Smart Inventory System for Expiry Date Tracking
Volume-7 | Issue-2

Exploiting Vulnerabilities in Weak CAPTCHA Mechanisms within DVWA
Volume-7 | Issue-2

Investigating Process Scheduling Techniques for Optimal Performance and Energy Efficiency in Operating Systems
Volume-6 | Issue-4

Gamification in Mobile Apps: Assessing the Effects on Customer Engagement and Loyalty in the Retail Industry
Volume-5 | Issue-4

AI based Identification of Students Dress Code in Schools and Universities
Volume-6 | Issue-1

Review on Sanskrit Sandhi Splitting using Deep Learning Techniques
Volume-6 | Issue-2

AI-Powered Data Interaction: A Natural Language Chatbot for CSV, Excel, and SQL Files
Volume-7 | Issue-1

A Comprehensive Study of Zero-Day Attacks
Volume-5 | Issue-3

TF-IDF Vectorization and Clustering for Extractive Text Summarization
Volume-6 | Issue-1

A Review on Cryptocurrency and its Advancements in Present World
Volume-4 | Issue-4

AUTOMATION USING IOT IN GREENHOUSE ENVIRONMENT
Volume-1 | Issue-1

Principle of 6G Wireless Networks: Vision, Challenges and Applications
Volume-3 | Issue-4

Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2

Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2

VIRTUAL REALITY GAMING TECHNOLOGY FOR MENTAL STIMULATION AND THERAPY
Volume-1 | Issue-1

Design of Digital Image Watermarking Technique with Two Stage Vector Extraction in Transform Domain
Volume-3 | Issue-3

Analysis of Natural Language Processing in the FinTech Models of Mid-21st Century
Volume-4 | Issue-3

PROGRESS AND PRECLUSION OF KNEE OSTEOARTHRITIS: A STUDY
Volume-3 | Issue-3

Image Augmentation based on GAN deep learning approach with Textual Content Descriptors
Volume-3 | Issue-3

Comparative Analysis for Personality Prediction by Digital Footprints in Social Media
Volume-3 | Issue-2

Home / Archives / Volume-4 / Issue-2 / Article-6

Volume - 4 | Issue - 2 | june 2022

Advanced Encryption Standard based Secure IoT Data Transfer Model for Cloud Analytics Applications Open Access
Dinesh Kumar Anguraj   311
Pages: 114-124
Full Article PDF pdf-white-icon
Cite this article
Anguraj, Dinesh Kumar. "Advanced Encryption Standard based Secure IoT Data Transfer Model for Cloud Analytics Applications." Journal of Information Technology and Digital World 4, no. 2 (2022): 114-124
DOI
10.36548/jitdw.2022.2.006
Published
20 July, 2022
Abstract

The data surge caused by the increase in the use of IoT devices in our day-to-day activities requires careful storage and maintenance systems to ensure the protection and integrity of private information. Users are provided with prospects to use rule-based programs and services that can be interconnected with their devices thereby enabling automation in the prodigious IoT ecosystem. The sensitive IoT data is generally stored and processed in cloud services. This data may be vulnerable to several threats. It is crucial to protect rule-based programs and sensitive IoT information against cyberattacks. The rule-based program and IoT data integrity and confidentiality can be maintained with the help of the framework proposed in this work. An end-to-end data encryption model based on advanced encryption standard and Intel SGX are used to design the framework of the data privacy preservation model. Real as well as simulated IoT device data are used for securely executing the rule-based programs in the SGX to evaluate the proposed framework.

Keywords

IoT data privacy Intel SGX advanced encryption standard cloud analytics rule-based IoT platform

×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee Nil
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here