提高云端物联网安全性的加密算法

Mohammed Ali Qasem, Fursan Thabit, Ozgu Can, Ebrahim Naji, Hoda AlKhzaimi, P. R. Patil, S. B. Thorat
{"title":"提高云端物联网安全性的加密算法","authors":"Mohammed Ali Qasem, Fursan Thabit, Ozgu Can, Ebrahim Naji, Hoda AlKhzaimi, P. R. Patil, S. B. Thorat","doi":"10.1002/spy2.378","DOIUrl":null,"url":null,"abstract":"In today's fast‐paced society, the Internet of Things (IoT) is revolutionizing businesses by bridging the gap between the digital and physical realms. This transformative technology enables rapid changes in the way people conduct business. Its fundamental aim is to connect everything in our world—objects, individuals, locations, and processes—under a unified infrastructure, providing valuable information and control over the state of our environment. The IoT represents a novel approach to developing diverse and distributed systems, which have now evolved into a pervasive computing cloud infrastructure. However, due to limitations in computing power and storage resources dedicated to handling the vast amounts of IoT data, a cloud‐based architecture is often employed in the IoT realm. Unfortunately, this shift has introduced a range of complex security and trust concerns within the cloud‐based IoT environment. As the demand for widespread deployment of cloud‐based IoT continues to soar, significant security‐related threats have emerged, prompting numerous researchers to develop cryptographic algorithms aimed at enhancing the security of both the Cloud and IoT. This paper provides an overview of cloud‐based IoT technology and seeks to fulfill the primary objective of conducting a survey on encryption algorithms in the context of the cloud and IoT. The research delves into the strategies, challenges, and variations associated with encryption in cloud and IoT systems. Additionally, this work includes a comparative analysis of the computational complexity of these techniques.","PeriodicalId":506233,"journal":{"name":"SECURITY AND PRIVACY","volume":"74 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cryptography algorithms for improving the security of cloud‐based internet of things\",\"authors\":\"Mohammed Ali Qasem, Fursan Thabit, Ozgu Can, Ebrahim Naji, Hoda AlKhzaimi, P. R. Patil, S. B. Thorat\",\"doi\":\"10.1002/spy2.378\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's fast‐paced society, the Internet of Things (IoT) is revolutionizing businesses by bridging the gap between the digital and physical realms. This transformative technology enables rapid changes in the way people conduct business. Its fundamental aim is to connect everything in our world—objects, individuals, locations, and processes—under a unified infrastructure, providing valuable information and control over the state of our environment. The IoT represents a novel approach to developing diverse and distributed systems, which have now evolved into a pervasive computing cloud infrastructure. However, due to limitations in computing power and storage resources dedicated to handling the vast amounts of IoT data, a cloud‐based architecture is often employed in the IoT realm. Unfortunately, this shift has introduced a range of complex security and trust concerns within the cloud‐based IoT environment. As the demand for widespread deployment of cloud‐based IoT continues to soar, significant security‐related threats have emerged, prompting numerous researchers to develop cryptographic algorithms aimed at enhancing the security of both the Cloud and IoT. This paper provides an overview of cloud‐based IoT technology and seeks to fulfill the primary objective of conducting a survey on encryption algorithms in the context of the cloud and IoT. The research delves into the strategies, challenges, and variations associated with encryption in cloud and IoT systems. Additionally, this work includes a comparative analysis of the computational complexity of these techniques.\",\"PeriodicalId\":506233,\"journal\":{\"name\":\"SECURITY AND PRIVACY\",\"volume\":\"74 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-03-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"SECURITY AND PRIVACY\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/spy2.378\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"SECURITY AND PRIVACY","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/spy2.378","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在当今快节奏的社会中,物联网(IoT)正在通过弥合数字和物理领域之间的鸿沟,为企业带来革命性的变化。这项变革性技术使人们开展业务的方式发生了迅速变化。它的根本目的是在统一的基础设施下连接世界上的一切--物体、个人、地点和流程,提供有价值的信息并控制我们的环境状态。物联网代表了一种开发多样化分布式系统的新方法,现已发展成为一种普遍的计算云基础设施。然而,由于专用于处理海量物联网数据的计算能力和存储资源有限,物联网领域通常采用基于云的架构。遗憾的是,这种转变在基于云的物联网环境中引入了一系列复杂的安全和信任问题。随着广泛部署基于云的物联网的需求不断飙升,出现了与安全相关的重大威胁,促使众多研究人员开发加密算法,旨在增强云和物联网的安全性。本文概述了基于云的物联网技术,并试图实现对云和物联网背景下的加密算法进行调查的主要目标。研究深入探讨了与云和物联网系统加密相关的策略、挑战和变化。此外,这项工作还包括对这些技术的计算复杂性进行比较分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cryptography algorithms for improving the security of cloud‐based internet of things
In today's fast‐paced society, the Internet of Things (IoT) is revolutionizing businesses by bridging the gap between the digital and physical realms. This transformative technology enables rapid changes in the way people conduct business. Its fundamental aim is to connect everything in our world—objects, individuals, locations, and processes—under a unified infrastructure, providing valuable information and control over the state of our environment. The IoT represents a novel approach to developing diverse and distributed systems, which have now evolved into a pervasive computing cloud infrastructure. However, due to limitations in computing power and storage resources dedicated to handling the vast amounts of IoT data, a cloud‐based architecture is often employed in the IoT realm. Unfortunately, this shift has introduced a range of complex security and trust concerns within the cloud‐based IoT environment. As the demand for widespread deployment of cloud‐based IoT continues to soar, significant security‐related threats have emerged, prompting numerous researchers to develop cryptographic algorithms aimed at enhancing the security of both the Cloud and IoT. This paper provides an overview of cloud‐based IoT technology and seeks to fulfill the primary objective of conducting a survey on encryption algorithms in the context of the cloud and IoT. The research delves into the strategies, challenges, and variations associated with encryption in cloud and IoT systems. Additionally, this work includes a comparative analysis of the computational complexity of these techniques.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信