Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/516825
Title: Lightweight cryptography Approaches for enhanced data Security in IOT cloud computing Environment
Researcher: JUSTINDHAS Y
Guide(s): Jeyanthi P
Keywords: Automation and Control Systems
Computer Science
Engineering and Technology
University: Sathyabama Institute of Science and Technology
Completed Date: 2022
Abstract: The Internet of Things (IoT) is an emerging technology that has newlinegained a lot of attention in recent years. The introduction of IoT into newlinecommunity lifestyles brought a variety of objects, ranging from small to newlinelarge. The features and benefits of IoT have been enhanced when cloud newlinecomputing was incorporated into it. The minor limitations due to newlinephysical device size in the IoT are overcome with the support of cloud newlinecomputing. From simple environmental monitoring to major health care newlinemonitoring, IoT applications sense data and send it to cloud computing newlinefor further processing. All the computational processing burdens are newlineborne by the cloud environment, which makes the IoT application more newlineefficient and suitable for real-time activities. However, the major newlineconcerns while handling data between the IoT and cloud computing newlineenvironments are security and privacy. Since the user or environment newlinesensitive data from the IoT environment has to be transferred to the newlinecloud for processing through wireless medium, which is vulnerable to newlinedifferent types of threats and attacks. Thus, ensuring data security is the newlinemost important priority while designing a cloud-integrated IoT newlineapplication. newlineData security in an IoT-cloud application can be provided through newlineencryption algorithms. The requirements of encryption procedures will newlinediffer for each application due to the heterogeneous characteristics. newlinevi newlineMeanwhile ensuring the data security, it is essential to focus on network newlinesecurity by detecting attacks or threats on the network. Intrusion newlinedetection systems play a major role in various wireless sensor networks newlineto detect multiple attacks. Basically, intrusions are detected based on the newlineabnormal behaviour of the standard one. However, technological newlinedevelopment is also utilized by intruders, so that detecting intrusions newlinebased on monitoring abnormal behavior is quite complex and tedious for newlinean IoT network, which has numerous sensor devices. With the objective newlineof data security this research work presents an encryption procedure and newlineintrusion detect
Pagination: vi, 161
URI: http://hdl.handle.net/10603/516825
Appears in Departments:COMPUTER SCIENCE DEPARTMENT

Files in This Item:
File Description SizeFormat 
10.chapter 6.pdfAttached File40.92 kBAdobe PDFView/Open
11.annexure.pdf2.24 MBAdobe PDFView/Open
1.title.pdf37.97 kBAdobe PDFView/Open
2.prelim pages.pdf1.56 MBAdobe PDFView/Open
3.abstract.pdf190.18 kBAdobe PDFView/Open
4.contents.pdf500.02 kBAdobe PDFView/Open
5.chapter 1.pdf316.15 kBAdobe PDFView/Open
6.chapter 2.pdf303.68 kBAdobe PDFView/Open
7.chapter 3.pdf792.71 kBAdobe PDFView/Open
80_recommendation.pdf37.97 kBAdobe PDFView/Open
8.chapter 4.pdf597.43 kBAdobe PDFView/Open
9.chapter 5.pdf630.81 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: