Advanced Encryption Standard based Secure IoT Data Transfer Model for Cloud Analytics Applications

نویسندگان

چکیده

The data surge caused by the increase in use of IoT devices our day-to-day activities requires careful storage and maintenance systems to ensure protection integrity private information. Users are provided with prospects rule-based programs services that can be interconnected their thereby enabling automation prodigious ecosystem. sensitive is generally stored processed cloud services. This may vulnerable several threats. It crucial protect information against cyberattacks. program confidentiality maintained help framework proposed this work. An end-to-end encryption model based on advanced standard Intel SGX used design privacy preservation model. Real as well simulated device for securely executing evaluate framework.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Data Retrieval based on Attribute-based Encryption in Cloud

Cloud computing plays important role in the development of IT industry. It can help a small organization to headway their business. An organization can progress from small scale industry to large scale industry. “Cloud” basically internet based data, network, resource storage. Meanwhile security, integrity, confidentiality requirement need must be achieve by cloud implementation. Attribute base...

متن کامل

Provably Secure Concurrent Error Detection for Advanced Encryption Standard

Differential fault analysis (DFA) poses a significant threat to Advanced Encryption Standard (AES). Only a single faulty ciphertext is required for contemporary DFA to extract the secret key of AES using an average of 2 computations. Concurrent error detection (CED) is widely used to protect AES against DFA. Traditionally, these CEDs are evaluated with uniformly distributed faults, and the resu...

متن کامل

Secure Identity-based Threshold Broadcast Encryption in the Standard Model

The general threshold broadcast encryption is not suitable for the networks with the constraints of computation and energy. In this paper, two constructions of the proper threshold broadcast encryption to these networks are proposed. In the proposed schemes, any user can dynamically join the system as a possible recipient, and the sender can dynamically choose the set of recipients S and the th...

متن کامل

A Model For Secure Data Sharing Using Attribute Based Encryption

The data security concerns and requirements are very essential for social networks or for cloud computing where individuals, organizations, and businesses may outsource their various types of data, including highly sensitive data into the cloud. Always people would like to make their sensitive or private data only accessible to authorized people having some access policies. So in order to share...

متن کامل

Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications

Individuals and organizations face a tension between (1) the explosion in the amount of valuable data that can be collected and processed and (2) the liability of possession and the threat of exposure of data (which may be sensitive) due to malicious actors, criminal enterprises, and software errors. These threats can lead entities to protect their data throughout its lifecycle, discouraging th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Technology and Digital World

سال: 2022

ISSN: ['2582-418X']

DOI: https://doi.org/10.36548/jitdw.2022.2.006