IOT-CENTRIC DATA PROTECTION USING DEEP LEARNING TECHNIQUE FOR PRESERVING SECURITY AND PRIVACY IN CLOUD
Journal Title: International Journal of Data Science and Artificial Intelligence - Year 2024, Vol 2, Issue 03
Abstract
The Internet of Things (IoT) describes a system where interconnected physical objects are connected online. As the collection and sharing of vast amounts of personal data grow, so do concerns over user privacy within IoT environments. While IoT devices offer significant advantages in terms of productivity, accuracy, and financial benefits by minimizing human intervention and providing exceptional flexibility and convenience, they also face challenges related to communication overhead, security, and privacy. To address these issues, a novel Internet of Things-based Cloud Information Security Preservation (IoT-CISP) has been proposed. This approach enhances the model’s effectiveness and ensures security by first separating sensitive data from nonsensitive data using an SVM classifier, and then employing this data for partial decryption and analysis. Sensitive data is protected through Okamoto-Uchiyama encryption, ensuring that data storage, analysis, and sharing are conducted securely to maintain the system’s safety and privacy. The effectiveness of this novel method was assessed against existing methodologies using parameters like precision, accuracy, F1 score, and recall, revealing its superior security and efficiency compared to other schemes. Results demonstrate that the IoTCISP approach offers encryption times that are 31.24%, 23.12%, and 33.03% shorter than those of the CP-ABE, GDBR, and HP-CPABE algorithms, respectively.
Authors and Affiliations
C. Senthil Singh, Sameena Naaz and G. Saranya
IOT-ENABLED PROTEIN STRUCTURE CLASSIFICATION VIA CSA-PSO BASED CD4.5 CLASSIFIER
Data mining is a technique for obtaining useful information from vast amounts of information. Big data refers to large amounts of complicated information that is processed, particularly in relation to biological processe...
JARROT BUTTERFLY OPTIMIZED FLAMINGO SEARCH ALGORITHM FOR OPTIMAL ROUTING IN WSN
Wireless sensor networks (WSN) are widely used nowadays, particularly for automated event tracking and monitoring. However, certain issues persist as a result of inadequate cluster formation and CH selection methods, suc...
SAFE-ACID: A NOVEL SECURITY ASSESSMENT FRAMEWORK FOR IOT INTRUSION DETECTION VIA DEEP LEARNING
Internet of Things (IoT) intrusion detection is crucial for ensuring the security of interconnected devices in our digital world. With diverse devices communicating in complex networks, IoT environments face vulnerabilit...
DEEP LEARNING BASED LSTM-GAN APPROACH FOR INTRUSION DETECTION IN CLOUD ENVIRONMENT
Cloud computing is a rapidly growing technology paradigm with enormous potential. While cloud computing has many advantages, it also poses new security risks. Cloud computing security vulnerabilities have been identified...
BLOCK CHAIN ENABLED DATA SECURITY USING BLOWFISH ALGORITHM IN SMART GRID NETWORK
Smart Grid provides a reliable and efficient end-toend delivery system. Data on each user's unique electricity consumption is given in real time. It also enables utilities to control and monitor the electrical system in...