Openly accessible

A survey on cryptographic security and information hiding technology for cloud or fog-based IoT system

Bai, Liang, Liu, Yuzhen, Wang, Xiaoliang, Patterson, Nick and Jiang, F. 2019, A survey on cryptographic security and information hiding technology for cloud or fog-based IoT system, Journal of information hiding and privacy protection, vol. 1, no. 1, pp. 1-10, doi: 10.32604/jihpp.2019.06043.

Attached Files
Name Description MIMEType Size Downloads

Title A survey on cryptographic security and information hiding technology for cloud or fog-based IoT system
Author(s) Bai, Liang
Liu, Yuzhen
Wang, Xiaoliang
Patterson, NickORCID iD for Patterson, Nick orcid.org/0000-0003-4565-3614
Jiang, F.
Journal name Journal of information hiding and privacy protection
Volume number 1
Issue number 1
Start page 1
End page 10
Total pages 10
Publisher Tech Science Press
Place of publication Duluth, Ga.
Publication date 2019
ISSN 2637-4226
Keyword(s) Internet of things
security
privacy protection
trust
Cloud
Fog
Summary Internet of Things (IoT) is an emerging paradigm involving intelligent sensor networks that incorporates embedded technology for collecting data, communicating with external environments. Recently, cloud computing together with fog computing has become an important research area of the Internet of Things because of big data processing capabilities. It is a promising technology that utilizes cloud or fog computing / architecture to improve sensor computing, storage, and communication capabilities. However, recently it has been shown that this computing/architecture may be vulnerable to various attacks because of the openness nature of the wireless network. Therefore, it becomes more and more important to ensure the security and privacy in these scenes. Encryption security and information hiding technology can provide authentication, confidentiality, integrity, anti-eavesdropping, availability and so on for these computing models or architectures. The purpose of this review is to look for original articles with novel ideas and solutions to address encryption security and information hiding technologies in cloud or fog-based Internet of Things systems. We hope this review will provide an opportunity for scientists, researchers and industry engineers to study original manuscripts and know developments in all aspects of security, privacy, trust, and covert communication issues in cloud or fog computing/architecture Internet of Things systems.
Language eng
DOI 10.32604/jihpp.2019.06043
Indigenous content off
HERDC Research category C1 Refereed article in a scholarly journal
Copyright notice ©2019, Tech Science Press
Free to Read? Yes
Persistent URL http://hdl.handle.net/10536/DRO/DU:30130786

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 20 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Mon, 21 Oct 2019, 12:33:59 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.