Handling Privacy and Security Issues in IoT Networks using Hybrid Cryptography Applications
Abstract
Cryptography is the study of secretly writing data
using logical and mathematical principles in order to
encrypt it or otherwise protect information. This
method has become more popular in computer
technologies for applications based on the Internet of
Things (IoT) that are prone to developing security
challenges, such as banking services, healthcare
systems, transportation, and other IoT-based systems.
Each cryptographic scheme is created with its own
distinct advantages, yet applying just one
cryptographic technique to a system has serious
disadvantages. For instance, symmetric encryption is
a practical way to protect data without compromising
its integrity. The elliptic curve encryption technique
ECC is examined in this paper along with its security
performance and execution efficiency. The
mathematical underpinnings of the algorithm are also
discussed.
Full Text:
PDFReferences
Saxena R, Dey S. Cloud audit: A data integrity
verification approach for cloud computing. Procedia
Computer Science. 2016 Jan 1;89:142-51.
Chi H. The characteristics of rainfall in coastal
areas and the intelligent library book push system
oriented to the Internet of Things. Arabian Journal of
Geosciences. 2021 Jun;14(12):1-7.
Wang R. Research on data security technology
based on cloud storage. Procedia engineering. 2017
Jan 1;174:1340-55.
Luo X, Zhou Z, Zhong L, Mao J, Chen C. An
effective integrity verification scheme of cloud data
based on BLS signature. Security and
Communication Networks. 2018 Nov 19;2018:1-11.
Ping Y, Zhan Y, Lu K, Wang B. Public Data
Integrity Verification Scheme for Secure Cloud
Storage. Information. 2020 Sep;11(9):1-16.
Zhang Y, Xu C, Li H, Liang X. Cryptographic
public verification of data integrity for cloud storage
systems. IEEE Cloud Computing. 2016 Nov
;3(5):44-52.
Bornare V,Nikam K,Khedkar D,Hole S. Data
Sharing with Sensitive Information Hiding for Secure
Cloud Storage. IJSRD - International Journal for
Scientific Research & Development. 2020;8(3):139-
Aluvalu R, Muddana L. A survey on access
control models in cloud computing. InEmerging ICT
for Bridging the Future-Proceedings of the 49th
Annual Convention of the Computer Society of India
(CSI) Volume 1 2015 (pp. 653-664). Springer, Cham.
Rejin PR, Paul RD. Verification of data integrity
and co-operative loss recovery for secure data storage
in cloud computing. Cogent Engineering. 2019 Jan
;6(1):1-12.
Xu C. Research on Data Storage Technology in
Cloud Computing Environment. InIOP
ConferenceSeries: Materials Science and Engineering
Jul 1 (Vol. 394, No. 3, p. 032074). IOP
Publishing.
Al-Sakran HO. Accessing secured data in cloud
computing environment. International Journal of
Network Security & Its Applications. 2015 Jan
;7(1):19-28.
J. P. Magsino, E. R. Arboleda, and R. R. Corpuz,
“Enhancing security of Elgamal encryption scheme
using RSA and Chaos algorithm for e- commerce
application,” International Journal of Scientific &
Technology Research, vol. 8, no. 11, pp. 1343–1347,
O. Beckham, G. Oldman, J. Karrie, and D.
Craig, “Techniques used to formulate confidential
data by means of fragmentation and hybrid
encryption,” International Research Journal of
Management, IT and Social Sciences, vol. 6, no. 6,
pp. 68–86, 2019.
X. Wang, Y. Su, H. Zhang, and C. Zou, “A new
hybrid image encryption algorithm based on Gray
code transformation and snake-like diffusion,” The
Visual Computer, vol. 2021, pp. 1–22, 2021.
I. T. Almalkawi, R. Halloush, A. Alsarhan, A.
Al-Dubai, and J. N. Al-Karaki, “A lightweight and
efficient digital image encryption using hybrid
chaotic systems for wireless network applications,”
Journal of Information Security and Applications,
vol. 49, pp. 102384.1–102384.13, 2019.
S. Khan, L. Han, H. Lu, K. K. Butt, and N. U.
Khan, “A new hybrid image encryption algorithm
based on 2d-ca, fsm-dna rule generator, and fsbi,”
IEEE Access, vol. 2019, no. 99, p. 1, 2019.
DOI: https://doi.org/10.37628/jrfd.v8i2.1869
Refbacks
- There are currently no refbacks.