scholarly journals Audit Outsourced Data in Internet of Things

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Gaopan Hou ◽  
Jianfeng Ma ◽  
Jiayi Li ◽  
Chen Liang

With the increase in network transmission rates, the Internet of Things (IoT) has gradually become a trend. Users can upload the data generated by the device to the cloud database to save local storage space, thereby reducing local storage costs. Because uploading data to the cloud loses physical control of the data, an audit is required. Traditional audit protocols are not completely suitable for lightweight devices in the IoT. This paper proposes a new type of audit protocol suitable for lightweight devices with weak computing power. This protocol transfers part of the computation of data tags to a cloud storage provider (CSP) with strong computing power, thereby reducing the introduction of computing entities. Our scheme supports the dynamic operation of data and guarantees the effectiveness of challenge response by blockchain. Compared with existing schemes, our scheme is more secure and effective.

Sensors ◽  
2019 ◽  
Vol 20 (1) ◽  
pp. 207 ◽  
Author(s):  
Yongjun Ren ◽  
Fujian Zhu ◽  
Pradip Kumar Sharma ◽  
Tian Wang ◽  
Jin Wang ◽  
...  

In the IoT (Internet of Things) environment, smart homes, smart grids, and telematics constantly generate data with complex attributes. These data have low heterogeneity and poor interoperability, which brings difficulties to data management and value mining. The promising combination of blockchain and the Internet of things as BCoT (blockchain of things) can solve these problems. This paper introduces an innovative method DCOMB (dual combination Bloom filter) to firstly convert the computational power of bitcoin mining into the computational power of query. Furthermore, this article uses the DCOMB method to build blockchain-based IoT data query model. DCOMB can implement queries only through mining hash calculation. This model combines the data stream of the IoT with the timestamp of the blockchain, improving the interoperability of data and the versatility of the IoT database system. The experiment results show that the random reading performance of DCOMB query is higher than that of COMB (combination Bloom filter), and the error rate of DCOMB is lower. Meanwhile, both DCOMB and COMB query performance are better than MySQL (My Structured Query Language).


2020 ◽  
Author(s):  
Shamim Muhammad ◽  
Inderveer Chana ◽  
Supriya Thilakanathan

Edge computing is a technology that allows resources to be processed or executed close to the edge of the internet. The interconnected network of devices in the Internet of Things has led to an increased amount of data, increasing internet traffic usage every year. Also, edge computing is driving applications and computing power away from the integrated points to areas close to users, leading to improved performance of the application. Despite the explosive growth of the edge computing paradigm, there are common security vulnerabilities associated with the Internet of Things applications. This paper will evaluate and analyze some of the most common security issues that pose a serious threat to the edge computing paradigm.


2021 ◽  
Author(s):  
O. Vishali Priya ◽  
R. Sudha

In today’s world, technology is constantly evolving; various instruments and techniques are available in the agricultural field. And within the agrarian division, the IoT preferences are Knowledge processing. With the help of introduced sensors, all information can be gathered. The reduction of risks, the mechanization of industry, the enhancement of production, the inspection of livestock, the monitoring of environment conditions, the roboticization of greenhouses, and crop monitoring Nearly every sector, like smart agriculture, has been modified by Internet-of-Things (IoT)-based technology, which has shifted the industry from factual to quantitative approaches. The ideas help to link real devices that are equipped with sensors, actuators, and computing power, allowing them to collaborate on a task while staying connected to the Internet, dubbed the “Internet of Things” (IoT). According to the World Telecommunication Union’s Worldwide Guidelines Operation, the Internet of Things (IoT) is a set of sensors, computers, software, and other devices that are connected to the Internet. The paper is highly susceptible to the consequences of its smart agriculture breakthrough.


Cloud Computing enables users to use remote resources thus reduces the burden on local storage. However, the use of such services gives rise to new set of problems. The users have no control over the data which they have stored on those storages so to achieve data authentication with confidentiality is utmost important. As every user may not have that expertise so they can request for data verification task to Trusted Verifier (TV) which will be an authorized party to check the intactness of outsourced data. Since the data owner stores the data on the cloud in an encrypted format, it becomes difficult to check the integrity of the data without decrypting. But by using homomorphic encryption schemes the integrity checking can be made possible without original copy. In this paper, we have given implementation and performance details of two homomorphic encryption schemes, Rivest Shamir Adleman (RSA) and Paillier. The RSA is multiplicative homomorphic scheme where the Paillier is additive homomorphic scheme. Both the algorithms are partially homomorphic thus limited in their functions. Due to homomorphic property of these algorithms, original contents will not get revealed in the verification process. This framework will achieve authentication of data by maintaining confidentiality.


2021 ◽  
Author(s):  
Zhenjiang Zhang ◽  
Chen Li ◽  
ShengLung Peng ◽  
Xintong Pei

Abstract In the last few years, the Internet of Things (IOT), as a new disruptive technology, has gradually changed the world. With the prosperous development of the mobile Internet and the rapid growth of the Internet of Things, various new applications continue to emerge, such as mobile payment, face recognition, wearable devices, driverless, VR/AR, etc. Although the computing power of mobile terminals is getting higher and the traditional cloud computing model has higher computing power, it is often accompanied by higher latency and cannot meet the needs of users. In order to reduce user delay to improve user experience, and at the same time reduce network load to a certain extent, edge computing, as an application of IOT, came into being. In view of the new architecture after dating edge computing, this paper focuses on the task offloading in edge computing, from task migration in multi-user scenarios and edge server resource management expansion, and proposes a multi-agent load balancing distribution based on deep reinforcement learning DTOMALB, a distributed task allocation algorithm, can perform a reasonable offload method for this scenario to improve user experience and balance resource utilization. Simulations show that the algorithm has a certain adaptability compared to the traditional algorithm in the scenario of multi-user single cell, and reduces the complexity of the algorithm compared to the centralized algorithm, and reduces the average response delay of the overall user. And balance the load of each edge computing server, improve the robustness and scalability of the system.


Author(s):  
Shingo Yamaguchi ◽  
Brij Gupta

This chapter introduces malware's threat in the internet of things (IoT) and then analyzes the mitigation methods against the threat. In September 2016, Brian Krebs' web site “Krebs on Security” came under a massive distributed denial of service (DDoS) attack. It reached twice the size of the largest attack in history. This attack was caused by a new type of malware called Mirai. Mirai primarily targets IoT devices such as security cameras and wireless routers. IoT devices have some properties which make them malware attack's targets such as large volume, pervasiveness, and high vulnerability. As a result, a DDoS attack launched by infected IoT devices tends to become massive and disruptive. Thus, the threat of Mirai is an extremely important issue. Mirai has been attracting a great deal of attention since its birth. This resulted in a lot of information related to IoT malware. Most of them came from not academia but industry represented by antivirus software makers. This chapter summarizes such information.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 60897-60907 ◽  
Author(s):  
Junho Jeong ◽  
Jong Wha J. Joo ◽  
Yangsun Lee ◽  
Yunsik Son

2016 ◽  
Vol 2 ◽  
pp. 242 ◽  
Author(s):  
Meg Leta Jones

Hello Barbie, a "smart toy" that uses voice recognition and wifi to interact with children, has raised significant privacy concerns among commentators. She represents not only a new type of toy but is also a device categorized in the Internet of Things. This Critical Engagement investigates what privacy means and how it is effectuated when there is no screen to provide notice and consent by asking how one knows if Hello Barbie can keep a secret.


2011 ◽  
Vol 282-283 ◽  
pp. 244-247
Author(s):  
Wen Jin Xu

In this paper, the three-dimensional molding mechanical and electrical integration unit Molded Interconnect Devices (MID) is introduced. It is a new type of electronic component. And the following part of the article presents the Internet of Things (IOT). From the design and manufacture process, the paper describes the possibility and necessity using MID in IOT technology, as RFID and Embedded System. In the end, the MID design process is presented.


Sign in / Sign up

Export Citation Format

Share Document