Data storage security for the Internet of Things

2020 ◽  
Vol 76 (11) ◽  
pp. 8529-8547
Author(s):  
Yuntao Duan ◽  
Jiangdai Li ◽  
Gautam Srivastava ◽  
Jyh-Haw Yeh
Sensors ◽  
2019 ◽  
Vol 19 (20) ◽  
pp. 4483 ◽  
Author(s):  
Iago Sestrem Ochôa ◽  
Luis Augusto Silva ◽  
Gabriel de Mello ◽  
Bruno Alves da Silva ◽  
Juan Francisco de Paz ◽  
...  

With the popularization of the Internet-of-Things, various applications have emerged to make life easier. These applications generate a large amount of user data. Analyzing the data obtained from these applications, one can infer personal information about each user. Considering this, it is clear that ensuring privacy in this type of application is essential. To guarantee privacy various solutions exist, one of them is UbiPri middleware. This paper presents a decentralized implementation of UbiPri middleware using the Ethereum blockchain. Smart contracts were used in conjunction with a communication gateway and a distributed storage service to ensure users privacy. The results obtained show that the implementation of this work ensures privacy at different levels, data storage security, and performance regarding scalability in the Internet of Things environments.


2018 ◽  
Vol 6 (3) ◽  
pp. 359-363
Author(s):  
A. Saxena ◽  
◽  
S. Sharma ◽  
S. Dangi ◽  
A. Sharma ◽  
...  

Author(s):  
Hala A. Naman ◽  
Naseer Ali Hussien ◽  
Mohand Lokman Al-dabag ◽  
Haider Th.Salim Alrikabi

<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure<strong> </strong>4 below shows the method of encryption and dealing with the Internet of things system..</p>


2020 ◽  
Author(s):  
Jaimon T Kelly ◽  
Katrina L Campbell ◽  
Enying Gong ◽  
Paul Scuffham

UNSTRUCTURED The Internet of Things (IoT) is a system of wireless, interrelated, and connected digital devices that can collect, send, and store data over a network without requiring human-to-human or human-to-computer interaction. The IoT promises many benefits to streamlining and enhancing health care delivery to proactively predict health issues and diagnose, treat, and monitor patients both in and out of the hospital. Worldwide, government leaders and decision makers are implementing policies to deliver health care services using technology and more so in response to the novel COVID-19 pandemic. It is now becoming increasingly important to understand how established and emerging IoT technologies can support health systems to deliver safe and effective care. The aim of this viewpoint paper is to provide an overview of the current IoT technology in health care, outline how IoT devices are improving health service delivery, and outline how IoT technology can affect and disrupt global health care in the next decade. The potential of IoT-based health care is expanded upon to theorize how IoT can improve the accessibility of preventative public health services and transition our current secondary and tertiary health care to be a more proactive, continuous, and coordinated system. Finally, this paper will deal with the potential issues that IoT-based health care generates, barriers to market adoption from health care professionals and patients alike, confidence and acceptability, privacy and security, interoperability, standardization and remuneration, data storage, and control and ownership. Corresponding enablers of IoT in current health care will rely on policy support, cybersecurity-focused guidelines, careful strategic planning, and transparent policies within health care organizations. IoT-based health care has great potential to improve the efficiency of the health system and improve population health.


10.2196/20135 ◽  
2020 ◽  
Vol 22 (11) ◽  
pp. e20135
Author(s):  
Jaimon T Kelly ◽  
Katrina L Campbell ◽  
Enying Gong ◽  
Paul Scuffham

The Internet of Things (IoT) is a system of wireless, interrelated, and connected digital devices that can collect, send, and store data over a network without requiring human-to-human or human-to-computer interaction. The IoT promises many benefits to streamlining and enhancing health care delivery to proactively predict health issues and diagnose, treat, and monitor patients both in and out of the hospital. Worldwide, government leaders and decision makers are implementing policies to deliver health care services using technology and more so in response to the novel COVID-19 pandemic. It is now becoming increasingly important to understand how established and emerging IoT technologies can support health systems to deliver safe and effective care. The aim of this viewpoint paper is to provide an overview of the current IoT technology in health care, outline how IoT devices are improving health service delivery, and outline how IoT technology can affect and disrupt global health care in the next decade. The potential of IoT-based health care is expanded upon to theorize how IoT can improve the accessibility of preventative public health services and transition our current secondary and tertiary health care to be a more proactive, continuous, and coordinated system. Finally, this paper will deal with the potential issues that IoT-based health care generates, barriers to market adoption from health care professionals and patients alike, confidence and acceptability, privacy and security, interoperability, standardization and remuneration, data storage, and control and ownership. Corresponding enablers of IoT in current health care will rely on policy support, cybersecurity-focused guidelines, careful strategic planning, and transparent policies within health care organizations. IoT-based health care has great potential to improve the efficiency of the health system and improve population health.


2017 ◽  
Vol 1 (3) ◽  
pp. 171-181
Author(s):  
Muhammad Izzuddin Mahali

Smart Door Locks System Based on Internet of Things Concept with Mobile Backend as s Service is the smart door locks development are supported by cloud computing technology as data storage. Methods of development that exist in this system is to combine technology (1) ESP8266 (2) Firebase and (3) Android Apps. Firebase is one of cloud-based services that are used to store data online. ESP8266 able to communicate with firebase well to process the read and write data directly using internet communication channels. Android application used to direct communication to the firebase for monitoring and  controlling simultaneously to the system. Android app can control / monitoring Indirectly to ESP8266 module via Firebase that serves as a mobile Backend as a Service to apply the rules of the Internet of Things


Author(s):  
Anchitaalagammai J. V. ◽  
Kavitha S. ◽  
Murali S. ◽  
Padmadevi S. ◽  
Shanthalakshmi Revathy J.

The internet of things (IoT) is rapidly changing our society to a world where every “thing” is connected to the internet, making computing pervasive like never before. It is increasingly becoming a ubiquitous computing service, requiring huge volumes of data storage and processing. Unfortunately, due to the lack of resource constraints, it tends to adopt a cloud-based architecture to store the voluminous data generated from IoT application. From a security perspective, the technological revolution introduced by IoT and cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. This chapter focus on security considerations for IoT from the perspectives of cloud tenants, end-users, and cloud providers in the context of wide-scale IoT proliferation, working across the range of IoT technologies. Also, this chapter includes how the organization can store the IoT data on the cloud securely by applying different Access control policies and the cryptography techniques.


Author(s):  
Anchitaalagammai J. V. ◽  
Kavitha S. ◽  
Murali S. ◽  
Hemalatha P. R. ◽  
Subanachiar T.

Blockchains are shared, immutable ledgers for recording the history of transactions. They substitute a new generation of transactional applications that establish trust, accountability, and transparency. It enables contract partners to secure a deal without involving a trusted third party. The internet of things (IoT) is rapidly changing our society to a world where every “thing” is connected to the internet, making computing pervasive like never before. It is increasingly becoming a ubiquitous computing service, requiring huge volumes of data storage and processing. The stable growth of the internet of things (IoT) and the blockchain technology popularized by cryptocurrencies has led to efforts to change the centralized nature of the IoT. Adapting the blockchain technology for use in the IoT is one such efforts. This chapter focuses on blockchain-IoT research directions and to provide an overview of the importance of blockchain-based solutions for cloud data manipulation in IoT.


2021 ◽  
Author(s):  
Ryoma Seto ◽  
Ryosuke Hosaka ◽  
Kai Ishida ◽  
Atsushi Shibasaki ◽  
Masae Nakamoto ◽  
...  

The purpose of this study was to investigate the perceptions of nursing managers about adopting nursing practices based on the Internet of Things and to examine related ethical issues. Questionnaires were sent to 538 nursing managers in Japan, with 131 responses. Of these, 87% and 33% agreed that a system using radio frequency identifiers would be useful for locating patients and nurses, respectively, 58%–81% recognized the value for patient safety of various camera systems for nursing observation, such as cameras linked to biometric alarms, 73% agreed the usefulness of automatically prioritizing alarms, but only around 39% were in favor of using facial recognition to help nursing observation. Many nursing managers expressed concerns about privacy. Data storage for at least 6 months was supported by 53% for location data and 41% for ceiling camera videos. Thus, nursing practice based on the Internet of Things is widely accepted in Japan.


Sign in / Sign up

Export Citation Format

Share Document