Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/516825
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2023-10-09T09:03:02Z-
dc.date.available2023-10-09T09:03:02Z-
dc.identifier.urihttp://hdl.handle.net/10603/516825-
dc.description.abstractThe Internet of Things (IoT) is an emerging technology that has newlinegained a lot of attention in recent years. The introduction of IoT into newlinecommunity lifestyles brought a variety of objects, ranging from small to newlinelarge. The features and benefits of IoT have been enhanced when cloud newlinecomputing was incorporated into it. The minor limitations due to newlinephysical device size in the IoT are overcome with the support of cloud newlinecomputing. From simple environmental monitoring to major health care newlinemonitoring, IoT applications sense data and send it to cloud computing newlinefor further processing. All the computational processing burdens are newlineborne by the cloud environment, which makes the IoT application more newlineefficient and suitable for real-time activities. However, the major newlineconcerns while handling data between the IoT and cloud computing newlineenvironments are security and privacy. Since the user or environment newlinesensitive data from the IoT environment has to be transferred to the newlinecloud for processing through wireless medium, which is vulnerable to newlinedifferent types of threats and attacks. Thus, ensuring data security is the newlinemost important priority while designing a cloud-integrated IoT newlineapplication. newlineData security in an IoT-cloud application can be provided through newlineencryption algorithms. The requirements of encryption procedures will newlinediffer for each application due to the heterogeneous characteristics. newlinevi newlineMeanwhile ensuring the data security, it is essential to focus on network newlinesecurity by detecting attacks or threats on the network. Intrusion newlinedetection systems play a major role in various wireless sensor networks newlineto detect multiple attacks. Basically, intrusions are detected based on the newlineabnormal behaviour of the standard one. However, technological newlinedevelopment is also utilized by intruders, so that detecting intrusions newlinebased on monitoring abnormal behavior is quite complex and tedious for newlinean IoT network, which has numerous sensor devices. With the objective newlineof data security this research work presents an encryption procedure and newlineintrusion detect
dc.format.extentvi, 161
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleLightweight cryptography Approaches for enhanced data Security in IOT cloud computing Environment
dc.title.alternative
dc.creator.researcherJUSTINDHAS Y
dc.subject.keywordAutomation and Control Systems
dc.subject.keywordComputer Science
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideJeyanthi P
dc.publisher.placeChennai
dc.publisher.universitySathyabama Institute of Science and Technology
dc.publisher.institutionCOMPUTER SCIENCE DEPARTMENT
dc.date.registered2017
dc.date.completed2022
dc.date.awarded2023
dc.format.dimensionsA5
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:COMPUTER SCIENCE DEPARTMENT

Files in This Item:
File Description SizeFormat 
10.chapter 6.pdfAttached File40.92 kBAdobe PDFView/Open
11.annexure.pdf2.24 MBAdobe PDFView/Open
1.title.pdf37.97 kBAdobe PDFView/Open
2.prelim pages.pdf1.56 MBAdobe PDFView/Open
3.abstract.pdf190.18 kBAdobe PDFView/Open
4.contents.pdf500.02 kBAdobe PDFView/Open
5.chapter 1.pdf316.15 kBAdobe PDFView/Open
6.chapter 2.pdf303.68 kBAdobe PDFView/Open
7.chapter 3.pdf792.71 kBAdobe PDFView/Open
80_recommendation.pdf37.97 kBAdobe PDFView/Open
8.chapter 4.pdf597.43 kBAdobe PDFView/Open
9.chapter 5.pdf630.81 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: