2023
DOI: 10.1109/access.2023.3318755
|View full text |Cite
|
Sign up to set email alerts
|

IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: A Hybrid Post-Quantum Cryptographic and Blockchain-Based Approach Toward a Trustworthy Cloud Computing

Reyazur Rashid Irshad,
Shahid Hussain,
Ihtisham Hussain
et al.

Abstract: Cloud computing has revolutionized organizational operations by providing convenient, on-demand access to resources. The emergence of the Internet of Things (IoT) has introduced a new paradigm for collaborative computing, leveraging sensors and devices that generate and process vast amounts of data, thereby resulting in challenges related to scalability and security, making the significance of conventional security methods even more pronounced. Consequently, in this paper, we propose a novel Scalable and Secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 64 publications
0
2
0
Order By: Relevance
“…There has been relatively limited research on edge computing-based face recognition services for IoT environments [ 11 ]. Moreover, since face capture services have a wide range of applications in recognizing the concentration level of students, developing a face recognition service for IoT environments has become necessary research [ 12 ].…”
Section: Introductionmentioning
confidence: 99%
“…There has been relatively limited research on edge computing-based face recognition services for IoT environments [ 11 ]. Moreover, since face capture services have a wide range of applications in recognizing the concentration level of students, developing a face recognition service for IoT environments has become necessary research [ 12 ].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, incorporating machine learning (ML) techniques further augments these protocols, enabling adaptive and intelligent management of cryptographic keys in WSNs deployed in cloud-based IoT applications. This essay explores the innovative fusion of hybrid key management and ML techniques to enhance network performance [1] [2]and security in IoT applications [3] deployed in the cloud.…”
Section: Introductionmentioning
confidence: 99%