2023
DOI: 10.21203/rs.3.rs-2572235/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Lightweight Leader Election Algorithm for IoT: Cloud Storage Use Case

Abstract: IoT devices in a distributed environment that work on shared data still have a necessity for a locking mechanism to safely take turns while updating shared data. However, we no longer have the notion of mutexes when working in a distributed system. That is where distributed locks and leader elections mechanisms come into the picture. In addition to its low power consumption, BROGO (Branch Optima to Global Optimum) Leader Election Algorithm offers a lot of powerful features so it is well suited for the IoT envi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…To prevent these types of attacks, data integrity is certainly crucial in cloud homomorphic encrypted data. Furthermore, for a data owner, data integrity (DI) [30] is a very important and sensitive point in the design, implementation, and use of any data system when he stores its data and then processes or retrieves it, especially if the matter comes to the cloud. DI can be defined as the validity, completeness, accuracy, and consistency of data (Figure 4).…”
Section: Data Integrity Ensuringmentioning
confidence: 99%
“…To prevent these types of attacks, data integrity is certainly crucial in cloud homomorphic encrypted data. Furthermore, for a data owner, data integrity (DI) [30] is a very important and sensitive point in the design, implementation, and use of any data system when he stores its data and then processes or retrieves it, especially if the matter comes to the cloud. DI can be defined as the validity, completeness, accuracy, and consistency of data (Figure 4).…”
Section: Data Integrity Ensuringmentioning
confidence: 99%
“…Using a digital signature, the message receiver can verify its identity, guarantee that the message has not been tampered with during transmission, and prevent the denial of having sent the message. Several digital signature schemes have been proposed to offer practical mechanisms for achieving message integrity [13,14], authenticity, and non-repudiation. Digital signature schemes are used in electronic funds transfer, data exchange, and software distribution.…”
Section: Introductionmentioning
confidence: 99%