GIVE-AND-TAKE KEY PROCESSING for Cloud- linked IoT

Main Article Content

Dr. M. Sughasiny

Abstract

Internet of Things (IoT) is estimated there are over a billion internet users and rapidly increasing. But there are more things on the internet than there are people on the internet. This is what it has been generally mean, when it has been say internet of things. There are millions and millions of devices with sensors that are linked up together using networks that generate a sea of data. The problem is all data needs to remain secured, unchanged, and persisted at each stage of an IoT solution. This includes distributed components, communication infrastructure, back-end analytics and database servers, across potentially remote locations and adverse environments. In any case, it is helpless against eavesdropping which represents a risk to privacy and security of the client. The security of data traffic winds up plainly vital since the communications over open network happen frequently. It is along these lines basic that the data traffic over the system is encrypted. To give the QoS, the Cloud- linked IoT security is the essential part of the service providers. This paper is concentrating on issue identifying with the Cloud- linked IoT security in virtual condition. It has been propose a technique GIVE-AND-TAKE KEY PROCESSING for giving data process and security in Cloud- linked IoT using Elliptical Curve Cryptography ECC and Hash Map. Encourage, depicts the security services incorporates generation of key, encryption and decryption in virtual condition.

Article Details

How to Cite
, D. M. S. (2017). GIVE-AND-TAKE KEY PROCESSING for Cloud- linked IoT. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 3(1), 04–08. Retrieved from http://www.ijfrcsce.org/index.php/ijfrcsce/article/view/80
Section
Articles