2020
DOI: 10.1109/access.2020.3002815
|View full text |Cite
|
Sign up to set email alerts
|

Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography

Abstract: Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an effective approach to storing and managing the enormous amount of data generated by various devices. However, big data security of these organizations presents a challenge in the IoT-cloud architecture. To overcome security issues, we propose a cloud-enabled IoT environment supported by multifactor authentication an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(16 citation statements)
references
References 33 publications
0
16
0
Order By: Relevance
“…e advanced encryption standard (AES) and error-correcting codes (ECC) are mainly used as basic lightweight encryption elements. Various studies have been aimed to optimize lightweight encryption while balancing security and performance management [69][70][71][72][73][74][75][76].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…e advanced encryption standard (AES) and error-correcting codes (ECC) are mainly used as basic lightweight encryption elements. Various studies have been aimed to optimize lightweight encryption while balancing security and performance management [69][70][71][72][73][74][75][76].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…Lightweight encryption with low processing time and low power consumption is required to protect and secure data transmissions of resource-constrained IoT devices. Block encryption, such as AES and S-box, Galois Counter Mode, and physical unclonable functions, are being utilized, evaluated, and proposed [70,72,73,[182][183][184][185][186][187][188].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…Additionally, these approaches undergo significantly large delay as well thus making it unsuitable towards realistic IoT-ecosystem. Undeniably, existing IoT-security systems employed cryptosystem(s) whether as standalone architecture or multifactor authentication [35]. It eventually imposes computational overheads and complexity, thus making it inappropriate for IoT systems.…”
Section: Problem Formulationmentioning
confidence: 99%
“…Table V presents the encryption time results by the proposed GFS-SSPN lightweight encryption system. Noticeably, we used (21)(22)(23) to estimate the encryption and decryption time (ms) [35]. To be noted, the sample sizes (in bits) considered in this study were varied (here, increasing order) from 1 to 8.…”
Section: ) Encryption Time Analysismentioning
confidence: 99%
“…The big data is not accepted if privacy and security are not addressed. The scalability (S. Atiewi et al, 2020) is another major issue when the conventional preservation technique is adapted in big data. In spite of several techniques developed for privacy preservation, most of them cannot efficiently preserve the privacy as they fail to handle different attacks (Antony & Antony, 2016).…”
Section: Introductionmentioning
confidence: 99%