Open Access Open Access  Restricted Access Subscription or Fee Access

Handling Privacy and Security Issues in IoT Networks using Hybrid Cryptography Applications

Dharman J.

Abstract


Cryptography is the study of secretly writing data
using logical and mathematical principles in order to
encrypt it or otherwise protect information. This
method has become more popular in computer
technologies for applications based on the Internet of
Things (IoT) that are prone to developing security
challenges, such as banking services, healthcare
systems, transportation, and other IoT-based systems.
Each cryptographic scheme is created with its own
distinct advantages, yet applying just one
cryptographic technique to a system has serious
disadvantages. For instance, symmetric encryption is
a practical way to protect data without compromising
its integrity. The elliptic curve encryption technique
ECC is examined in this paper along with its security
performance and execution efficiency. The
mathematical underpinnings of the algorithm are also
discussed.


Full Text:

PDF

References


Saxena R, Dey S. Cloud audit: A data integrity

verification approach for cloud computing. Procedia

Computer Science. 2016 Jan 1;89:142-51.

Chi H. The characteristics of rainfall in coastal

areas and the intelligent library book push system

oriented to the Internet of Things. Arabian Journal of

Geosciences. 2021 Jun;14(12):1-7.

Wang R. Research on data security technology

based on cloud storage. Procedia engineering. 2017

Jan 1;174:1340-55.

Luo X, Zhou Z, Zhong L, Mao J, Chen C. An

effective integrity verification scheme of cloud data

based on BLS signature. Security and

Communication Networks. 2018 Nov 19;2018:1-11.

Ping Y, Zhan Y, Lu K, Wang B. Public Data

Integrity Verification Scheme for Secure Cloud

Storage. Information. 2020 Sep;11(9):1-16.

Zhang Y, Xu C, Li H, Liang X. Cryptographic

public verification of data integrity for cloud storage

systems. IEEE Cloud Computing. 2016 Nov

;3(5):44-52.

Bornare V,Nikam K,Khedkar D,Hole S. Data

Sharing with Sensitive Information Hiding for Secure

Cloud Storage. IJSRD - International Journal for

Scientific Research & Development. 2020;8(3):139-

Aluvalu R, Muddana L. A survey on access

control models in cloud computing. InEmerging ICT

for Bridging the Future-Proceedings of the 49th

Annual Convention of the Computer Society of India

(CSI) Volume 1 2015 (pp. 653-664). Springer, Cham.

Rejin PR, Paul RD. Verification of data integrity

and co-operative loss recovery for secure data storage

in cloud computing. Cogent Engineering. 2019 Jan

;6(1):1-12.

Xu C. Research on Data Storage Technology in

Cloud Computing Environment. InIOP

ConferenceSeries: Materials Science and Engineering

Jul 1 (Vol. 394, No. 3, p. 032074). IOP

Publishing.

Al-Sakran HO. Accessing secured data in cloud

computing environment. International Journal of

Network Security & Its Applications. 2015 Jan

;7(1):19-28.

J. P. Magsino, E. R. Arboleda, and R. R. Corpuz,

“Enhancing security of Elgamal encryption scheme

using RSA and Chaos algorithm for e- commerce

application,” International Journal of Scientific &

Technology Research, vol. 8, no. 11, pp. 1343–1347,

O. Beckham, G. Oldman, J. Karrie, and D.

Craig, “Techniques used to formulate confidential

data by means of fragmentation and hybrid

encryption,” International Research Journal of

Management, IT and Social Sciences, vol. 6, no. 6,

pp. 68–86, 2019.

X. Wang, Y. Su, H. Zhang, and C. Zou, “A new

hybrid image encryption algorithm based on Gray

code transformation and snake-like diffusion,” The

Visual Computer, vol. 2021, pp. 1–22, 2021.

I. T. Almalkawi, R. Halloush, A. Alsarhan, A.

Al-Dubai, and J. N. Al-Karaki, “A lightweight and

efficient digital image encryption using hybrid

chaotic systems for wireless network applications,”

Journal of Information Security and Applications,

vol. 49, pp. 102384.1–102384.13, 2019.

S. Khan, L. Han, H. Lu, K. K. Butt, and N. U.

Khan, “A new hybrid image encryption algorithm

based on 2d-ca, fsm-dna rule generator, and fsbi,”

IEEE Access, vol. 2019, no. 99, p. 1, 2019.




DOI: https://doi.org/10.37628/jrfd.v8i2.1869

Refbacks

  • There are currently no refbacks.