Journal ArticleDOI
A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems
V. Muthukumaran,D. Ezhilmaran +1 more
Reads0
Chats0
TLDR
The authors propose a cloud-assisted proxy re-encryption scheme for efficient data sharing across IoT systems that solves the root extraction problem using near-ring and improves the security measures of the system.Abstract:
In recent years, the growth of IoT applications is rapid in nature and widespread across several domains. This tremendous growth of IoT applications leads to various security and privacy concerns. The existing security algorithms fail to provide improved security features across IoT devices due to its resource constrained nature (inability to handle a huge amount of data). In this context, the authors propose a cloud-assisted proxy re-encryption scheme for efficient data sharing across IoT systems. The proposed approach solves the root extraction problem using near-ring. This improves the security measures of the system. The security analysis of the proposed approach states that it provides improved security with lesser computational overheads.read more
Citations
More filters
Book ChapterDOI
Intelligent Medical Data Analytics Using Classifiers and Clusters in Machine Learning
TL;DR: A secure PPCD is proposed, which allows the service providers to diagnose a patient's disease without leaking any patient medical data and patients can retrieve the diagnosed results according to their own preference privately without compromising the service provider's privacy.
Book ChapterDOI
Fine Tuning Smart Manufacturing Enterprise Systems: A Perspective of Internet of Things-Based Service-Oriented Architecture
TL;DR: This chapter proposes the integration of standard workflow model between business system level and manufacturing production level with an IoT-enabled SOA framework.
Journal ArticleDOI
Generating Summaries Through Unigram and Bigram: Text Summarization
Nesreen Alsharman,Inna Pivkina +1 more
TL;DR: A new method for generating extractive summaries directly via unigram and bigram extraction techniques using the selective part of speech tagging to extract significant unigrams and bigrams from a set of sentences is described.
References
More filters
Journal ArticleDOI
A view of cloud computing
Michael Armbrust,Armando Fox,Rean Griffith,Anthony D. Joseph,Randy H. Katz,Andy Konwinski,Gunho Lee,David A. Patterson,Ariel Rabkin,Ion Stoica,Matei Zaharia +10 more
TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Journal ArticleDOI
Cloud computing: state-of-the-art and research challenges
Qi Zhang,Lu Cheng,Raouf Boutaba +2 more
TL;DR: A survey of cloud computing is presented, highlighting its key concepts, architectural principles, state-of-the-art implementation as well as research challenges to provide a better understanding of the design challenges of cloud Computing and identify important research directions in this increasingly important area.
Journal ArticleDOI
Internet of things - new security and privacy challenges
TL;DR: An adequate legal framework must take the underlying technology into account and would best be established by an international legislator, which is supplemented by the private sector according to specific needs and thereby becomes easily adjustable.
Journal ArticleDOI
CCIoT-CMfg: Cloud Computing and Internet of Things-Based Cloud Manufacturing Service System
TL;DR: The applications of the technologies of IoT and CC in manufacturing are investigated and a CC- and IoT-based cloud manufacturing (CMfg) service system and its architecture are proposed, and the relationship among CMfg, IoT, and CC is analyzed.
Journal ArticleDOI
IoT-Based Intelligent Perception and Access of Manufacturing Resource Toward Cloud Manufacturing
TL;DR: The applications of IoT technologies in CMfg has been investigated and the classification of manufacturing resources and services, as well as their relationships, are presented.