scholarly journals A New Private Information Encryption Method in Internet of Things under Cloud Computing Environment

2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Haiyun Ma ◽  
Zhonglin Zhang

The existence of Internet of Things (IoT) facilitates the collection and transmission of urban data information. However, it can leak users’ personal privacy information in smart cities. Therefore, we propose a new private information encryption method in IoT under cloud computing environment. Under IoT, according to the properties and acquisition time, privacy information can be divided into many subspaces. Then, we analyze the private information encryption with different levels. Based on the stream cipher mechanism, we design an encryption system model of information collection. In the subspace, the privacy information is encrypted and transferred to the relay node. After encrypting, they are segmented and restructured. The long privacy information is divided into smaller slices. Then, they are reintegrated after conversion. Finally, we use stream cipher and dual-key algorithm to complete freedom nondestructive transformation between plaintext and ciphertext to ensure the integrity of the encrypted private information. Experimental results show that the proposed method takes less time in the encryption and decryption process, which has better ciphertext conversion output effect and suffers fewer network attacks in the same encryption time. The message encryption and decryption time is less than that of other methods. In terms of calculation cost, the proposed method decreases by approximately 14%. What is more, it has higher security and improves the security and integrity of the privacy information collection process.

Symmetry ◽  
2020 ◽  
Vol 12 (1) ◽  
pp. 150 ◽  
Author(s):  
Yicheng Yu ◽  
Liang Hu ◽  
Jianfeng Chu

The integration of Internet of things (IoT) and cloud computing technology has made our life more convenient in recent years. Cooperating with cloud computing, Internet of things can provide more efficient and practical services. People can accept IoT services via cloud servers anytime and anywhere in the IoT-based cloud computing environment. However, plenty of possible network attacks threaten the security of users and cloud servers. To implement effective access control and secure communication in the IoT-based cloud computing environment, identity authentication is essential. In 2016, He et al. put forward an anonymous authentication scheme, which is based on asymmetric cryptography. It is claimed that their scheme is capable of withstanding all kinds of known attacks and has good performance. However, their scheme has serious security weaknesses according to our cryptanalysis. The scheme is vulnerable to insider attack and DoS attack. For overcoming these weaknesses, we present an improved authentication and key agreement scheme for IoT-based cloud computing environment. The automated security verification (ProVerif), BAN-logic verification, and informal security analysis were performed. The results show that our proposed scheme is secure and can effectively resist all kinds of known attacks. Furthermore, compared with the original scheme in terms of security features and performance, our proposed scheme is feasible.


Author(s):  
. Monika ◽  
Pardeep Kumar ◽  
Sanjay Tyagi

In Cloud computing environment QoS i.e. Quality-of-Service and cost is the key element that to be take care of. As, today in the era of big data, the data must be handled properly while satisfying the request. In such case, while handling request of large data or for scientific applications request, flow of information must be sustained. In this paper, a brief introduction of workflow scheduling is given and also a detailed survey of various scheduling algorithms is performed using various parameter.


2018 ◽  
Vol 5 (2) ◽  
pp. 1 ◽  
Author(s):  
SHAFI'I MUHAMMAD ABDULHAMID ◽  
NAFISAT ABUBAKAR SADIQ ◽  
ABDULLAHI MOHAMMED ◽  
NADIM RANA ◽  
HARUNA CHIROMA ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document