Secure Data Provenance in Internet of Things using Hybrid Attribute based Crypt Technique

Author(s):  
S. Porkodi ◽  
D. Kesavaraja
2021 ◽  
pp. 1-11
Author(s):  
Gunasekaran Manogaran ◽  
Mamoun Alazab ◽  
P. Mohamed Shakeel ◽  
Ching-Hsien Hsu

2018 ◽  
Vol 7 (3.1) ◽  
pp. 63 ◽  
Author(s):  
R Revathy ◽  
R Aroul Canessane

Data are vital to help decision making. On the off chance that data have low veracity, choices are not liable to be sound. Internet of Things (IoT) quality rates big data with error, irregularity, deficiency, trickery, and model guess. Improving data veracity is critical to address these difficulties. In this article, we condense the key qualities and difficulties of IoT, which impact data handling and decision making. We audit the scene of estimating and upgrading data veracity and mining indeterminate data streams. Also, we propose five suggestions for future advancement of veracious big IoT data investigation that are identified with the heterogeneous and appropriated nature of IoT data, self-governing basic leadership, setting mindful and area streamlined philosophies, data cleaning and handling procedures for IoT edge gadgets, and protection safeguarding, customized, and secure data administration.  


2017 ◽  
Vol 22 (2) ◽  
pp. 333-344 ◽  
Author(s):  
Thomas Pasquier ◽  
Jatinder Singh ◽  
Julia Powles ◽  
David Eyers ◽  
Margo Seltzer ◽  
...  

2021 ◽  
pp. 89-102
Author(s):  
Pramod Mathew Jacob ◽  
Prasanna Mani ◽  
R. L. Hariharan ◽  
Jisha Mariyam John

2020 ◽  
Vol 17 (1) ◽  
pp. 118-131 ◽  
Author(s):  
Ahmed A. Abd El-Latif ◽  
Bassem Abd-El-Atty ◽  
Wojciech Mazurczyk ◽  
Carol Fung ◽  
Salvador E. Venegas-Andraca

Sign in / Sign up

Export Citation Format

Share Document