Rough set method-cloud internet of things: a two-degree verification scheme for security in cloud-internet of things

6Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

The quick development of innovations and increasing use of the internet of things (IoT) in human life brings numerous challenges. It is because of the absence of adequate capacity resources and tremendous volumes of IoT information. This can be resolved by a cloud-based architecture. Consequently, a progression of challenging security and privacy concerns has emerged in the cloud based IoT context. In this paper, a novel approach to providing security in cloud based IoT environments is proposed. This approach mainly depends on the working of rough set rules for guaranteeing security during data sharing (rough set method-cloud IoT (RSM-CIoTD)). The proposed RSM-CIoTD conspire guarantees secure communication between the user and cloud service provider (CSP) in a cloud based IoT. To manage unauthorized users, an RSM-CIoTD scheme utilizes a registered authority which plays out a two-degree confirmation between the network substances. The security and privacy appraisal techniques utilize minimum and maximum trust benefits of past communication. The experiments show that our proposed system can productively and safely store the cloud service while outperforming other security methods.

Cite

CITATION STYLE

APA

Rukmony, S. M. J., & Gnanamony, S. (2023). Rough set method-cloud internet of things: a two-degree verification scheme for security in cloud-internet of things. International Journal of Electrical and Computer Engineering, 13(2), 2233–2239. https://doi.org/10.11591/ijece.v13i2.pp2233-2239

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free