Advanced Encryption Standard based Secure IoT Data Transfer Model for Cloud Analytics Applications
نویسندگان
چکیده
The data surge caused by the increase in use of IoT devices our day-to-day activities requires careful storage and maintenance systems to ensure protection integrity private information. Users are provided with prospects rule-based programs services that can be interconnected their thereby enabling automation prodigious ecosystem. sensitive is generally stored processed cloud services. This may vulnerable several threats. It crucial protect information against cyberattacks. program confidentiality maintained help framework proposed this work. An end-to-end encryption model based on advanced standard Intel SGX used design privacy preservation model. Real as well simulated device for securely executing evaluate framework.
منابع مشابه
Secure Data Retrieval based on Attribute-based Encryption in Cloud
Cloud computing plays important role in the development of IT industry. It can help a small organization to headway their business. An organization can progress from small scale industry to large scale industry. “Cloud” basically internet based data, network, resource storage. Meanwhile security, integrity, confidentiality requirement need must be achieve by cloud implementation. Attribute base...
متن کاملProvably Secure Concurrent Error Detection for Advanced Encryption Standard
Differential fault analysis (DFA) poses a significant threat to Advanced Encryption Standard (AES). Only a single faulty ciphertext is required for contemporary DFA to extract the secret key of AES using an average of 2 computations. Concurrent error detection (CED) is widely used to protect AES against DFA. Traditionally, these CEDs are evaluated with uniformly distributed faults, and the resu...
متن کاملSecure Identity-based Threshold Broadcast Encryption in the Standard Model
The general threshold broadcast encryption is not suitable for the networks with the constraints of computation and energy. In this paper, two constructions of the proper threshold broadcast encryption to these networks are proposed. In the proposed schemes, any user can dynamically join the system as a possible recipient, and the sender can dynamically choose the set of recipients S and the th...
متن کاملA Model For Secure Data Sharing Using Attribute Based Encryption
The data security concerns and requirements are very essential for social networks or for cloud computing where individuals, organizations, and businesses may outsource their various types of data, including highly sensitive data into the cloud. Always people would like to make their sensitive or private data only accessible to authorized people having some access policies. So in order to share...
متن کاملRole-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications
Individuals and organizations face a tension between (1) the explosion in the amount of valuable data that can be collected and processed and (2) the liability of possession and the threat of exposure of data (which may be sensitive) due to malicious actors, criminal enterprises, and software errors. These threats can lead entities to protect their data throughout its lifecycle, discouraging th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Technology and Digital World
سال: 2022
ISSN: ['2582-418X']
DOI: https://doi.org/10.36548/jitdw.2022.2.006