scispace - formally typeset
Journal ArticleDOI

A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems

V. Muthukumaran, +1 more
- 01 Oct 2020 - 
- Vol. 15, Iss: 4, pp 18-36
Reads0
Chats0
TLDR
The authors propose a cloud-assisted proxy re-encryption scheme for efficient data sharing across IoT systems that solves the root extraction problem using near-ring and improves the security measures of the system.
Abstract
In recent years, the growth of IoT applications is rapid in nature and widespread across several domains. This tremendous growth of IoT applications leads to various security and privacy concerns. The existing security algorithms fail to provide improved security features across IoT devices due to its resource constrained nature (inability to handle a huge amount of data). In this context, the authors propose a cloud-assisted proxy re-encryption scheme for efficient data sharing across IoT systems. The proposed approach solves the root extraction problem using near-ring. This improves the security measures of the system. The security analysis of the proposed approach states that it provides improved security with lesser computational overheads.

read more

Citations
More filters
Book ChapterDOI

Intelligent Medical Data Analytics Using Classifiers and Clusters in Machine Learning

TL;DR: A secure PPCD is proposed, which allows the service providers to diagnose a patient's disease without leaking any patient medical data and patients can retrieve the diagnosed results according to their own preference privately without compromising the service provider's privacy.
Book ChapterDOI

Fine Tuning Smart Manufacturing Enterprise Systems: A Perspective of Internet of Things-Based Service-Oriented Architecture

TL;DR: This chapter proposes the integration of standard workflow model between business system level and manufacturing production level with an IoT-enabled SOA framework.
Journal ArticleDOI

Generating Summaries Through Unigram and Bigram: Text Summarization

TL;DR: A new method for generating extractive summaries directly via unigram and bigram extraction techniques using the selective part of speech tagging to extract significant unigrams and bigrams from a set of sentences is described.
References
More filters
Journal ArticleDOI

A view of cloud computing

TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Journal ArticleDOI

Cloud computing: state-of-the-art and research challenges

TL;DR: A survey of cloud computing is presented, highlighting its key concepts, architectural principles, state-of-the-art implementation as well as research challenges to provide a better understanding of the design challenges of cloud Computing and identify important research directions in this increasingly important area.
Journal ArticleDOI

Internet of things - new security and privacy challenges

TL;DR: An adequate legal framework must take the underlying technology into account and would best be established by an international legislator, which is supplemented by the private sector according to specific needs and thereby becomes easily adjustable.
Journal ArticleDOI

CCIoT-CMfg: Cloud Computing and Internet of Things-Based Cloud Manufacturing Service System

TL;DR: The applications of the technologies of IoT and CC in manufacturing are investigated and a CC- and IoT-based cloud manufacturing (CMfg) service system and its architecture are proposed, and the relationship among CMfg, IoT, and CC is analyzed.
Journal ArticleDOI

IoT-Based Intelligent Perception and Access of Manufacturing Resource Toward Cloud Manufacturing

TL;DR: The applications of IoT technologies in CMfg has been investigated and the classification of manufacturing resources and services, as well as their relationships, are presented.
Related Papers (5)