Effective Management of IoT Devices that can Withstand Attacks on Cloud Data

A. M, Thirumalai A
{"title":"Effective Management of IoT Devices that can Withstand Attacks on Cloud Data","authors":"A. M, Thirumalai A","doi":"10.1109/ICEARS56392.2023.10085408","DOIUrl":null,"url":null,"abstract":"First, with regards to attribute-based encryption (ABE), it is an approach to access control that allows data to be encrypted and decrypted based on certain attributes, such as a user's role, location, or other characteristics. This approach provides granular control over who can access specific data, which is particularly useful for IoT applications where sensitive data is being generated by many devices. However, as I mentioned earlier, ABE can be computationally intensive, which may not be suitable for low-power IoT devices. One possible solution to this challenge is to use edge computing, where some of the computing tasks are performed at the edge of the network, closer to the devices generating the data. This can help reduce the amount of data that needs to be sent to the cloud and can improve overall system performance. Another challenge with ABE is that it does not provide protection against key sharing. If a user shares their decryption key with an unauthorized party, that party could potentially gain access to sensitive data. To address this challenge, it's important to have strong access controls in place to prevent unauthorized sharing of keys. In terms of data storage security, while outsourcing to cloud servers can certainly help with complex computing tasks, it's still important to implement sophisticated security measures. This might include encrypting the data at rest and in transit, implementing access controls, and monitoring the system for potential security breaches. Finally, it's important to follow regulations and best practices for key sharing to prevent unauthorized access to sensitive data. This might include policies around key management, user authentication, and data governance.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEARS56392.2023.10085408","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

First, with regards to attribute-based encryption (ABE), it is an approach to access control that allows data to be encrypted and decrypted based on certain attributes, such as a user's role, location, or other characteristics. This approach provides granular control over who can access specific data, which is particularly useful for IoT applications where sensitive data is being generated by many devices. However, as I mentioned earlier, ABE can be computationally intensive, which may not be suitable for low-power IoT devices. One possible solution to this challenge is to use edge computing, where some of the computing tasks are performed at the edge of the network, closer to the devices generating the data. This can help reduce the amount of data that needs to be sent to the cloud and can improve overall system performance. Another challenge with ABE is that it does not provide protection against key sharing. If a user shares their decryption key with an unauthorized party, that party could potentially gain access to sensitive data. To address this challenge, it's important to have strong access controls in place to prevent unauthorized sharing of keys. In terms of data storage security, while outsourcing to cloud servers can certainly help with complex computing tasks, it's still important to implement sophisticated security measures. This might include encrypting the data at rest and in transit, implementing access controls, and monitoring the system for potential security breaches. Finally, it's important to follow regulations and best practices for key sharing to prevent unauthorized access to sensitive data. This might include policies around key management, user authentication, and data governance.
有效管理可抵御云数据攻击的物联网设备
首先,关于基于属性的加密(ABE),它是一种访问控制方法,允许根据某些属性(例如用户的角色、位置或其他特征)对数据进行加密和解密。这种方法提供了对谁可以访问特定数据的细粒度控制,这对于由许多设备生成敏感数据的物联网应用程序特别有用。然而,正如我前面提到的,ABE可能是计算密集型的,这可能不适合低功耗物联网设备。应对这一挑战的一个可能的解决方案是使用边缘计算,其中一些计算任务在网络边缘执行,更靠近生成数据的设备。这有助于减少需要发送到云的数据量,并可以提高整体系统性能。ABE的另一个挑战是它不提供防止密钥共享的保护。如果用户与未授权方共享其解密密钥,则该方可能获得对敏感数据的访问权限。为了应对这一挑战,重要的是要有强大的访问控制,以防止未经授权的密钥共享。就数据存储安全性而言,虽然外包给云服务器当然可以帮助处理复杂的计算任务,但实现复杂的安全措施仍然很重要。这可能包括对静态和传输中的数据进行加密,实现访问控制,以及监视系统是否存在潜在的安全漏洞。最后,必须遵循密钥共享的法规和最佳实践,以防止对敏感数据的未经授权访问。这可能包括围绕密钥管理、用户身份验证和数据治理的策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信