SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1229
Crypto Mechanism to Provide Secure to the IOT Data
Mrs. Chethana C
Assistant professor, CSE Dept. of BMSIT&M, Avalahalli, Yelahanka, Bengalore-64
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Internet of things and cloud computing are two
different technologies which are the important componentsof
future internet. The merging of these two technologies is
called IOT. The large amount of data could be collected in the
cloud by various IOT applications. In this research we are
going to propose the model which provides security to the IOT
data in the Cloud.
Key Words: Cloud, Decryption, Encryption, IoT, Secure
1. INTRODUCTION
Internet of things (IOT) is defined as network of
physical objects that contain embedded technology to
communicate and sense or interact with their internalstates
or the external states or the external environment. Internet
of things is a one of the emerging new technology.
It allows unbounded connectivity of variousdevices
at any time, at any place. It allows the organizations and
third parties to collect and analyze the data about various
information. It also allows making use of different
technologies to manage the data [1].
Internet of things and cloud computing are two
different technologies which are the important components
of future internet [2]. The merging of these two technologies
is called IOT.
Cloud platform allows third parties to
develop IOT plugins so that any devices to be connected to
the cloud. This type of service model enables to meet
complex requirements such as timeliness, scalability,
security, easy configurability and flexibility. The union of
IOT resources into cloud introduces new resource
management.
The various applications used in cloud IoT are:
Healthcare, Smart cities and communities, Smart home and
smart metering, Video surveillance, Automotive and smart
mobility, Smart energy and smart grid, Smart logistics,
Environmental monitoring.
The sensitive data (Exampleinanhealthmonitoring
applications data such as, heart rate, location, step-count,
etc.) of the user may be intruded by the outside world.
Therefore approaches to preserve the privacy of the data in
the cloud are very important.
The security for database needs a separate
consideration in addition to traditional cytological security.
Especially, since various attacks such as inference attack,
query execution attack or known-plaintext attack are
possible according to the nature of database.
2. LITERATURE SURVEY
There are various encryption and decryption algorithm few
of which are, homomorphic encryption scheme, encrypted
query processing, order preserving encryption etc
Drawbacks in existing systems are as follows
 Leakage of information.
 May not applicable for IOT
 frequency and order based inference attacks cannot be
avoided
 Attacker can learn the occurance of data item
 Expensive
Zheli Liu, et al. [4] proposed, “New order preserving
encryption model for outsourced databases in cloud
environments”. Order-preserving encryption (OPE) is a
common encryption scheme which ensures that the orderof
plaintextsremains in the ciphertexts. It is appealing because
systems can perform order operations on ciphertexts in the
same way as on plaintexts: for example, a database server
can build an index, perform SQL range queries, and sort
encrypted data, all in the same way as for plaintext data.
The proposed OPE model can be implemented by
any programming language, and users can define their split
methods and encrypt function. The disadvantage of this
algorithm is it does not provide the nonlinear encrypt
function and also it does not prevent frequency based
inference attacks.
Seny kamar, [5] proposed, “Encrypted search”. One
common way to store IoT data is in structured databases,
such as SQL databases. In an encrypted query processing
system, a plaintext SQL query is transformedtoanencrypted
query, such that the cloud cannot learn about the values in
the query. The query is then executed over encrypted data
and the encrypted result is sent back to the user. The
disadvantage of this algorithm leads to leaking information.
In CryptDB [6], the cloud can perform traditional
database queries over encrypted data and reply with the
encrypted result. To achieve this, CryptDB reliesonatrusted
proxy which intercepts the communication and applies en-
decryption transparent to the user. CryptDBisdesignedwith
web applications in mind and is not suitable for IoT
application scenarios, mainly because: (i) it employs
cryptographic schemes that are prohibitively expensive for
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1230
constrained IoT devices and (ii) it relies on a trusted proxy,
which has access to the encryption keys and plaintext
information.
H. Shafagh et. al, Talos: Encrypted Query Processing
for the IoT [7], in this paper, authors present Talos1, an IoT
data protection system which securely stores encrypted IoT
data on the Cloud database, while allowing for efficient
database query processing over the encrypted data. In their
design, they move away from CryptDB’s focus on web
applications only. Instead, they have a secure end to end
system that stores encrypted data from IoT devices on a
clouddatabase, where data protection isexecutedatthedata
source.
Craig Gentry et.al, proposes an “Homomorphic
Evaluation of the AES Circuit” [8]. Research on fully
homomorphic cryptosystems has made significant
advancements in the recent years, and been able to show
that arbitrary computations on encrypted values are
implementable. However, the involved computationsareyet
prohibitively high even for full-fledged devices and by far
infeasible for resource constrained devices. The
computations involved are presentlyprohibitivelyexpensive
even for full-fledged devices and highly infeasible for
resource-limited devices. It is, however, with regards to IoT
resources, computationally intensiveand results intoalarge
ciphertext size of 256 Byte, given a key size of 1024 bit.
“Inference Attacks on Property-Preserving
Encrypted Databases”, proposed by M. Naveed et al [9],
showed how simple attack techniques can be used to
disclose encrypted medical data in the OPE and
Deterministic encryption schemes. The attack schemes
require access to auxiliary information, such asrangeofdata
and distribution of it, which is seemingly simple to retrieve
for certain application scenarios. The disadvantage of this is
techniques such as frequency attack can be used to learn
about encrypted data.
3. OBJECTIVE OF THE PROPOSED RESEARCH
The Objective is to:
 Provide an efficient encryption and decryption
algorithm for the IoT data stored in the cloud.
 To provide a secure end to end connection between
IOT device and cloud. A secure end to end
connection between Cloud and User.
4. PROBLEM IDENTIFICATION AND DEFINITION
The Internet of Things (IoT), one of the fastest
growing trends in computing. IoT may have significant
impact on individuals’ privacy. IoT devices of any type
contribute to the enormous amount of data stored on
corporate clouds. The challengesdue to the ecosystemofIoT
applications require a more careful system design with
regard to resource constraints. It remainsanimportantopen
research problem to design and prove secure and practical
encrypted data processing schemes for the IoT domain.
Limitations on IoT devicesare their resourceconstraints.IoT
devices are inherently limited with regards to energy,
memory, CPU, and bandwidth.
The traditional cryptographic algorithmsappliedto
the database cannot overcome the various attacks like
inference attack, query execution attack. The proposed
work is to provide a safety encryption and decryption
algorithm to secure IoT data on to cloud.
5. PROPOSED WORK AND METHODOLOGY
The proposed system crypto mechanism to provide
secures to the Iot data in the cloud. The IoT data stored in
database have to be secured from variousattacks. Therefore
encryption mechanism suitable for database environmentis
required.
Hence, the proposed work will emphasize on enhancing the
resource utilization by providing security features for the
data.
The proposed system consists of the following modules
 Authenticity module:
 Data Intake module
 Encryption module
 Manager Module
 Decryption Module
Authenticity module: To address Network-based Attacks
between the IoT device (sensing and actuator) and the
Cloud, cloud and the user , Iot and user , a direct HTTPS [10]
connection is used. This allowsThe Internet of Things(IoT),
one of the fastest growing trendsin computing.IoTmayhave
significant impact on individuals’ privacy. IoT devicesof any
type contribute to the enormous amount of data stored on
corporate clouds.
The challenges due to the ecosystem of IoT
applications require a more careful system design with
regard to resource constraints. It remainsanimportantopen
research problem to design and prove secure and practical
encrypted data processing schemes for the IoT domain.
Limitations on IoT devicesare their resourceconstraints.IoT
devices are inherently limited with regards to energy,
memory, CPU, and bandwidth.
The traditional cryptographic algorithmsappliedto
the database cannot overcome the various attacks like
inference attack, query execution attack. Theproposedwork
is to provide a safety encryption and decryptionalgorithmto
secure IoT data on to cloud. Providing confidentiality,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1231
integrity protection, and authenticity of the data consisting
of two steps
o Handshaking
o Key Generation for communication
1. Data Intake and encrypt module: This module
reads the data from the data sensing IOT device at
front end, and apply encrypt scheme [11] tostorein
the cloud database. Encryption of read data using
protocol consists of preprocessing and
transformation. The transformation process will
apply HMAC recursively.
2. Decryption Module: Consisting of decryption
scheme [11] Inverse transformation and post
processing to get Plaint text of the encrypted data
present in the cloud data base. This module will be
deploying at data back end IOT device.
3. Manager Module: This comes with the security
module, which will enable the administrators to
control the data access and data sharing among the
other users of the organization.
4. User module: Secure connection between userand
cloud will be established. Then the user is allowed
to search for the data. The encrypted data from the
cloud will be decryptedbby the decryption module
and plain data will be displayed on to the user
application.
Fig1. Proposed IoT Model to seure IOT data.
The various steps of our IOT model shown in Fig2 is
expained below.
First step is to establish secure connection between Iot
Device and Cloud. Accessed IoT data wll beencryptedbefore
storing data on to the cloud database. Then next step is to
establisg secure connection between Cloud and User. Once
the secure connection is established between user and the
cloud, he is allowed to search for data. The user, and gets
the encrypted data from the cloud database. The encrypted
data will be decrypted to get plain text. The plain text will be
displayed at user application.
6. CONCLUSION
The sensitive data in the database needs to be
secured from various attacks, or accessing from
unauthorized persons. The various attacks such asinference
attack, query execution attack or known-plaintext attackare
possible according to the nature of database; an encryption
mechanism suitable for database environment is required.
Therefore we can make use of a better algorithm
that can carry out range search without exposing the order.
We also propose to build a formal model to verify and
validate the outcome of the research work, measuring of
various factors like energy memoryconsumption,timeusage
for encryption and decryption.
REFERENCES
[1] X. Caron, R.Bosua,S. B. Maynard,A. Ahmed, “The
Internet of Things (IoT) and its impactonindividual
privacy: An Australian perspective”, elsevier
,Science Direct, Pp.No 4-5, 2016.
[2] Botta, W. D. Donato, V.Persico,A.Prescape,
“Integration of Cloud computing and Internet of
Things: A survey”, Elsevier, Future Generation
Computer Systems, Vol 56, Pp.No 684–700, 2016.
[3] H. Shafagh, “Towards computing over Encrypted
Data in IoT Systems”, ACM, XRDS- WINT ER,
Vol.22(2), Pp.No 48-52,2015, DOI:
10.1145/2845157.
[4] Z.Liu, X. Chen,J. Yang, C.Jia, I.You, “New order
preserving encryption model for outsourced
databases in cloud environments”, Elsvier, Journal
of Network and Computer Applications, Vol 59,
Pp.No 198-207, 2016.
[5] B. S.Kamara,” EncryptedSearch”,ACM,XRDS-Spring,
Vol. 21(3), Pp. No 30-34, DOI:10.1145/2730908.
[6] R. A. Popa, C. M. S. Redfield, N. Zeldovich,H.
Balakrishnan, “CryptDB: Protecting Confidentiality
with Encrypted Query Processing”, ACM, 978-1-
4503-0977,2 Pp.No 1-16,2011.
[7] H.Shafagh, A. Hithnawi, S. Duquennoy,W.Hu,”Talos:
Encrypted query Processing for the Internet of
Things”, ACM, 978-1-4503-3631, 2015,
http://dx.doi.org/10.1145/2809695. 2809723.
[8] C.Gentry, S,Halevi, N. P. Smart, “Homomorphic
Evaluation of the AES Circuit”, In Proceedings of
Advances in Cryptology (CRYPTO ‘12). ACM, New
York, 2012.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1232
[9] M.Naveed, S. Kamara, C. V. wright, “Inference
Attacks on Property-Preserving Encrypted
Databases, In Proceedingsof the 22nd ACM SIGSAC,
Conference on Computer and Communications
Security (CCS‘15), New York, 2015, DOI:
http://dx.doi.org/10.1145 /2810103.2813651.
[10] K.Gaurav, P. Goyal, V. Agrawal, S.L. Rao,” IoT
Transaction Security”, 5th International
Conference on the Internet of Things (IoT), 2015.
[11] D. Lee, N. Park, “Security Enhancement Scheme
supporting range queries on encrypted DB for
Secure e-Navigation Era”, International Journal of
Security and Its Applications, vol.10 (2) Pp. No
141-150,2016,
http://dx.doi.org/10.14257/ijsia.2016.10.2.13

More Related Content

What's hot

IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
 
Book
BookBook
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
AM Publications
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
Ulf Mattsson
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
Ulf Mattsson
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET Journal
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
YogeshIJTSRD
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Ulf Mattsson
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccolo
eSAT Journals
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET Journal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
 
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
IRJET Journal
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
 
Future data security ‘will come from several sources’
Future data security ‘will come from several sources’Future data security ‘will come from several sources’
Future data security ‘will come from several sources’
John Davis
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
Associate Professor in VSB Coimbatore
 

What's hot (20)

IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Book
BookBook
Book
 
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccolo
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
Future data security ‘will come from several sources’
Future data security ‘will come from several sources’Future data security ‘will come from several sources’
Future data security ‘will come from several sources’
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 

Similar to Crypto Mechanism to Provide Secure to the IOT Data

Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
IRJET Journal
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET Journal
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET Journal
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
IRJET Journal
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET Journal
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
An efficient lightweight key exchange algorithm for internet of things appli...
An efficient lightweight key exchange algorithm for internet of  things appli...An efficient lightweight key exchange algorithm for internet of  things appli...
An efficient lightweight key exchange algorithm for internet of things appli...
IJECEIAES
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Dalton Valadares
 
Secure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersSecure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and Computers
IRJET Journal
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
IJECEIAES
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
IRJET Journal
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET Journal
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
IJECEIAES
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET Journal
 

Similar to Crypto Mechanism to Provide Secure to the IOT Data (20)

Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
An efficient lightweight key exchange algorithm for internet of things appli...
An efficient lightweight key exchange algorithm for internet of  things appli...An efficient lightweight key exchange algorithm for internet of  things appli...
An efficient lightweight key exchange algorithm for internet of things appli...
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
Secure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersSecure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and Computers
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
shivani5543
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 

Recently uploaded (20)

Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 

Crypto Mechanism to Provide Secure to the IOT Data

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1229 Crypto Mechanism to Provide Secure to the IOT Data Mrs. Chethana C Assistant professor, CSE Dept. of BMSIT&M, Avalahalli, Yelahanka, Bengalore-64 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Internet of things and cloud computing are two different technologies which are the important componentsof future internet. The merging of these two technologies is called IOT. The large amount of data could be collected in the cloud by various IOT applications. In this research we are going to propose the model which provides security to the IOT data in the Cloud. Key Words: Cloud, Decryption, Encryption, IoT, Secure 1. INTRODUCTION Internet of things (IOT) is defined as network of physical objects that contain embedded technology to communicate and sense or interact with their internalstates or the external states or the external environment. Internet of things is a one of the emerging new technology. It allows unbounded connectivity of variousdevices at any time, at any place. It allows the organizations and third parties to collect and analyze the data about various information. It also allows making use of different technologies to manage the data [1]. Internet of things and cloud computing are two different technologies which are the important components of future internet [2]. The merging of these two technologies is called IOT. Cloud platform allows third parties to develop IOT plugins so that any devices to be connected to the cloud. This type of service model enables to meet complex requirements such as timeliness, scalability, security, easy configurability and flexibility. The union of IOT resources into cloud introduces new resource management. The various applications used in cloud IoT are: Healthcare, Smart cities and communities, Smart home and smart metering, Video surveillance, Automotive and smart mobility, Smart energy and smart grid, Smart logistics, Environmental monitoring. The sensitive data (Exampleinanhealthmonitoring applications data such as, heart rate, location, step-count, etc.) of the user may be intruded by the outside world. Therefore approaches to preserve the privacy of the data in the cloud are very important. The security for database needs a separate consideration in addition to traditional cytological security. Especially, since various attacks such as inference attack, query execution attack or known-plaintext attack are possible according to the nature of database. 2. LITERATURE SURVEY There are various encryption and decryption algorithm few of which are, homomorphic encryption scheme, encrypted query processing, order preserving encryption etc Drawbacks in existing systems are as follows  Leakage of information.  May not applicable for IOT  frequency and order based inference attacks cannot be avoided  Attacker can learn the occurance of data item  Expensive Zheli Liu, et al. [4] proposed, “New order preserving encryption model for outsourced databases in cloud environments”. Order-preserving encryption (OPE) is a common encryption scheme which ensures that the orderof plaintextsremains in the ciphertexts. It is appealing because systems can perform order operations on ciphertexts in the same way as on plaintexts: for example, a database server can build an index, perform SQL range queries, and sort encrypted data, all in the same way as for plaintext data. The proposed OPE model can be implemented by any programming language, and users can define their split methods and encrypt function. The disadvantage of this algorithm is it does not provide the nonlinear encrypt function and also it does not prevent frequency based inference attacks. Seny kamar, [5] proposed, “Encrypted search”. One common way to store IoT data is in structured databases, such as SQL databases. In an encrypted query processing system, a plaintext SQL query is transformedtoanencrypted query, such that the cloud cannot learn about the values in the query. The query is then executed over encrypted data and the encrypted result is sent back to the user. The disadvantage of this algorithm leads to leaking information. In CryptDB [6], the cloud can perform traditional database queries over encrypted data and reply with the encrypted result. To achieve this, CryptDB reliesonatrusted proxy which intercepts the communication and applies en- decryption transparent to the user. CryptDBisdesignedwith web applications in mind and is not suitable for IoT application scenarios, mainly because: (i) it employs cryptographic schemes that are prohibitively expensive for
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1230 constrained IoT devices and (ii) it relies on a trusted proxy, which has access to the encryption keys and plaintext information. H. Shafagh et. al, Talos: Encrypted Query Processing for the IoT [7], in this paper, authors present Talos1, an IoT data protection system which securely stores encrypted IoT data on the Cloud database, while allowing for efficient database query processing over the encrypted data. In their design, they move away from CryptDB’s focus on web applications only. Instead, they have a secure end to end system that stores encrypted data from IoT devices on a clouddatabase, where data protection isexecutedatthedata source. Craig Gentry et.al, proposes an “Homomorphic Evaluation of the AES Circuit” [8]. Research on fully homomorphic cryptosystems has made significant advancements in the recent years, and been able to show that arbitrary computations on encrypted values are implementable. However, the involved computationsareyet prohibitively high even for full-fledged devices and by far infeasible for resource constrained devices. The computations involved are presentlyprohibitivelyexpensive even for full-fledged devices and highly infeasible for resource-limited devices. It is, however, with regards to IoT resources, computationally intensiveand results intoalarge ciphertext size of 256 Byte, given a key size of 1024 bit. “Inference Attacks on Property-Preserving Encrypted Databases”, proposed by M. Naveed et al [9], showed how simple attack techniques can be used to disclose encrypted medical data in the OPE and Deterministic encryption schemes. The attack schemes require access to auxiliary information, such asrangeofdata and distribution of it, which is seemingly simple to retrieve for certain application scenarios. The disadvantage of this is techniques such as frequency attack can be used to learn about encrypted data. 3. OBJECTIVE OF THE PROPOSED RESEARCH The Objective is to:  Provide an efficient encryption and decryption algorithm for the IoT data stored in the cloud.  To provide a secure end to end connection between IOT device and cloud. A secure end to end connection between Cloud and User. 4. PROBLEM IDENTIFICATION AND DEFINITION The Internet of Things (IoT), one of the fastest growing trends in computing. IoT may have significant impact on individuals’ privacy. IoT devices of any type contribute to the enormous amount of data stored on corporate clouds. The challengesdue to the ecosystemofIoT applications require a more careful system design with regard to resource constraints. It remainsanimportantopen research problem to design and prove secure and practical encrypted data processing schemes for the IoT domain. Limitations on IoT devicesare their resourceconstraints.IoT devices are inherently limited with regards to energy, memory, CPU, and bandwidth. The traditional cryptographic algorithmsappliedto the database cannot overcome the various attacks like inference attack, query execution attack. The proposed work is to provide a safety encryption and decryption algorithm to secure IoT data on to cloud. 5. PROPOSED WORK AND METHODOLOGY The proposed system crypto mechanism to provide secures to the Iot data in the cloud. The IoT data stored in database have to be secured from variousattacks. Therefore encryption mechanism suitable for database environmentis required. Hence, the proposed work will emphasize on enhancing the resource utilization by providing security features for the data. The proposed system consists of the following modules  Authenticity module:  Data Intake module  Encryption module  Manager Module  Decryption Module Authenticity module: To address Network-based Attacks between the IoT device (sensing and actuator) and the Cloud, cloud and the user , Iot and user , a direct HTTPS [10] connection is used. This allowsThe Internet of Things(IoT), one of the fastest growing trendsin computing.IoTmayhave significant impact on individuals’ privacy. IoT devicesof any type contribute to the enormous amount of data stored on corporate clouds. The challenges due to the ecosystem of IoT applications require a more careful system design with regard to resource constraints. It remainsanimportantopen research problem to design and prove secure and practical encrypted data processing schemes for the IoT domain. Limitations on IoT devicesare their resourceconstraints.IoT devices are inherently limited with regards to energy, memory, CPU, and bandwidth. The traditional cryptographic algorithmsappliedto the database cannot overcome the various attacks like inference attack, query execution attack. Theproposedwork is to provide a safety encryption and decryptionalgorithmto secure IoT data on to cloud. Providing confidentiality,
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1231 integrity protection, and authenticity of the data consisting of two steps o Handshaking o Key Generation for communication 1. Data Intake and encrypt module: This module reads the data from the data sensing IOT device at front end, and apply encrypt scheme [11] tostorein the cloud database. Encryption of read data using protocol consists of preprocessing and transformation. The transformation process will apply HMAC recursively. 2. Decryption Module: Consisting of decryption scheme [11] Inverse transformation and post processing to get Plaint text of the encrypted data present in the cloud data base. This module will be deploying at data back end IOT device. 3. Manager Module: This comes with the security module, which will enable the administrators to control the data access and data sharing among the other users of the organization. 4. User module: Secure connection between userand cloud will be established. Then the user is allowed to search for the data. The encrypted data from the cloud will be decryptedbby the decryption module and plain data will be displayed on to the user application. Fig1. Proposed IoT Model to seure IOT data. The various steps of our IOT model shown in Fig2 is expained below. First step is to establish secure connection between Iot Device and Cloud. Accessed IoT data wll beencryptedbefore storing data on to the cloud database. Then next step is to establisg secure connection between Cloud and User. Once the secure connection is established between user and the cloud, he is allowed to search for data. The user, and gets the encrypted data from the cloud database. The encrypted data will be decrypted to get plain text. The plain text will be displayed at user application. 6. CONCLUSION The sensitive data in the database needs to be secured from various attacks, or accessing from unauthorized persons. The various attacks such asinference attack, query execution attack or known-plaintext attackare possible according to the nature of database; an encryption mechanism suitable for database environment is required. Therefore we can make use of a better algorithm that can carry out range search without exposing the order. We also propose to build a formal model to verify and validate the outcome of the research work, measuring of various factors like energy memoryconsumption,timeusage for encryption and decryption. REFERENCES [1] X. Caron, R.Bosua,S. B. Maynard,A. Ahmed, “The Internet of Things (IoT) and its impactonindividual privacy: An Australian perspective”, elsevier ,Science Direct, Pp.No 4-5, 2016. [2] Botta, W. D. Donato, V.Persico,A.Prescape, “Integration of Cloud computing and Internet of Things: A survey”, Elsevier, Future Generation Computer Systems, Vol 56, Pp.No 684–700, 2016. [3] H. Shafagh, “Towards computing over Encrypted Data in IoT Systems”, ACM, XRDS- WINT ER, Vol.22(2), Pp.No 48-52,2015, DOI: 10.1145/2845157. [4] Z.Liu, X. Chen,J. Yang, C.Jia, I.You, “New order preserving encryption model for outsourced databases in cloud environments”, Elsvier, Journal of Network and Computer Applications, Vol 59, Pp.No 198-207, 2016. [5] B. S.Kamara,” EncryptedSearch”,ACM,XRDS-Spring, Vol. 21(3), Pp. No 30-34, DOI:10.1145/2730908. [6] R. A. Popa, C. M. S. Redfield, N. Zeldovich,H. Balakrishnan, “CryptDB: Protecting Confidentiality with Encrypted Query Processing”, ACM, 978-1- 4503-0977,2 Pp.No 1-16,2011. [7] H.Shafagh, A. Hithnawi, S. Duquennoy,W.Hu,”Talos: Encrypted query Processing for the Internet of Things”, ACM, 978-1-4503-3631, 2015, http://dx.doi.org/10.1145/2809695. 2809723. [8] C.Gentry, S,Halevi, N. P. Smart, “Homomorphic Evaluation of the AES Circuit”, In Proceedings of Advances in Cryptology (CRYPTO ‘12). ACM, New York, 2012.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1232 [9] M.Naveed, S. Kamara, C. V. wright, “Inference Attacks on Property-Preserving Encrypted Databases, In Proceedingsof the 22nd ACM SIGSAC, Conference on Computer and Communications Security (CCS‘15), New York, 2015, DOI: http://dx.doi.org/10.1145 /2810103.2813651. [10] K.Gaurav, P. Goyal, V. Agrawal, S.L. Rao,” IoT Transaction Security”, 5th International Conference on the Internet of Things (IoT), 2015. [11] D. Lee, N. Park, “Security Enhancement Scheme supporting range queries on encrypted DB for Secure e-Navigation Era”, International Journal of Security and Its Applications, vol.10 (2) Pp. No 141-150,2016, http://dx.doi.org/10.14257/ijsia.2016.10.2.13