2021
DOI: 10.5815/ijwmt.2021.04.05
|View full text |Cite
|
Sign up to set email alerts
|

Resource Efficient Security Mechanism for Cloud of Things

Abstract: Cloud of Things (CoT) relates to the convergence between Cloud Computing (CC) and the Internet of Things (IoT) and has significantly transformed the way services are delivered in the ubiquitous realm of devices. This integration has become essential because of the huge data being generated by IoT devices, requiring an infrastructure for storage and processing. Such infrastructure is provided by Cloud Computing services with massive space for data storage and exceptional platform to process complex data. IoT n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…In [22], the balanced distribution issue of resources in the cloudlet network is analyzed, considering the users' mobility, and proposes an algorithm. This paper [23] addresses security issue by proposing usage of obfuscation and encryption techniques to scramble the data at IoT devices which is later stored in encrypted form at cloud server. The work [24] presents the development of a method for choosing a cloud computing platform for serving government agencies, which will form the digital government in the future.…”
Section: Related Workmentioning
confidence: 99%
“…In [22], the balanced distribution issue of resources in the cloudlet network is analyzed, considering the users' mobility, and proposes an algorithm. This paper [23] addresses security issue by proposing usage of obfuscation and encryption techniques to scramble the data at IoT devices which is later stored in encrypted form at cloud server. The work [24] presents the development of a method for choosing a cloud computing platform for serving government agencies, which will form the digital government in the future.…”
Section: Related Workmentioning
confidence: 99%
“…In the proposed scheme, what is used by the server and stored in the users table is not a password but a password verifier. Extracting a password from its verifier is equivalent to solving a discrete logarithm problem on an elliptic curve, which is very difficult in practice and takes thousands of years with current computing systems [18].…”
Section: Password Guessing Attack Resistancementioning
confidence: 99%