2021
DOI: 10.1088/1742-6596/1881/3/032013
|View full text |Cite
|
Sign up to set email alerts
|

Fusion Application of Big Data and Cloud Computing In the Internet of Things

Abstract: The Internet of Things can be simply understood as the mode of connecting things in the Internet environment. It is mainly the organic combination of computer, Internet technology and other information technology means. At the same time, the organic combination of the Internet of Things, big data, cloud computing and other advanced information thinking and computing methods is the direction of the future smart city construction. In the experiment, due to the characteristics of real-time and massive data of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…And this trusted third party is willing to help all participants perform computing tasks. In the actual operation process, due to the complicated calculation process of re-encryption, the idea of revocable encryption is adopted, specifically, reEncrypt will be reasonably called to update the ciphertext only when the data is accessed [8][9] . All participants send their private inputs to the trusted third party through a completely secure channel, and the trusted third party then calculates the objective function and delivers the specified output to each participant.…”
Section: Sliding Window Technologymentioning
confidence: 99%
“…And this trusted third party is willing to help all participants perform computing tasks. In the actual operation process, due to the complicated calculation process of re-encryption, the idea of revocable encryption is adopted, specifically, reEncrypt will be reasonably called to update the ciphertext only when the data is accessed [8][9] . All participants send their private inputs to the trusted third party through a completely secure channel, and the trusted third party then calculates the objective function and delivers the specified output to each participant.…”
Section: Sliding Window Technologymentioning
confidence: 99%
“…Cloud computing resource server module is generated based on asymmetric key. We have already introduced the encryption method of asymmetric key [9][10]. The encryption and decryption keys of this encryption method are not the same.…”
Section: Security Statusmentioning
confidence: 99%
“…Basic operations mainly include basic transaction operations such as adding, deleting, updating, and querying [28] performed by the user in the foreground. This module is responsible for receiving and parsing user requests from the foreground, and calling the corresponding module to access the database to obtain information, or modify the database content.…”
Section: Implementation Of Business Logic Layermentioning
confidence: 99%