Details



An In-depth Analysis of the Security Features and Safeguard in Internet of Things (IoT), Big Data and Cloud Computing

Arnav Chawla

1-6

Vol 15, Jan-Jun, 2022

Date of Submission: 2021-11-13 Date of Acceptance: 2021-12-21 Date of Publication: 2022-01-02

Abstract

Security and protection issues develop with advances in parallel progress and multiple areas. Here we presented an invention called Cloud Computing (CC) to work with Big Data (BD). It focuses on the security issues of Cloud figuring and huge information advancements. Here we likewise present the security difficulties of incorporating IoT and Cloud Computing to give engineering relying upon the organization's security to reduce their security issues. Along these lines, we proposed another Cloud processing system incorporated with the Internet of Things as a base for Big Data. Wish you buy UK cheap rolex replica watches from the discounted website. They are suitable for both men and women.
If you like forever classic fake watches, you cannot miss the best replica breitling watches UK.
Best UK fake watches online are worth having.

References

  1. C. Stergiou, K. E. Psannis, “Efficient and Secure Big Data delivery in Cloud Computing”, Springer, Multimedia Tools and Applications, pp. 1-20, April 2017.
  2. Z. Fu, K. Ren, J. Shu, X. Sun, F. Huang, 'Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement', IEEE Transactions on Parallel and Distributed Systems, vol. 27, issue: 9, September 2016.
  3. T. Li, J. Li, Z. Liu, P. Li, C. Jia. “Differentially Private Naive Bayes Learning over Multiple Data Sources”, Information Sciences, vol. 444, pp. 89-104, 2018.
  4. C. Stergiou, K. E. Psannis, A. P. Plageras, G. Kokkonis, Y. Ishibashi, “Architecture for Security in IoT Environments”, in Proceedings of 26th IEEE International Symposium on Industrial Electronics, 19-21 June 2017, Edinburgh, Scotland, UK.
  5. B. P. Rao, P. Saluia, N. Sharma, A. Mittal, S. V. Sharma, “Cloud computing for Internet of Things & sensing based applications”, In Proceedings of IEEE 6th International Conference on Sensing technology (ICST 2012), pp. 374–380, Kolkata, India, 18-21 December 2012
  6. C. Stergiou, K. E. Psannis, B.-G. Kim, B. Gupta, “Secure integration of IoT and Cloud Computing”, Elsevier, Future Generation Computer Systems, December 2016.
  7. M. Rouse, 'IoT security (Internet of Things security)', IoT Agenda, 01/11/2015. [Online]. Available:http://internetofthingsagenda.techtarget.com/definition/IoT-security-Internet-of-Things-security. [Accessed 27/07/2017].
  8. J. Li, X. Chen, X. Huang, S. Tang, Y. Xiang, M. M. Hassan, A. Alelaiwi, “Secure Distributed Deduplication Systems with Improved Reliability”, IEEE Transactions on Computers, vol. 64, issue: 12, pp. 3569-3579, 2015.
  9. Q. Lin, H. Yan, Z. Huang, W. Chen, J. Shen, Y. Tang, “An ID-based linearly homomorphic signature scheme and its application in blockchain”, IEEE Access, vol. 6, pp. 20632-20640, February 2018.
  10. L. Fan, X. Lei, N. Yang, T. Q. Duong, G. K. Karagiannidis, “Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels”, IEEE Transactions Vehicular Technology, vol. 66, no. 8, pp. 7599-7603, August 2017.
  11. R. Kaur, S. Kinger, 'Analysis of Security Algorithms in Cloud Computing', International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 3, no. 3, pp. 171-176, March 2014.
  12. I. A., T. Hashem, N. B. Anuar, A. Gani, 'Schedule optimization for big data processing on cloud', in Proceedings of 2nd International Conference on Big Data Analysis and Data Mining, San Antonio, USA, 30 November - 1 December 2015.
  13. R. Toshniwal, K. G. Dastidar, A. Nath, 'Big Data Security Issues and Challenges',International Journal of Innovative Research in Advanced Engineering (IJIRAE), vol. 2, issue: 2, pp. 15-20, February 2015.
  14. Christos Stergiou, Kostas E. Psannis, Brij B. Gupta, Yutaka Ishibashi,” Security, Privacy & Efficiency of Sustainable Cloud Computing for Big Data & IoT”, Article in Sustainable Computing: Informatics and Systems, June 2018.
Download PDF
Back