scholarly journals Confidential data sharing in cloud with secured IOT Assistance

Author(s):  
M. Hemasri a Et. al.

The always developing number of Internet associated gadgets represents a few network safety chances. A large portion of the traded information between the Internet of Things (IoT) gadgets are not enough gotten because of asset limitations on IoT gadgets. Quality Based SignCryption (ABSC) is an incredible cryptographic system reasonable for dispersed conditions, giving adaptable access control and information mystery. Be that as it may, it forces high plan grave particle costs, and doesn't uphold access strategy update (client expansion/disavowal). This paper presents PROUD, an ABSC arrangement, to safely re-appropriate information design cryption cycle to edge workers to diminish the calculation overhead on the client sides. Pleased permits end-clients to offload the vast majority to an edge worker and check the accuracy of the got halfway design crypted information from the edge worker. The entrance strategy update include in PROUD doesn't influence the size of the message got by the end customer which decreases the information move limit and the limit purposes. Our complete hypothetical, trial investigation demonstrates that the beats existing plans regarding usefulness, correspondence and calculation.

Author(s):  
Neetu Faujdar

Pervasive computing has been greatly supported by the internet of things. The use of internet of things has created the environment that helps in the management of the different modules that are the part of the complete system, which can work effectively without the interference with the other components of the system. The cloud environment with the internet of things can help in getting the greater extend of data sharing. Little attention has been provided to the security of the various stakeholders that are the part of the system. IoT cloud integration involved privacy, security, and personal safety risk of the stakeholders. Not only are these types of security attacks possible, but there is also the possibility of attack on the IoT components like hardware manipulation to disrupt the services. As we are on the network, all the communication attacks of network are also possible. This chapter will cover common aspects of regarding the cloud and internet of things (IOT) with 5G networks.


2013 ◽  
Vol 58 (5-6) ◽  
pp. 1189-1205 ◽  
Author(s):  
Sergio Gusmeroli ◽  
Salvatore Piccione ◽  
Domenico Rotondi

2021 ◽  
Vol 9 (1) ◽  
pp. 17-25
Author(s):  
Shafagat Mahmudova

This article outlines the Internet of Things (IoT). The Internet of Things describes a network of physical objects, i.e., the “thing” including sensors, software, and other technologies for connection and data sharing with other devices and systems over the Internet. In other words, IoT is a relatively new technology enabling many “smart” devices to get connected, to analyze, process, and transfer data to each other and connect to a network. The article clarifies the essence of intelligent systems for the Internet of Things, and analyzes the most popular software for the IoT platform. It studies high-level systems for IoT and analyzes available literature in this field. It highlights most advanced IoT software of 2021. The article also identifies the prospects and challenges of intelligent systems for the Internet of Things. The creation of new intelligent systems for IoT and the development of technology will greatly contribute to the development of economy.


Sign in / Sign up

Export Citation Format

Share Document