocabulary shotspotter data. In: Pro ceedings of APPAM big data
learning with mobile technologies. Proc Soc Behav Sci 83:781– pre-conference workshop, pp 1–17
785 Albishi S, Soh B, Ullah A, Algarni F (2017) Challenges and Choi S-K, Yang CH, Kwak J (2018) System hardening and
solutions for applications and technologies in the internet of security monitoring for IoT devices to mitigate IoT security
things. Proc Comput Sci 124:608–614 1 vulnerabili ties and threats. In: KSII transactions on
AlDoaies BH, Almagwashi H (2018) Exploitation of the promis internet and information systems, Korea
ing technology: using blockchain to enhance the security Chowdary ED, Yakobu D (2016) Cloud of Things (CoT)
of IoT. In: Proceedings of 21st Saudi computer society integration challenges. In: Proceedings of 2016 IEEE
national computer conference (NCC), Riyadh, 2018, pp international con ference on computational intelligence
1–6. https://doi. org/10.1109/NCG.2018.8593102 and computing research (ICCIC), Chennai, pp 1–5
Alnanih R, Ormandjieva O, Radhakrishnan T (2013) Context- ClearBlade (2019) https://www.clearblade.com/. Accessed 9
based and rule-based adaptation of mobile user Dec 2019 Cubo J, Nieto A, Pimentel E (2014) A cloud-based
interfaces in mhealth. Proc Comput Sci 21:390–397 internet of things platform for ambient assisted living. Sensors
Alrawahi AS, Lee K, Lotf A (2019) A multiobjective QoS model 14(8):14070–14105 Dang LM, Piran MJ, Dongil H, Kyungbok
for trading cloud of things resources. IEEE Internet Things M, Hyeonjoon M (2019) A survey on internet of things and
J 6(6):9447–9463 cloud computing for healthcare. Electronics 8(7):768
Amazon (2019) https://aws.amazon.com/iot/. Accessed 9 Dec Dash S, Biswas S, Banerjee D, Rahman A (2019) Edge and fog
2019 Atlam H, Alenezi A, Alharthi A, Walters R, Wills G (2017) com puting in healthcare - a review. Scalable Comput
Integra tion of cloud computing with internet of things: Appl Exp 20(2):1–30
challenges and open issues. In: Proceedings of IEEE
13
F. Alhaidari et al.
13
Cloud of Things: architecture, applications and challenges
Mosa A, Yoo I, Sheets L (2012) A systematic review of Oludele A, Oluwabukola O (2016) A survey of mobile cloud
healthcare appli cations for smartphones. BMC Med Inform computing applications: perspectives and challenges. In:
Decis Making 12:67 MuleSoft (2019) International multi conference on complexity, informatics, and
https://www.mulesoft.com/integration-solutions/api/iot. cybernetics
Accessed 10 Dec 2019 Ozinga S, Linder S, Alberts J (2017) Use of mobile device
Munir K (2018) Advancing consumer centric fog computing accelerometry to enhance evaluation of postural
architec tures. A volume in the advances in computer and instability in Parkinson’s disease. Arch Phys Med Rehabil
electrical engi neering (ACEE) book series, IGI Global 98(4):649–658
Narwane VS, Narkhede BE, Gardas BB, Raut RD (2019) Cloud Particle (2019) https://www.particle.io/. Accessed 9 Dec 2019
manufac turing issues and its adoption: past, present, and Patel YS, Parmar T (2016) Cloud of things: a state-of-the-art
future. Int J Manag Concepts Philos 12(2):168–199 review on integration of internet of things with cloud computing.
In: Proceed ings of national conference on contemporary on mobile cloud computing. Int J Comput Appl 113(16):4–9
computing (NC3– 2016), Int J Comput Appl, pp 37–41 Sharma AK, Soni P (2013) Mobile cloud computing (MCC):
Pattama C (2018) Smart logistic system by IOT technology. In: open research issues. Int J Innov Eng Technol 2(1):24–27
Proceed ings of the 6th international conference on information Shrivastava R, Hota C, Shrivastava P (2017) Protection against
and education technology (ICIET ’18), ACM, New York, NY, code exploitation using ROP and check-summing in IoT
USA, pp 149–153 environment. In: Fifth international conference on
Perez M, Kumar S (2017) A quick survey on cloud computing information and communica tion technology, p 6
and associated security, mobility and IoT issues. J SigFox (2019) https://sigfox.com/. Accessed 10 Dec 2019
Comput Commun 5(12):80–95 Somula R, Sasikala R (2018) A survey on mobile cloud
Qi H, Gani A (2012) Research on mobile cloud computing: computing: mobile computing and cloud computing (MCC =
review, trend and perspectives. In: Proceeding of second MC + CC). Scalable Comput Pract Exp 19(4):309–337
international confer ence on digital information and Sprute D, Tönnies K, König M (2019) Interactive restriction of a
communication technology and its applications (DICTAP), mobile robot’s workspace in a smart home environment. J
Malaysia, pp 195–202 Ambient Intell Smart Environ 11(6):475–494
Qu Z, Zhang G, Cao H, Xie J (2017) leo satellite constellation Stergiou K, Psannis E, Kim BG, Gupta B (2018) Secure
for internet of things. IEEE Access 5:18391–18401 integration of IoT and cloud computing. Future Gener Comput
Rahman A, Sultan K, Dash S, Khan MAA (2018) Management Syst 78:964–975 Suciu G, Vulpe A, Halunga S, Fratu O,
of resource usage in mobile cloud computing. Int J Pure Todoran G, Suciu V (2013) Smart cities built on resilient cloud
Appl Math 119(16):255–261 computing and secure internet of things. In: 19th international
Rahman A et al. (2018b) A comprehensive study of mobile conference on control systems and computer science (CSCS),
computing in telemedicine. In: Proceedings of second 2013, IEEE, pp 513–518
international conference, ICAICR 2018, Shimla, India, Tanaka S, Fujishima K, Mimura N, Ohashi T, Tanaka M (2016)
14–15 July 2018 iot sys tem security issues and solution approaches. In:
Rajak N, Shukla D (2018) Comparative studly of cloud Featured Articles II, vol 65, no 8, p 5
computing and mobile cloud computing. Int J Eng Sci Res ThingSpeak (2019) https://thingspeak.com/. Accessed 9 Dec
Technol 7(3):734–739 Rawahi ASA, Lee K, Robinson J, Lotf A 2019 Ujager FS, Mahmood A, Khatoon S (2019) Wellness
(2018) An evaluation of optimisa tion approaches in cloud of determination of the elderly using spatio-temporal correlation
things resource trading. In: Proc. IEEE 6th int. conf. future analysis of daily activities. J Ambient Intell Smart Environ
internet things cloud (FiCloud), pp 208–215 Razvi SM, Abdullah 11(6):515–526
D, Mznah R, Riman AS (2015) IoT cloud-sensor secure Uma K, Parvin NA, Poorani ARM (2017) Analysis of various
architecture for smart home. In: Proceedings of int’l conf. issues in cloud of things (COT). J Chem Pharm Sci 10(1):532–
security and management (SAM’15) 535 Vinh TL (2018) Security and trust in mobile cloud
Renner T, Kliem A, Kao O (2014) The device cloud -applying computing. PhD Thesis
cloud com puting concepts to the internet of things. In Vishwakarma G, Lee W (2018) Exploiting JTAG and its
Proceedings of IEEE 11th intl conf on ubiquitous intelligence & mitigation in IOT: a survey. Future Internet 10(121):18
computing Wang Q, Deters R (2009) SOA’s last mile-connecting
Rimale Z, Benlahmar E, Tragha A, Guemmat KE (2016) Survey smartphones to the service cloud. In: Proceedings of
on the use of the mobile learning based on mobile cloud 2009 IEEE international confer ence on cloud computing,
computing. iJIM 10(3):35–41 Bangalore, pp 80–87
Roman R, López J, Mambo M (2018) Mobile edge computing, Witkowski K (2017) Internet of things, big data, industrie 4.0 –
fog et al.: a survey and analysis of security threats and innova tive solutions in logistics and supply chains
challenges. Future Gener Comput Syst 78:680–698 management. Proc Eng 182:763–769
Rountree D, Castrillo I (2014) The basics of cloud computing: Wu X (2018) Study on trust model for multi-users in cloud
under standing the fundamentals of cloud computing in computing. Int J Netw Secur 20(4):674–682
theory and prac tice, 1st edn. Elsevier, Amsterdam Yao D, Yu C, Jin H, Zhou J (2013) Energy efcient task
Sahmim S, Gharsellaoui H (2017) Privacy and security in scheduling in mobile cloud computing. In: Network and
internet-based computing: cloud computing, internet of parallel computing, vol 8147. Springer, LNCS, pp 344–
things, cloud of things: a review. In: Knowledge-based 355
and intelligent information & engi neering systems: Yang W, Hwang S (2013) iTravel: a recommender system in
proceedings of the 21st international conference mobile peer to-peer environment. J Syst Softw 86:12–20
marseille, France, pp 1516–1522 Yasir S, Crespi N, Rehmani MH, Copeland R (2016)
SalesForce (2019) https://www.salesforce.com/products/feld- Exploitation of social IoT for recommendation services. In:
service/ overview/. Accessed 9 Dec 2019 Proceedings of 2016 IEEE 3rd World forum on internet of
Sanabria AR, Kelsey T, Dobson S, Ye J (2019) Representation things (WF-IoT), Reston, VA, pp 359–364.
learning for minority and subtle activities in a smart home https://doi.org/10.1109/WF-IoT.2016.7845500
environment. J Ambient Intell Smart Environ 11(6):495– Zaslavsky A, Perera C, Georgakopoulos D (2013) Sensing as a
513 service and big data. In: Proceedings of the international
Sandoval RM, Carrasco SC, Sanchez AAG, Haro JG (2019) A conference on advances in cloud computing (ACC),
reinforce ment learning-based framework for the Bangalore, India, ArXiv Pre print arXiv:1301.0159
exploitation of multiple rats in the IoT. IEEE Access
7:123341–123354. https://doi.org/10.1109/ Publisher’s Note Springer Nature remains neutral with regard
ACCESS.2019.2938084 to jurisdictional claims in published maps and institutional
Shamim SM, Sarker A, Bahar AN, Rahman MA (2015) A review afliations.
13