{"title":"Effective Management of IoT Devices that can Withstand Attacks on Cloud Data","authors":"A. M, Thirumalai A","doi":"10.1109/ICEARS56392.2023.10085408","DOIUrl":null,"url":null,"abstract":"First, with regards to attribute-based encryption (ABE), it is an approach to access control that allows data to be encrypted and decrypted based on certain attributes, such as a user's role, location, or other characteristics. This approach provides granular control over who can access specific data, which is particularly useful for IoT applications where sensitive data is being generated by many devices. However, as I mentioned earlier, ABE can be computationally intensive, which may not be suitable for low-power IoT devices. One possible solution to this challenge is to use edge computing, where some of the computing tasks are performed at the edge of the network, closer to the devices generating the data. This can help reduce the amount of data that needs to be sent to the cloud and can improve overall system performance. Another challenge with ABE is that it does not provide protection against key sharing. If a user shares their decryption key with an unauthorized party, that party could potentially gain access to sensitive data. To address this challenge, it's important to have strong access controls in place to prevent unauthorized sharing of keys. In terms of data storage security, while outsourcing to cloud servers can certainly help with complex computing tasks, it's still important to implement sophisticated security measures. This might include encrypting the data at rest and in transit, implementing access controls, and monitoring the system for potential security breaches. Finally, it's important to follow regulations and best practices for key sharing to prevent unauthorized access to sensitive data. This might include policies around key management, user authentication, and data governance.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEARS56392.2023.10085408","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
First, with regards to attribute-based encryption (ABE), it is an approach to access control that allows data to be encrypted and decrypted based on certain attributes, such as a user's role, location, or other characteristics. This approach provides granular control over who can access specific data, which is particularly useful for IoT applications where sensitive data is being generated by many devices. However, as I mentioned earlier, ABE can be computationally intensive, which may not be suitable for low-power IoT devices. One possible solution to this challenge is to use edge computing, where some of the computing tasks are performed at the edge of the network, closer to the devices generating the data. This can help reduce the amount of data that needs to be sent to the cloud and can improve overall system performance. Another challenge with ABE is that it does not provide protection against key sharing. If a user shares their decryption key with an unauthorized party, that party could potentially gain access to sensitive data. To address this challenge, it's important to have strong access controls in place to prevent unauthorized sharing of keys. In terms of data storage security, while outsourcing to cloud servers can certainly help with complex computing tasks, it's still important to implement sophisticated security measures. This might include encrypting the data at rest and in transit, implementing access controls, and monitoring the system for potential security breaches. Finally, it's important to follow regulations and best practices for key sharing to prevent unauthorized access to sensitive data. This might include policies around key management, user authentication, and data governance.