|
| Lit. ref. | Technique used | Focus area | Pros | Cons |
|
| [10] | Hardware-based data location assurance solution (HDLAS) scheme using TPM and PDP | To enable the IOT users to verify the geographic location of their data stored in any data center accurately | HDLAS can be applied to the existing system and does not need a third party | Too many signaling messages and algorithms still are involved in the communication process |
| [11] | TPM-based scheme for remote attestation | To allow the clients of IOT computing to verify the information based on the geographic location of their data stored in any data center accurately | Simple architecture to learn and take care of regulatory concerns for the IOT computing environment | Still exist threats to the integrity of data. Proposed work is carried out conceptually; that is, simulation results have not been shown and analyzed |
| [16] | Use of TPM virtualization in IOT computing | To secure and establish trust in the IOT computing environment by using the virtualization of TPM | Point out key research areas and virtualization of TPM can reduce the cost and offer the flexibility of the platform | IOT security is not limited to the virtualization of TPM. Proposed work needs to be simulated on the basis of security services |
| [6] | Context and motivations for specifications of TCG based on TPM | To establish trust between the IOT service provider and IOT user by deploying TPM in CCI | TCG specifications are not mature up till now to secure IOT computing and virtualization. Future research work areas | The author does not have their own technique. Analyzed but without validation |
| [12] | Data firewall IOT (DFIOT) technique based on TPM | To provide security at the server and client side and security to the services of IOT storage and control the access to data in IOT storage | Remote attestation protects the leakage of data from malicious software at each client side | Software-based TPM (TPM emulator) provides less security as compared to hardware-based TPM and full proof security is based on security services |
| [17] | Tools and techniques to secure virtual IOT computing infrastructure (VCCI) | To make the security of VMMs strong and protect them from inside or outside attackers in VCCI | Pick up an immensely important security issue in current VCCI and explore future research areas from a working and governance point of view | CCI security is not only limited to virtualization. There are other layers that need security. Proposed work needs to be simulated on the basis of security services |
| [18] | Light-weight trusted scheme, that is, dynamic infrastructure trusted bootstrapping protocol (DITBP) based on TPM | To establish trust between two machines in the IOT computing infrastructure | Integrate many solutions in one infrastructure which provides better effects. Provide the foundation of future research areas | Trust is also necessary between IOT users and CSP. Proposed work needs to be simulated and analyzed on the basis of security services |
| [19] | Scheme based on trusted service domain (TSD). | To deliver services for multiple user domains that are trusted on the virtualization platform of the IOT environment. | Have good results as compared to existing schemes, that is, in terms of flexibility and scalability. Mentioned future research areas. | Functionalities of TSD and TPM are the same; then why does TPM use directly instead of TSD. |
| [20] | Trusted computing platform (TCP) using trusted platform support services (TSS) based on TPM | To make the system, that is, data and applications, cryptographically secure and provide hardware-based security | Make the CSP trustable to clients. Security provided by hardware TPM is stronger than the security provided by software TPM | Proposed work needs to be simulated and analyzed on the basis of security services for IOT computing infrastructure |
| [21] | IOT computing security scheme, that is, trusted network platform architecture based on virtualization | To produce trusted relations between the IOT client and IOT server and also ensure the integrity of IOT services | Establish trust between server and client. Provide the security service such as integrity of IOT service | Given work is too short and not enough to understand. Proposed work needs to be simulated and analyzed on the basis of security services for the IOT computing environment |
| [22] | Efficient and secure educational platform (ESEP) scheme | To make CSP trustable to educational organizations by providing features such as scalability, flexibility, security, availability, recovery, software on demand, and omnipresent accessibility of IOT computing | Bit-locker software enabled by TPM provides better security as compared to others. Explore many key research areas of IOT computing. ESEP is based on all in one | The prototype of ESEP is not given. It is difficult to implement ESEP because it works on more than one feature. Proposed work needs to be simulated and analyzed on the basis of security services |
| [23] | Integration of a trusted computing platform (TCP) in the IOT computing environment | To establish trust by integrating a trusted computing platform in the IOT computing environment to provide security services such as confidentiality, integrity, and authentication | Encryption of data is performed in a very short interval of time, that is, nanoseconds, due to which, computation time is reduced and better performance is achieved. Security services is carried out by the RC4 | The encryption process takes short time, that is, nanoseconds, which can affect the security of the IOT computing system. The encryption process time is directly proportional to the size of the data |
| [24] | Provable data possession scheme together with trusted computing technology for mobile nodes in IOT computing environment | To allow the resource-constrained devices such as mobile nodes to use the services of IOT computing without any trouble and reduce the workload on mobile nodes by using TPM chip mounted on client mobile node | The workload is minimized by TPM. Clients can verify and update data unlimitedly at the same time. TPM chip avoids man in the middle attack. CSP cannot understand client data | One security service is left, that is, availability. The prototype of the proposed system is necessary to show the performance of the scheme which has not been discussed |
| [25] | Integration of trusted computing with IOT computing environment | To build trust by integrating a trusted computing platform with an IOT computing environment to provide security services such as confidentiality, integrity, and authentication | Security services such as confidentiality, integrity, and authentication can build trust up to some extent in the IOT computing environment. The origin of the users can also be traced | Availability is also very important which has not been discussed. The proposed method has not been validated and implemented because the prototype of the proposed approach along with simulation results is not discussed |
|