Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/483353
Title: | Smart Model For Iot Data Security Improvement Using Blockchain |
Researcher: | Chauhan Chetan (18ENG7CSE0006) |
Guide(s): | Ramaiya Manoj Kumar |
Keywords: | Computer Science Computer Science Software Engineering Engineering and Technology |
University: | SAGE University, Indore |
Completed Date: | 2023 |
Abstract: | More and more devices are connected to each other via wireless networks as the Internet newlineand computer hardware improve, broadening the breadth of the Internet of Things (IoT). newlineThe Internet of Things (IoT) is a vast network of sensors and gateways that connects newlinethem all. IoT devices are continually interacting with their environment, generating a newlinevariety of data resources such as photos, audio, video, digital signals, and so on. All IoT newlinesystems and applications may connect to the Internet to efficiently share resources and newlineinformation. To put it another way, we live in a world where everything is linked to newlineeverything else. However, access management of device resources is proving difficult newlinedue to the widespread deployment of IoT devices, as well as their enormous quantity and newlinescale. Because the resources provided by IoT devices usually contain personal and newlinesensitive information, illegally acquiring them will have serious consequences. Access newlinecontrol technology is a useful resource protection tool that is widely used in a number of newlinesystems and scenarios. Traditional access control systems include DAC (discretionary newlineaccess control), IBAC (identity-based access control), and MAC (mandatory access newlinecontrol). These techniques, on the other hand, are all centralised, with single-point newlinefailure, scaling difficulties, limited reliability, and low throughput as downsides. Indeed, newlineIoT devices may belong to various organisations or individuals, and they are likely to be newlinemobile and perform poorly, making centralised access control difficult to implement in newlinean IoT setting. ABAC (attributed-based access control) governs access between subjects newlineand objects based on the qualities of entries, actions, and associated contexts. ABAC newlinegathers user (subject), resource (object), permission, and environment attribute, newlinedynamically mixes their relationships, and finally transforms permission management newlineinto attribute management, resulting in a fine-grained and dynamic access control system. newlineBlockchain a new data management system that enables |
Pagination: | |
URI: | http://hdl.handle.net/10603/483353 |
Appears in Departments: | Faculty of Engineering & Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 72.22 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 1.13 MB | Adobe PDF | View/Open | |
03_content.pdf | 440.06 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 328.62 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 2.67 MB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 2.53 MB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 1.46 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 4.01 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 13.22 MB | Adobe PDF | View/Open | |
10_annexures.pdf | 3.96 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 666.64 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: