Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/516825
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2023-10-09T09:03:02Z | - |
dc.date.available | 2023-10-09T09:03:02Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/516825 | - |
dc.description.abstract | The Internet of Things (IoT) is an emerging technology that has newlinegained a lot of attention in recent years. The introduction of IoT into newlinecommunity lifestyles brought a variety of objects, ranging from small to newlinelarge. The features and benefits of IoT have been enhanced when cloud newlinecomputing was incorporated into it. The minor limitations due to newlinephysical device size in the IoT are overcome with the support of cloud newlinecomputing. From simple environmental monitoring to major health care newlinemonitoring, IoT applications sense data and send it to cloud computing newlinefor further processing. All the computational processing burdens are newlineborne by the cloud environment, which makes the IoT application more newlineefficient and suitable for real-time activities. However, the major newlineconcerns while handling data between the IoT and cloud computing newlineenvironments are security and privacy. Since the user or environment newlinesensitive data from the IoT environment has to be transferred to the newlinecloud for processing through wireless medium, which is vulnerable to newlinedifferent types of threats and attacks. Thus, ensuring data security is the newlinemost important priority while designing a cloud-integrated IoT newlineapplication. newlineData security in an IoT-cloud application can be provided through newlineencryption algorithms. The requirements of encryption procedures will newlinediffer for each application due to the heterogeneous characteristics. newlinevi newlineMeanwhile ensuring the data security, it is essential to focus on network newlinesecurity by detecting attacks or threats on the network. Intrusion newlinedetection systems play a major role in various wireless sensor networks newlineto detect multiple attacks. Basically, intrusions are detected based on the newlineabnormal behaviour of the standard one. However, technological newlinedevelopment is also utilized by intruders, so that detecting intrusions newlinebased on monitoring abnormal behavior is quite complex and tedious for newlinean IoT network, which has numerous sensor devices. With the objective newlineof data security this research work presents an encryption procedure and newlineintrusion detect | |
dc.format.extent | vi, 161 | |
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | Lightweight cryptography Approaches for enhanced data Security in IOT cloud computing Environment | |
dc.title.alternative | ||
dc.creator.researcher | JUSTINDHAS Y | |
dc.subject.keyword | Automation and Control Systems | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Engineering and Technology | |
dc.description.note | ||
dc.contributor.guide | Jeyanthi P | |
dc.publisher.place | Chennai | |
dc.publisher.university | Sathyabama Institute of Science and Technology | |
dc.publisher.institution | COMPUTER SCIENCE DEPARTMENT | |
dc.date.registered | 2017 | |
dc.date.completed | 2022 | |
dc.date.awarded | 2023 | |
dc.format.dimensions | A5 | |
dc.format.accompanyingmaterial | DVD | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | COMPUTER SCIENCE DEPARTMENT |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
10.chapter 6.pdf | Attached File | 40.92 kB | Adobe PDF | View/Open |
11.annexure.pdf | 2.24 MB | Adobe PDF | View/Open | |
1.title.pdf | 37.97 kB | Adobe PDF | View/Open | |
2.prelim pages.pdf | 1.56 MB | Adobe PDF | View/Open | |
3.abstract.pdf | 190.18 kB | Adobe PDF | View/Open | |
4.contents.pdf | 500.02 kB | Adobe PDF | View/Open | |
5.chapter 1.pdf | 316.15 kB | Adobe PDF | View/Open | |
6.chapter 2.pdf | 303.68 kB | Adobe PDF | View/Open | |
7.chapter 3.pdf | 792.71 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 37.97 kB | Adobe PDF | View/Open | |
8.chapter 4.pdf | 597.43 kB | Adobe PDF | View/Open | |
9.chapter 5.pdf | 630.81 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: