Rough set method-cloud Internet of things: A two-degree verification scheme for security in cloud-Internet of things
Sheeba MaryJohn Rukmony, Suganthi Gnanamony,
International Journal of Electrical and Computer Engineering (IJECE), Vol 13, No 2: April 2023
The quick development of innovations and increasing use of the internet of things (IoT) in human life brings numerous challenges. It is because of the absence of adequate capacity resources and tremendous volumes of IoT information. This can be resolved by a cloud-based architecture. Consequently, a progression of challenging security and privacy concerns has emerged in the cloud based IoT context. In this paper, a novel approach to providing security in cloud based IoT environments is proposed. This approach mainly depends on the working of rough set rules for guaranteeing security during data sharing (rough set method-cloud IoT [RSM-CIoTD]). The proposed RSM-CIoTD conspire guarantees secure communication between the user and cloud service provider (CSP) in a cloud based IoT. To manage unauthorized users, an RSM-CIoTD scheme utilizes a registered authority which plays out a two-degree confirmation between the network substances. The security and privacy appraisal techniques utilize minimum and maximum trust benefits of past communication. The experiments show that our proposed system can productively and safely store the cloud service while outperforming other security methods.
data sharing; internet of things; registered authority; rough set machine; security;
Publisher: Institute of Advanced Engineering and Science
Publish Date: 2023-04-01DOI: 10.11591/ijece.v13i2.pp%p
Publish Year: 2023