Security and Privacy-Preservation of IoT Data in Cloud-Fog Computing Environment

12/01/2022
by   Jatinder Kumar, et al.
0

IoT is the fastest-growing technology with a wide range of applications in various domains. IoT devices generate data from a real-world environment every second and transfer it to the cloud due to the less storage at the edge site. An outsourced cloud is a solution for handling the storage problem. Users' privacy can be exposed by storing the data on the cloud. Therefore, we propose a Private Data Storage model that stores IoT data on the outsourced cloud with privacy preservation. Fog nodes are used at the edge side for data partition and encryption. Partitioned and encrypted data is aggregated with the help of homomorphic encryption on the outsourced cloud. For secure query processing and accessing the data from the outsourced cloud, the introduced model can be used on the outsourced cloud.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/23/2021

A Lightweight Encryption Scheme for IoT Devices in the Fog

The Internet of Things (IoT) comprises of a heterogeneous mix of smart d...
research
11/16/2019

iGateLink: A Gateway Library for Linking IoT, Edge, Fog and Cloud Computing Environments

In recent years, the Internet of Things (IoT) has been growing in popula...
research
01/14/2019

LEP-CNN: A Lightweight Edge Device Assisted Privacy-preserving CNN Inference Solution for IoT

Supporting convolutional neural network (CNN) inference on resource-cons...
research
09/02/2020

Embedded Development Boards for Edge-AI: A Comprehensive Report

The use of Deep Learning and Machine Learning is becoming pervasive day ...
research
08/10/2020

Secure IoT Data Analytics in Cloud via Intel SGX

The growing adoption of IoT devices in our daily life is engendering a d...
research
01/23/2021

Privacy Assured Recovery of Compressively Sensed ECG signals

Cloud computing for storing data and running complex algorithms have bee...
research
12/04/2018

Exploiting Data Sensitivity on Partitioned Data

Several researchers have proposed solutions for secure data outsourcing ...

Please sign up or login with your details

Forgot password? Click here to reset