IOT-CENTRIC DATA PROTECTION USING DEEP LEARNING TECHNIQUE FOR PRESERVING SECURITY AND PRIVACY IN CLOUD
Journal Title: International Journal of Data Science and Artificial Intelligence - Year 2024, Vol 2, Issue 03
Abstract
The Internet of Things (IoT) describes a system where interconnected physical objects are connected online. As the collection and sharing of vast amounts of personal data grow, so do concerns over user privacy within IoT environments. While IoT devices offer significant advantages in terms of productivity, accuracy, and financial benefits by minimizing human intervention and providing exceptional flexibility and convenience, they also face challenges related to communication overhead, security, and privacy. To address these issues, a novel Internet of Things-based Cloud Information Security Preservation (IoT-CISP) has been proposed. This approach enhances the model’s effectiveness and ensures security by first separating sensitive data from nonsensitive data using an SVM classifier, and then employing this data for partial decryption and analysis. Sensitive data is protected through Okamoto-Uchiyama encryption, ensuring that data storage, analysis, and sharing are conducted securely to maintain the system’s safety and privacy. The effectiveness of this novel method was assessed against existing methodologies using parameters like precision, accuracy, F1 score, and recall, revealing its superior security and efficiency compared to other schemes. Results demonstrate that the IoTCISP approach offers encryption times that are 31.24%, 23.12%, and 33.03% shorter than those of the CP-ABE, GDBR, and HP-CPABE algorithms, respectively.
Authors and Affiliations
C. Senthil Singh, Sameena Naaz and G. Saranya
SELECTIVE FORWARDING ATTACKS DETECTION IN WIRELESS SENSOR NETWORKS USING BLUE MONKEY OPTIMIZED GHOST NETWORK
Wireless Sensor Networks (WSNs) are increasingly the technology of choice due to their wide applicability in both military and civilian domains. The selective forwarding attack, one of the main attacks in WSNs, is the ha...
BRAIN ANEURYSM CLASSIFICATION VIA WHALE OPTIMIZED DENSE NEURAL NETWORK
A brain aneurysm is caused by faulty blood vessel walls. When a brain aneurysm ruptures or leaks, it can cause bleeding in the brain. It is common for brain aneurysms to not burst but to damage the body and cause symptom...
SEMANTIC FEATURE ENABLED AGGLOMERATIVE CLUSTERING FOR INFORMATION TECHNOLOGY JOB PROFILE ANALYSIS
The maintenance and implementation of computer systems are the core activities of information technology. Database administration and network architecture are also included in information technology. Professionals have a...
REAL TIME REMOTE MONITORING VIA HORSE HEAD OPTIMIZATION DEEP LEARNING NETWORK
Over the past few decades, IoT has become indispensable in many industries. More people can now get healthcare and their general health can be improved thanks to recent developments in the healthcare sector. Predictive a...
DETECTION OF VIOLENCE IN FOOTBALL STADIUM THROUGH BIG DATA FRAMEWORK AND DEEP LEARNING APPROACH
Football is the most famous game in the world, with over 4 billion supporters worldwide. Football hooliganism refers to the aggressive or destructive actions of a supporter or player in a stadium while watching or partic...