Academy of Marketing Studies Journal (Print ISSN: 1095-6298; Online ISSN: 1528-2678)

Review Article: 2023 Vol: 27 Issue: 3

Growth of Cloud Hosted Data Mining Techniques in IOT Enabled Business Application: A Survey based on Users Experience

Sumit Kumar, Indian Institute of Management

Citation Information: Kumar, S. (2023). Growth of cloud hosted data mining techniques in iot enabled business application: a survey based on users experience. Academy of Marketing Studies Journal, 27(S3), 1-13.


Advances in electronic communication, data processing, and internet technologies provide global access to and interaction with a vast array of physical devices. A blanket of multiple intelligent devices equipped with sensors and actuators envelops the whole surroundings. Thorough research on the Internet of things (IoT) with cloud technologies enables the capture of huge data created by this heterogeneous environment and the translation of this data into valuable information using data mining techniques. In addition, the produced information will play a significant part in advanced analytics, system performance optimization, and optimal resource and managed services. With this setting in mind, the research presents a systematic and comprehensive review of a number of data mining methodologies used to construct an intelligent environment in large and small scale IoT applications. It also gives insight into an IoT supported by the cloud. Big data mining system to assist readers comprehend the relevance of data mining in the context of the Internet of Things. 221 individuals from various industries were questioned to determine the uses, strategies, and effect of Internet of Things and Data Mining. It is discovered that the Internet of Things and data mining have a substantial influence on several industries. In addition, a survey of 219 business professionals was conducted to determine the applications, breadth, and effect of cloud computing. It is discovered that cloud computing has a substantial influence on IOT enabled business applications.


Internet of Things, Data Mining, Cloud Technologies, Data Streams, Knowledge Discovery Process.


The broad use of the Internet of Things (IoT) generates an abundance of novel use cases, applications, user interfaces, and data processing systems. In combination with the Internet of Things, a new architecture of enabling approaches is being developed to facilitate the allocation of resources for limited-resource devices and platforms. Future IoT systems will be comprised of, to mention a few components, mobile edge computing systems, software-defined networks, 5G, augmented reality, and data mining. Implementing knowledge discovery procedures in IoT settings would maximize the value of IoT systems due to the fact that data mining is the process of discovering hidden information trends in raw data. In conclusion, data mining will be essential for fully interactive and intelligent IoT systems. Cloud computing is an Internet-based technology that keeps consumer data on server computers and makes it accessible on demand. As it was for the growth of telecom infrastructures in the 1970s and 1980s, the advent of the Internet in the 1990s, and the general proliferation of computers during the previous three decades, the effect of its diffusion may be quite substantial.

Review of Selected Literature

IOT (Internet of Things) Enablement via Data Mining

According to Xie et al. (2020), the implementation of IoT applications at all levels, from small and medium-sized enterprises to multinational firms, creates a world of opportunities. In addition, both governmental and nongovernmental non-profit organizations are ready to adopt IoT systems to improve their services. The steady growth of streaming data in these IoT systems will facilitate the creation of novel business strategies, upgraded as well as mass-customized products, and real-time personalized services. The introduction of data mining and knowledge discovery techniques into IoT applications will enable the development of highly intelligent IoT systems that account for the operational efficiency and effectiveness of businesses, governments, and non-profit organizations.

Sattarian et al. (2019) performed study and found that data mining techniques are utilized in IoT systems to identify a multitude of information trends by merging well-established supervised, unsupervised, semi-supervised, and stochastic techniques. These data mining techniques enable classification, clustering, frequent pattern mining, and incoming streaming data regression in IoT systems so that information can be displayed and actuators may be activated. IoT applications may be expanded from IoT devices to the peripheral and cloud servers due to operational and computational load differences between data mining approaches.

Chen et al. (2015) studied and reported that several literature studies on data mining and IoT in contemporary systems were available, with researchers focusing on ubiquitous settings and mobile data stream mining applications. Existing literature is extremely inadequate in data mining applications, approaches, and systems, so far as is known. The primary objective of the study is to provide an overview of IoT applications from the perspective of Data Mining, with an emphasis on healthcare, energy, and smart cities use cases, as well as to identify some pertinent research issues Chowhan & Saxena (2011). To this end, they provide a comprehensive literature review and investigate the pertinent challenges for privacy protection, networking, and IoT application development in edge computing environments.

In their research, Alam et al. (2016) found that digital transformation is driven by information and data assets that are acquired, mined, and used to support decision-making. The result is an explosion in the volume of both information and data, making it harder to get at what you need. There has been a dramatic rise in the value of information and data as indispensable resources for decision-makers in all types of organizations. Coordinated for ordering and autonomous direction, the four core components of IoE are information, objects, people, and interaction Boillat & Legner (2013). Because it organizes authentic, internet-connected goods and documents for use in navigation, IoT plays a crucial role. Collection the board is the process of checking, planning, and coordinating the development and security of data assortments and services, while evaluation is the logical process of transforming information into data for planning and navigation.

Ma (2021) investigated and argued that technical developments in IoT in terms of correspondence and its capacity to catch a massive amount of life sensor information, Information of Things can broaden circumstance awareness through monitoring of the brace prestige, which can stimulate modifying energy load on trying to control innovative conundrums, transmission lines, reducing power unsettling influences, and adjusting recession and adjusting growth.

Using solar-powered chargers and wind turbines, Gaber et al. (2019) looked at the use of renewable energy that is easier on the environment. It is possible to implement these developments on a grand scale, with wind turbines that generate enough energy to power entire cities, or on a more modest scale, with autonomous sustainable power options incorporated by families to fulfill some of their energy needs Wadhe (2016). Typically, this is accompanied by energy storage batteries and the executive's energy architecture. These designs are aimed to facilitate the storing and depositing of clients' unused energy into the lattice.

Tsai et al. (2013) found that data mining may help organizations in many ways, and that it is particularly useful for retail, banking, and broadcast communications where techniques like request and clustering can be put to use. One of the primary success enhancers of coverage associations and banks is the examination of borrowers' unwavering best early in the credit score appraisal process. Credit scoring gradually becomes an ever-expanding spectrum of critically important, and different information collecting tactics are employed to address credit scoring issues. To improve the accuracy of element demand checking, collection creation, element ideation, and element positioning across shops and manufacturers, retailers collect purchaser records, trades records, and data. Use the expert's sway SVM, guide vector backslides, or the Bass edition to calculate the benefit of items.

Priyanka & Thangavel (2020) state that this geographic issue can be addressed through the use of information data mining to discover new opportunities and then cultivate business implementation, decision making with roboticized constructions to lessen chances, cluster analysis, depiction, and time catalogue examination. It has also been suggested as a response for increasing resident interaction with government offices and political trust, however these E-authorities undermine the idea of citizen-driven association, value endeavor reserves, broader political interest, and more effective methods and endeavors. Experts can predict which tenants are likely to leave the city by analyzing public information, which also reveals which parts of city life and which local agencies are most influential on an occupant's choice to leave the city.

Shang et al. (2021) analysed and asserted that the ruthless computerised economy where organisations are increasingly embracing endeavour data mining the executives' paradigms to give access to online data as well as information incentives anyplace and at any time through the cloud, internet, fostered, or electronic applications. IoT platforms, for example, web-based media, cloud, and mobile registration apps generate massive amounts of data that must be mined as well as processed into data to aid decisions. Undertaking data is the digitalization of data cycles, capabilities, as well as administrations to supply precise and appropriate data to direction, investigation, as well as communication.

Oralhan et al. (2017) conducted an investigation and found that data mining is becoming increasingly popular, if not logically essential, in therapeutic benefits. There are several sources of heterogeneous clinical data, including different clinical consideration affiliations, different prescription suppliers, different payers, different narcotic prescriptions, different drug histories, and different methods of sending clinical information. Improving treatment and reducing waste may be accomplished with the use of this information through clinical text mining, predictive depiction, persistence evaluation, patient equivalency assessment, and data gathering. Clinical benefits analysis can make use of alliance evaluation, bundling, and special case analysis. Data mining medical records may reveal cost-cutting measures and opportunities to pass on beneficial medications. Data mining may be used to track down and apprehend high-value targets, and it can analyze massive amounts of information obtained from different setups, activities, and treatment books to spot suspicious trends and identify blackmail.

Researchers like Houston et al. (2017) found that the most significant check is to analyze enormous volumes of data and pay attention to supporting data or data for future exercises, given the growing growth of IoT, massive data, and message processing. Additionally, there are several disparate data sources and data kinds that need to be categorized. It is necessary to combine data from sensors, cameras, digital media, etc., and this massive amount of data varies in strategy, duplication, bytes, strings, varieties, etc., thanks to the enormous data era's proliferation of data sources. In order to segment data from any internet websites, various tools and frameworks are required.

As according Du (2020) research, congestion in the transportation network is a major problem in many rapidly expanding cities. With the use of Internet of Things (IoT) technology, such as fixed street sensors and vehicle-to-vehicle sensors, real-time traffic data may be collected, which can be used to better manage traffic limits. The Internet of Things (IoT) can aid in enhancing real-time traffic by utilizing load-adjusting technologies to cut down on commute times and ensure constant traffic flow, hence reducing the frequency with which speeds spike and vehicles break down. Congestion hotspots and their severity may be predicted with the use of authentic IoT-derived traffic information devices, allowing adjacent vehicles to be rerouted onto less congested roads while still experiencing bearable waits.

Sulhi (2021) looked into the issue and came to the conclusion that the massive volumes of data produced by the IoT had great economic worth, and that data mining techniques may be used to the IoT to extract hidden information. Classification, clustering, association analysis, time series analysis, and outlier analysis are all covered, along with a full evaluation of data mining from the viewpoints of knowledge, method, and application. Recent application examples are also reviewed. More and more linked devices in the Internet of Things means more and more data that needs to be reviewed, and the most up-to-date methods need to be modified to accommodate big data. They reviewed these methods and discussed the issues and unanswered questions in the field of study with one another. At last, a comprehensive data-mining platform is unveiled.

Internet of Things and data mining: from applications to techniques and systems is where the value of IoT data is assessed, as reviewed and referenced by Liu (2020). The aforementioned information can be used to strengthen applications in fields as diverse as healthcare, such as remote health monitoring for the elderly and those with chronic health conditions, power management, such as the smart grid for efficient energy dispersion and storage, and smart city applications, such as traffic management in major cities to reduce congestion. Furthermore, there are certain difficulties in executing such applications at scale, such as processing and communication limitations, and concerns about data privacy.

Business Solution on Cloud

Stanoevska-Slabeva & Wozniak (2010) conducted research and concluded that businesses will be able to lease computational power and storage from a service provider and pay on demand, much as they do with other inputs like as energy and electricity. This will have a significant impact on the cost structure of all businesses that use hardware and software, and consequently on entrepreneurship development, macroeconomic indicators, employment generation in all industry sectors, job redeployment in the ICT sector, and public finance accounts via direct influence on social sector spending and indirect influence on tax revenue.

As per Oredo & Njihia (2014), despite the benefits and threats of cloud computing, academics and industry professionals have proposed a range of definitions in attempt to characterize the notion. While there is no universally accepted definition of cloud computing, several researchers have contributed to its understanding, and their concepts are utilized to define the range of components that may be generated in technical and corporate environments. An analysis of recent literature on cloud computing reveals that several authors have attempted to define "Cloud Computing" in terms of what they perceive to be its fundamental conceptual underpinnings.

Gai & Li (2012) investigated and asserted that cloud computing is the utilization of Internet-based techniques for the delivery of services, arising from the cloud as an analogy for the Web, predicated on how it is represented in computer network illustrations to extract the complex infrastructure it obscures as well as the leading edge of configurable web application advancement, in which adaptively extensible and frequently virtualized resources are provided as a service. They defined "cloud computing" as "both the applications delivered as services over the Internet and the hardware and systems software in datacenters that enable these services."

Cloud computing characteristics are mostly defined by the services' basic components. A review of the literature revealed that experimental data on the variables influencing or inhibiting organizational choices to use cloud services, as well as the commercial impact of cloud services adoption, is few. In addition, at least two noteworthy research-in-progress publications that contribute to the adoption and dissemination streams of research were discovered. Youssef (2012) creates a conceptual model to investigate the elements that impact clients' decisions to employ the SaaS model. Future testing will be conducted on a huge experimental foundation, according to the authors. They, on the other hand, focus on adoption factors while establishing a conceptual framework to explore the cloud computing idea as a whole. Nonetheless, further study is necessary on this area. A comprehensive study on cloud adoption enablers and barriers would assist customers and providers in developing realistic recommendations for improving enablers and minimizing inhibitors. Surprisingly, much of the recent work focuses on SaaS.

Wind et al. (2012) analyzed and found that the IT outsourcing industry is in flux due to the increasing adoption of cloud computing in the IT service market. This emerges as a deviation from the conventional provisioning paradigm in IT outsourcing, where IT resources are physically located at the client's or vendor's location. Cloud computing heralds the move to an asset-free IT provisioning paradigm in which massively scalable hardware, software, and data resources are network-accessible. Both practitioners and academics are discussing cloud computing as a component of the outsourcing trend and as a revolution. The adoption of the cloud computing paradigm will undoubtedly have an effect on business practices.

According to Mathur & Nishchal (2010), Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service are examples of service paradigms that have emerged as a result of cloud computing technology (IaaS). SaaS is an architecture for cloud computing in which applications reside on the cloud infrastructure of service providers and are made available to clients via online interfaces and programs. The primary goal of SaaS is to abolish the practice of programs remaining locally on exclusive users' devices, as the processing capacity of these separate devices cannot be utilized to offer users with optimal computational effectiveness and performance. It is said that Software as a Service generated cloud computing. PaaS is a service paradigm that offers clients with a platform for creating and operating applications using a programming interface provided and maintained by cloud service providers. IaaS enables cloud service providers to provide users with a variety of virtualized infrastructure, such as virtual servers, storage, and other underlying computing resources, allowing them to implement and operate their own operating system and applications, as well as upload or download software or data to or from the cloud.

IT resources are being offered as standardized and virtualized Cloud Services through the Internet, as determined by Sharma et al. (2010), which is reshaping the conventional IT sector ecosystems. In a same vein, Cloud Computing has altered the IT service planning, creation, distribution, scalability, maintenance, update, and payment processes. All current ES deployment strategies account for Cloud Computing technology.

According to an analysis and claims made by Fehling, et al. (2014), cloud computing has significantly altered the IT industry in recent years by presenting a whole new idea and platform for business processes (ES). Traditional ES appears to be too cumbersome, expensive, and difficult to implement and use for the vast majority of businesses. In response, the Cloud ES concept has emerged to provide businesses an edge through adaptability, scalability, and autonomy in their IT infrastructure and capabilities. Academics have not yet exhausted this area due to a lack of relevant material, but it has aroused the interest of practitioners in the field. The study's overarching goal is to contribute to the IS literature by providing a theoretical and practical picture of Cloud ES. It goes into further detail on the advantages and disadvantages of Cloud ES, and it investigates the potential of Cloud ES as an alluring option for SME in dealing with the difficulties of costly expenditures in IT infrastructures and IT resources.

Companies' on-site infrastructures often go well beyond their limits due to a large number of remote accesses, as the COVID-19 pandemic demonstrated, as stated by Agarwal et al. (2022). It's possible that moving to cloud-based services would be the most efficient choice. At the same time, many Indian businesses, especially SMEs, are hesitant to make the significant change required to move their applications to the cloud. In light of this, this article explores whether or not the analysis phase migration solutions now available are suitable for the needs of small and medium-sized enterprises. Using a literature review strategy, researchers first identify and investigate key factors for cloud adoption in SMEs. They use this information to evaluate current methods for making the switch from locally installed software to cloud-based alternatives. Specifically, they examine the analytical phases of the approaches to determine if these criteria are taken into consideration and develop judgments about the techniques' usefulness for small and medium-sized enterprises. Their research revealed that none of the migration methods they examined took into account all of the factors they identified as crucial for SMEs. Fewer people have investigated every possible angle in such depth. They include tabular results from the literature review process and wrap up the work with a summary and evaluation of the study as well as suggestions for future research.

Based on their research, Yildiz et al. (2009) concluded that cloud computing and e-learning are having a major impact on the educational and training sectors. Smartphone owners who make advantage of the cloud-based applications made available by cloud service providers may be able to do their work more quickly and cheaply. Outside of traditional classroom settings, cloud computing is quickly becoming an essential service for educators. Cloud-computing services are used in many types of education, including higher education, distance learning, online courses, and flipped classrooms, to provide students more independence. Due to their open, distributed, and networked nature, e-Learning systems pose a substantial security challenge in terms of limiting access to pertinent information to only actively participating and authorized actors at appropriate times. Security is a major factor that has prevented the widespread adoption of cloud computing. Data privacy concerns remain, though. The effects of this data security measure are still being seen in the business world. On order to protect themselves, customers need to be aware of the risks associated with storing data in the cloud. This study shows that despite eLearning systems' generally standardized architecture and specialized security requirements, they are vulnerable to internal cyberattacks because to a lack of adequate information technology rules and procedures.

Research by Pocatilu et al. (2009) found that IT resources are increasingly being used across the board in the healthcare sector. When it comes to satisfying IT needs, cloud computing can be a viable, low-cost option. There have been a number of publications published on the topic of cloud computing in healthcare, but no comprehensive review of the literature to yet. The purpose of the survey is to close the knowledge gap by assessing the present level of research and identifying promising avenues for future study. They conduct a formal literature review based on a widely accepted paradigm. By grouping the research goals of the discovered papers, they are able to extract study topics such as creating cloud-based apps, platforms, or brokers, security and privacy approaches, and benefit assessments for the use of cloud computing in healthcare Zhang & Zhang (2020). They accomplish this by analyzing the results of previous studies on a variety of topics in order to pinpoint areas where more research is needed, such as the development, validation, and improvement of current solutions and an examination technique. Today, information technology (IT) resources are being incorporated into every facet of the healthcare sector. A better healthcare system, better medical education, and better medical research are all helped along by these innovations. One of the benefits of cloud computing is that it should make it easier to fulfil increasing information technology needs. Cloud computing has many potential benefits, but it may also provide fresh insights into healthcare.

Objective of the Study

A user response-based Investigations of applications and techniques of Internet of Things enabled Data Mining on a Cloud hosted Solution

Research Methodology

Using a standardized questionnaire, 221 individuals from various industries were questioned to determine the applications, strategies, and effect of Internet of things and Data mining. The basic data and mean were collected using the method of purposeful sampling, and the t-test was employed to assess the data and determine the final results. In addition, 219 individuals from various business sectors were questioned to determine the uses, breadth, and influence of cloud computing in the workplace. For the survey, a structured questionnaire and a random sample procedure were utilized to collect data. Utilizing the mean and t-test, we evaluated and analysed the data to obtain the required findings.

Findings of the Study

Table 1 provides demographic information about the respondents. According to the table below, of the 221 total responders, 76.5 percent are male and 23.5 percent are female. 31.2 percent are under 32 years old, 39.4 percent are between 32 and 52 years old, and the remaining 29.4 percent are above 52 years old. 14.0% of respondents are mobile service providers, 24.0% are from the retail industry, 24.9% are from the gaming sector, 18.1% are from the agriculture sector, 12.2% are from the healthcare sector, and the remaining 6.8% are from other industries that employ IoT and data mining.

Table 1 Demographic Details
Variables Respondents Percentage
Male 169 76.5
Female 52 23.5
Total 221 100
Below 32 years 69 31.2
32-52 years 87 39.4
Above 52 years 65 29.4
Total 221 100
Occupational sector    
Mobile service providers 31 14.0
Retail 53 24.0
Gaming 55 24.9
Agriculture 40 18.1
Healthcare 27 12.2
Others 15 6.8
Total 221 100

The applications and methodologies of IoT and data mining are displayed in Table 2. These strategies foster enterprise implementation, decision making, and robotized constructions, with mean values of 3.92 and 3.96, respectively. Data mining facilitates the collecting of large amounts of data and their translation into useful information with a mean value of 3.93, and Data mining aids the retail, banking, and broadcasting industries through the clustering process with a mean value of 3.87. Data mining techniques permit classification, clustering, frequent pattern mining, and inbound streaming data regression with mean values of 3.86 and 3.80, respectively, and may be used to identify open situations. IoT systems identify an excess of information trends using well-established supervised, unsupervised, semi-supervised, and stochastic methodologies, with a mean value of 3.71, whereas data processing and internet technologies facilitate easy access to and interaction with a wide variety of physical equipment, with a mean value of 3.70. IoT, according to the responder, organizes digitally connected things and documents for navigation with a mean value of 3.66 and expands situational awareness by monitoring the support status with a mean value of 3.34. Further use of the t-test to determine the significance of the assertions revealed that the significance column value for each statement is less than 0.05.

Table 2 Applications and Techniques of IOT and Data Mining
S. No. Statements Mean score t value Sig
1. Data processing and internet technologies provide simple access and interaction with a wide range of physical equipment 3.70 3.025 0.001
2. Data mining enables the collection of massive data and its transformation into valuable knowledge 3.93 6.546 0.000
3. IoT systems find excess of information trends through well-established supervised, unsupervised, semi-supervised, and stochastic methodologies 3.71 3.248 0.001
4. Data mining approaches allows categorization, clustering, frequent pattern mining and inbound streaming data regression 3.86 5.455 0.000
5. IoT organises items and documents digitally linked for navigation 3.66 2.464 0.007
6. IoT broaden circumstance consciousness through monitoring of the brace prestige 3.34 2.423 0.008
7. Stimulate modifying energy load to control innovative challenges, transmission lines, reduce power, change downturn and self-protective robotization 3.96 7.032 0.000
8. Data mining assist retail, banking and broadcasting sectors through clustering process 3.87 5.681 0.000
9. Techniques nurture enterprise implementation, decision making with robotized constructions 3.92 6.371 0.000
10. Data mining can be used to track down open circumstances 3.80 4.630 0.000

The respondents' demographic profiles are displayed in Table 3. The table reveals that of the 219 total respondents, 77.25 percent are male and 22.8% are female. 30.6% of respondents are under the age of 38, 41.6% are between the ages of 38 and 48, while the remaining 27.8% are older than 48. 19.2% of respondents work in the health care industry, followed by 26.0% in the banking sector, 22.4% in the insurance sector, 27.4% in the IT sector, and the remaining 5.0% in other business sectors.

Table 3 Demographic Profile
Variable Respondents Percentage
Male 169 77.2
Female 50 22.8
Total 219 100
Below 38 years 67 30.6
38-48 years 91 41.6
Above 48 years 61 27.8
Total 219 100
Occupational sector    
Healthcare 42 19.2
Finance 57 26.0
Insurance 49 22.4
IT 60 27.4
Others 11 5.0
Total 219 100

Table 4 demonstrates the Business Applications and Scope of Cloud Computing. The table reveals that cloud computing is used to test new programs and processes before to their adoption, with a mean value of 3.96, and to store data on servers and make it accessible to clients on demand, with a mean value of 3.95. Cloud computing, according to the responder, keeps data and information secure and helps retrieve it when necessary, with a mean score of 3.93, and enables remote collaboration through file and data sharing, with a mean score of 3.89. Cloud-computing paradigm has a strong chance of having an influence on business practices, with a mean value of 3.89, and it eliminates the need for computer hardware to reduce IT department expenses, with a mean value of 3.88. In addition, the responder indicates that Cloud Computing has the potential to alter IT installation and delivery services with a mean score of 3.74 and that Cloud computing uses a network to access massively scalable hardware, software, and data resources with a mean score of 3.72. Cloud computing is often used to store files and data in many business sectors with a mean value of 3.67, and it provides a location for data backup and security with a mean value of 3.31. Further use of the t-test to determine the significance of the assertions revealed that the significance column value for each statement is less than 0.05.

Table 4 Application and Scope of Cloud Computing
S. No. Statements Mean score t value Sig
1. Cloud Computing has the scope to transform IT installation and delivery services 3.74 3.012 0.001
2. Cloud computing is used to store data on servers and make it available to customers on request 3.95 6.820 0.000
3. Cloud computing use a network to access massively scalable hardware, software and data resources 3.72 2.001 0.023
4. Cloud-computing paradigm has a good scope to have an impact on corporate practises 3.89 5.883 0.000
5. Cloud computing is commonly used to store the files and data in different business sectors 3.67 2.607 0.005
6. Cloud Computing provides place for data backup and keep it safe and secured 3.31 2.864 0.002
7. Cloud computing keep data and information safely and help to recover it whenever required 3.93 6.543 0.000
8. Cloud Computing helps to collaborate from distant places through file and data sharing 3.89 3.210 0.001
9. Cloud computing is use in testing process of new programs and process before their implementation 3.96 6.946 0.000
10. Cloud Computing helps to eliminate the use of computer hardware to decrease the cost of IT department 3.88 5.839 0.000


The Internet of Things component came from the need to improvise, automate, and study all of the world's devices, sensors, and equipment. Methods and technology for data mining are anticipated to play a crucial role in understanding the maximum capacity of IoT infrastructures. This application-driven study focused on the key uses of IoT, local impediments, and data mining techniques and systems designed to mitigate these challenges. The objective of this study is to provide a review of Internet of Things applications from a Data Mining perspective, with an emphasis on medical care, energy, and smart city use cases, as well as some significant exploration challenges. Finally, researchers provide a point-by-point audit of information mining methodologies that were chosen to be conveyed to Information of Things devices in a position remote from the periphery.

The study concludes that IoT and Data mining techniques encourage modifying energy load to control innovative challenges, transmission lines, reduce power, change downturn and self-protective robotization, nurture enterprise implementation, decision making with robotized constructions, enables the collection of massive data and its transformation into valuable knowledge, aids retail, banking, and broadcasting sectors via clustering process, enables categorization, cl. It is also discovered that the Internet of Things and data mining have a big influence on several industries.

The expansion of trade and supply networks as a result of global competition has made information management a vital component of businesses. In the era of digitalization, businesses have recently adopted a variety of new technologies. Cloud computing was important to the development of these technologies and has been widely adopted by businesses. Recent unforeseen and dangerous events, such as the global pandemic, have increased academic and practical interest in the cloud computing issue. This research seeks to assess and classify the contributions made by published publications on the topic of cloud computing. The research on the cloud is thoroughly analyzed from both the management and commercial viewpoints. The report highlights existing research efforts, identifies gaps in the literature, and offers a survey method for future cloud computing research in the context of corporate information management and global management.

The study concludes that cloud computing has the potential to transform IT installation and delivery services, store data on servers and make it accessible to customers on demand, provide access to massively scalable hardware, software, and data resources, store files and data, provide a location for data backup and keep it safe and secure, store data and information securely and aid in recovery, and improve collaboration. IT department costs can be reduced by eliminating the usage of computer hardware during the testing of new programs and procedures and by eliminating the use of computer hardware. Also discovered is that cloud computing has a huge influence on business.


Agarwal, P., Sharma, D.K., Varun, V.L., Venkatesh, P.R., Kanchibhotla, C., Ventayen, R.J.M., & Mohiddin, M.K. (2022). A survey on the scope of cloud computing. Materials Today: Proceedings, 51, 861-864.

Indexed at, Google Scholar, Cross Ref

Alam, F., Mehmood, R., Katib, I., & Albeshri, A. (2016). Analysis of eight data mining algorithms for smarter Internet of Things (IoT). Procedia Computer Science, 98, 437-442.

Indexed at, Google Scholar, Cross Ref

Boillat, T., & Legner, C. (2013). From on-premise software to cloud services: the impact of cloud computing on enterprise software vendors’ business models. Journal of theoretical and applied electronic commerce research, 8(3), 39-58.

Indexed at, Google Scholar, Cross Ref

Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A.V., & Rong, X. (2015). Data mining for the internet of things: literature review and challenges. International Journal of Distributed Sensor Networks, 11(8), 431047.

Indexed at, Google Scholar, Cross Ref

Chowhan, S., & Saxena, R. (2011). Customer relationship management from the business strategy perspective with the application of cloud computing. the Proceedings of DYNAA, 2(1), 2011.

Indexed at, Google Scholar

Du, Z. (2020). Energy analysis of Internet of things data mining algorithm for smart green communication networks. Computer Communications, 152, 223-231.

Indexed at, Google Scholar, Cross Ref

Fehling, C., Leymann, F., Retter, R., Schupeck, W., & Arbitter, P. (2014). Cloud computing patterns: fundamentals to design, build, and manage cloud applications. Springer Science & Business Media.

Indexed at, Google Scholar

Gaber, M.M., Aneiba, A., Basurra, S., Batty, O., Elmisery, A.M., Kovalchuk, Y., & Rehman, M.H.U. (2019). Internet of Things and data mining: From applications to techniques and systems. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 9(3), e1292.

Indexed at, Google Scholar, Cross Ref

Gai, K., & Li, S. (2012). Towards cloud computing: a literature review on cloud computing and its development trends. In 2012 Fourth International Conference on Multimedia Information Networking and Security, 142-146.

Google Scholar, Cross Ref

Houston, C., Gooberman-Hill, S., Mathie, R., Kennedy, A., Li, Y., & Baiz, P. (2017). Case study for the return on investment of internet of things using agent-based modelling and data science. Systems, 5(1), 4.

Indexed at, Google Scholar, Cross Ref

Liu, W. (2020). Integrating data mining with internet of things to build the music project management system. Journal of Ambient Intelligence and Humanized Computing, 1-13.

Indexed at, Google Scholar

Ma, H. (2021). Enterprise human resource management based on big data mining technology of internet of things. Journal of Intelligent and Fuzzy Systems, 5(1), 1-7.

Indexed at, Google Scholar, Cross Ref

Mathur, P., & Nishchal, N. (2010). Cloud computing: New challenge to the entire computer industry. In 2010 First International Conference on Parallel, Distributed and Grid Computing (PDGC 2010), 223-228.

Google Scholar, Cross Ref

Oralhan, Z., Oralhan, B., & Yiğit, Y. (2017). Smart city application: Internet of things (IoT) technologies based smart waste collection using data mining approach and ant colony optimization. Internet Things, 14(4), 5.

Indexed at, Google Scholar

Oredo, J.O., & Njihia, J. (2014). Challenges of cloud computing in business: Towards new organizational competencies.

Google Scholar

Pocatilu, P., Alecu, F., & Vetrici, M. (2009). Using cloud computing for E-learning systems. In Proceedings of the 8th WSEAS international conference on Data networks, communications, computers (Vol. 9, No. 1, pp. 54-59). Stevens Point, WI: World Scientific and Engineering Academy and Society.

Indexed at, Google Scholar

Priyanka, E.B., & Thangavel, S. (2020). Influence of Internet of Things (IoT) In Association of Data Mining Towards the Development Smart Cities-A Review Analysis. Journal of Engineering Science & Technology Review, 13(4).

Indexed at, Google Scholar, Cross Ref

Sattarian, M., Rezazadeh, J., Farahbakhsh, R., & Bagheri, A. (2019). Indoor navigation systems based on data mining techniques in internet of things: a survey. Wireless Networks, 25(3), 1385-1402.

Indexed at, Google Scholar, Cross Ref

Shang, H., Lu, D., & Zhou, Q. (2021). Early warning of enterprise finance risk of big data mining in internet of things based on fuzzy association rules. Neural Computing and Applications, 33(9), 3901-3909.

Google Scholar, Cross Ref

Sharma, M., Mehra, A., Jola, H., Kumar, A., Misra, M., & Tiwari, V. (2010). Scope of cloud computing for SMEs in India. arXiv preprint arXiv:1005.4030.

Indexed at, Google Scholar, Cross Ref

Stanoevska-Slabeva, K., & Wozniak, T. (2010). Cloud basics–an introduction to cloud computing. In Grid and cloud computing (pp. 47-61). Springer, Berlin, Heidelberg.

Indexed at, Google Scholar, Cross Ref

Sulhi, A. (2021). Data Mining Technology Used in an Internet of Things-Based Decision Support System for Information Processing Intelligent Manufacturing. International Journal of Informatics and Information Systems, 4(3), 168-179.

Indexed at, Google Scholar, Cross Ref

Tsai, C.W., Lai, C.F., Chiang, M.C., & Yang, L.T. (2013). Data mining for internet of things: A survey. IEEE Communications Surveys & Tutorials, 16(1), 77-97.

Indexed at, Google Scholar, Cross Ref

Wadhe, V.R. (2016). Future and Scope of Cloud Computing in India. Computer Engineering, 93, 39561-63.

Google Scholar

Wind, S., Repschlaeger, J., & Zarnekow, R. (2012). Towards a cloud computing selection and evaluation environment for very large business applications.

Indexed at, Google Scholar

Xie, C., Xiao, X., & Hassan, D.K. (2020). Data mining and application of social e-commerce users based on big data of internet of things. Journal of Intelligent & Fuzzy Systems, 39(4), 5171-5181.

Indexed at, Google Scholar, Cross Ref

Yildiz, M., Abawajy, J., Ercan, T., & Bernoth, A. (2009). A layered security approach for cloud computing infrastructure. In 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks (pp. 763-767). IEEE.

Indexed at, Google Scholar, Cross Ref

Youssef, A.E. (2012). Exploring cloud computing services and applications. Journal of Emerging Trends in Computing and Information Sciences, 3(6), 838-847.

Indexed at, Google Scholar

Zhang, F., & Zhang, Y. (2020). A big data mining and blockchain-enabled security approach for agricultural based on Internet of Things. Wireless Communications and Mobile Computing, 2020.

Indexed at, Google Scholar, Cross Ref

Received: 19-Dec-2022, Manuscript No. AMSJ-22-13030; Editor assigned: 20-Dec-2022, PreQC No. AMSJ-22-13030(PQ); Reviewed: 16-Jan-2023, QC No. AMSJ-22-13030; Revised: 18-Feb-2023, Manuscript No. AMSJ-22-13030(R); Published: 21-Mar-2023

Get the App