Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems
نویسندگان
چکیده
The information obtained from external sources within the cloud and resulting computations are not always reliable. This is attributed to absence of tangible regulations management on part owners. Although numerous techniques for safeguarding securing have been developed, security hazards in still problematic. could potentially pose a significant challenge effective adoption utilization technology. In terms performance, many existing solutions affected by high computation costs, particularly auditing. order reduce auditing expenses, this paper proposes well-organised, lightweight system through enhanced integrity checking. proposed technique implements cryptographic hash function with low-cost mathematic operations. addition, explores role semi-trusted server regard smart device users. facilitates formal prior distribution IoT-cloud system. Essentially, validation stored exchanged environment. results show that offers features such as capability, key management, privacy, decreased sufficient users, one-time provision, degree accuracy. method exhibits lower complexity storage expenses compared those other bilinear map-based systems.
منابع مشابه
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملSecure Cloud-based Medical Data Exchange
For decades now, IT technology has been used in the field of medicine and healthcare. Developments in medicine led to a plethora of new diagnostic and imaging possibilities and a flood of corresponding patient data. Nowadays, healthcare is more of an inter-institutional joint effort than it ever was. In IT, the possibilies to process, store and share data have seen a revolution. Both sciences t...
متن کاملA Lightweight Data Integrity Scheme for Sensor Networks
Limited energy is the most critical constraint that limits the capabilities of wireless sensor networks (WSNs). Most sensors operate on batteries with limited power. Battery recharging or replacement may be impossible. Security mechanisms that are based on public key cryptographic algorithms such as RSA and digital signatures are prohibitively expensive in terms of energy consumption and storag...
متن کاملCluster Enhanced Secure Authentication Scheme for Data Integrity in Manet
Mobile ad hoc networks (MANETs) consist of wireless mobile nodes that can dynamically and freely selforganize into arbitrary and temporary ad hoc network topologies. Due to high mobility of nodes, there exist frequent link breakages which lead to frequent path failures and route discoveries. In a route discovery, both cluster and broadcasting scheme is deployed, where a mobile node blindly rebr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13020691