2019
DOI: 10.1109/jiot.2018.2864513
|View full text |Cite
|
Sign up to set email alerts
|

FPGA-Based Symmetric Re-Encryption Scheme to Secure Data Processing for Cloud-Integrated Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 36 publications
0
9
0
Order By: Relevance
“…The proposed scheme gives efficient and accurate processing logs. To protect the IoT processing from internal attacks, again an FPGA‐based scheme is proposed in Al‐Asli et al, 37 in which authors presented a cloud‐based business model approach for symmetric re‐encryption to secure data processing. According to the author, while transferring a ciphertext of size 1 Gb, the experimental results of FPGA based proposed scheme gives 6 times faster results than the SW implementation.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed scheme gives efficient and accurate processing logs. To protect the IoT processing from internal attacks, again an FPGA‐based scheme is proposed in Al‐Asli et al, 37 in which authors presented a cloud‐based business model approach for symmetric re‐encryption to secure data processing. According to the author, while transferring a ciphertext of size 1 Gb, the experimental results of FPGA based proposed scheme gives 6 times faster results than the SW implementation.…”
Section: Related Workmentioning
confidence: 99%
“…Al-Asli [19] presented FPGA based symmetric re-encryption scheme to secure the data processing for cloud-integrated IoT. The proposed scheme supports various business models involving multiple parties and the data owner to give temporary access to IoT data to specific clients at a public market place (the cloud).…”
Section: Related Workmentioning
confidence: 99%
“…FPGA chips can operate simultaneously and it has a comparatively flexible architecture. Hence, the test cycles and design cost of the FPGA chips are lower [31][32][33][34]. Since two different LUT-based methods, namely substitution box (S-Box) and T-box, are used for an effective design of AES over the FPGA, LUT-based encryption and decryption are not only memory intensive but also asymmetric because of its transformation sequence and AES functions of encryption and decryption.…”
Section: Introductionmentioning
confidence: 99%