An Overview on Security Schemes Based on Elliptic Curve for Cloud-Iot

Journal Title: JOURNAL OF ADVANCES IN NATURAL SCIENCES - Year 2018, Vol 5, Issue 1

Abstract

The Internet of things appears as a solution in order to connect people around the world. With this concept of interconnection, sharing and dissemination of information between different physical objects. Many objects and services in different fields will be created, such as smart homes, e-health, transport and logistics that will make our everyday needs easier. The main characteristic of a connected object is that it must be identifiable, using technologies such as RFID (Radio-Frequency Identification), must interact with the environment by adding sensory techniques, and finally a connected object must be able to communicate with others. The evolution of Internet of things, increase the number of connected objects. Devices with sensors, generate a huge number of data. With this evolution, the big questions come! how can we control this big data? Cloud Computing a notion that is not newer than the IoT concept, but it's a revolution has steadily been gaining ground. It's a technology that offers to end users a great services in terms of storage, elasticity, analyzing data and other services . In this paper, we cite the benefits of integrating Cloud Computing and Internet of things to manage data provided by physical object and security difficulties that may have this convergence. We also present an overview of the security algorithms proposed in the literature, based on elliptic curves, in order to secure communication between smart objects and cloud computing.

Authors and Affiliations

Amrani Ayoub, Rafalia Najat, Jaafar Abouchabaka

Keywords

Related Articles

RESPONSE OF CERTAIN PHYTOCHEMICAL CONSTITUENTS IN SWEET PEPPER LEAVES TO SOME BIO-STIMULANTS UNDER TWO TYPES OF SALINITY

High salinity level of NaCl and CaCl2 (4000 mg/L) markedly increased whereas the low levels and its combination decreased electrolyte leakage percentage (E.L. %) in sweet pepper leaves as compared to the unstressed plant...

Lorentz transformations via Pauli matrices

We exhibit expressions, in terms of Pauli matrices, which directly generate Lorentz transformations in Minkowski space.

ESTIMATION OF SOME GENETIC PARAMETERS FOR EARLINESS AND SOME VEGETATIVE TRAITS IN SOME HULLESS BARLEY GENOTYPES UNDER NORMAL AND WATER STRESS CONDITIONS

This investigation was carried out at Sakha Agricultural Research Station, ARC, Egypt during the two growing seasons (2010/2011 and 2011/2012). Seven lines and three testers were used to develop barley hybrids for earlin...

Transient solution of /G/1 with Second Optional Service Subject to Reneging during Vacation and Breakdown time

In this paper, we present a batch arrival non- Markovian queuing model with second optional service. Batches arrive in Poisson stream with mean arrival rate ?, such that all customers demand the first essential service,...

ISOLATION OF CELLULAR FATTY ACID DISTRIBUTED IN UNKNOWN RHIZOBIAL STRAINS

Fatty acid (UFA) biosynthesis is essential for the maintenance of membrane structure and function in many groups of anaerobic bacteria. In this study isolation of cellular fatty acid distributed in unknown rhizobial stra...

Download PDF file
  • EP ID EP654924
  • DOI 10.24297/jns.v5i1.7861
  • Views 169
  • Downloads 0

How To Cite

Amrani Ayoub, Rafalia Najat, Jaafar Abouchabaka (2018). An Overview on Security Schemes Based on Elliptic Curve for Cloud-Iot. JOURNAL OF ADVANCES IN NATURAL SCIENCES, 5(1), 352-361. https://europub.co.uk/articles/-A-654924