Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2
Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2
Principle of 6G Wireless Networks: Vision, Challenges and Applications
Volume-3 | Issue-4
PROGRESS AND PRECLUSION OF KNEE OSTEOARTHRITIS: A STUDY
Volume-3 | Issue-3
Is Internet becoming a Major Contributor for Global warming - The Online Carbon Footprint
Volume-2 | Issue-4
Augmented Reality in Education
Volume-2 | Issue-4
A Study on Various Task-Work Allocation Algorithms in Swarm Robotics
Volume-2 | Issue-2
IoT based Biotelemetry for Smart Health Care Monitoring System
Volume-2 | Issue-3
Tungsten DiSulphide FBG Sensor for Temperature Monitoring in Float Glass Manufacturing
Volume-2 | Issue-4
GUI based Industrial Monitoring and Control System
Volume-3 | Issue-2
AUTOMATION USING IOT IN GREENHOUSE ENVIRONMENT
Volume-1 | Issue-1
Principle of 6G Wireless Networks: Vision, Challenges and Applications
Volume-3 | Issue-4
Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2
Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2
VIRTUAL REALITY GAMING TECHNOLOGY FOR MENTAL STIMULATION AND THERAPY
Volume-1 | Issue-1
Design of Digital Image Watermarking Technique with Two Stage Vector Extraction in Transform Domain
Volume-3 | Issue-3
Analysis of Natural Language Processing in the FinTech Models of Mid-21st Century
Volume-4 | Issue-3
PROGRESS AND PRECLUSION OF KNEE OSTEOARTHRITIS: A STUDY
Volume-3 | Issue-3
Image Augmentation based on GAN deep learning approach with Textual Content Descriptors
Volume-3 | Issue-3
Comparative Analysis for Personality Prediction by Digital Footprints in Social Media
Volume-3 | Issue-2
Volume - 4 | Issue - 2 | june 2022
Published
20 July, 2022
The data surge caused by the increase in the use of IoT devices in our day-to-day activities requires careful storage and maintenance systems to ensure the protection and integrity of private information. Users are provided with prospects to use rule-based programs and services that can be interconnected with their devices thereby enabling automation in the prodigious IoT ecosystem. The sensitive IoT data is generally stored and processed in cloud services. This data may be vulnerable to several threats. It is crucial to protect rule-based programs and sensitive IoT information against cyberattacks. The rule-based program and IoT data integrity and confidentiality can be maintained with the help of the framework proposed in this work. An end-to-end data encryption model based on advanced encryption standard and Intel SGX are used to design the framework of the data privacy preservation model. Real as well as simulated IoT device data are used for securely executing the rule-based programs in the SGX to evaluate the proposed framework.
KeywordsIoT data privacy Intel SGX advanced encryption standard cloud analytics rule-based IoT platform
Full Article PDF