Loading

A New Scheme to Safeguard Data for Cloud Integrated Internet Things
Bingu Rajesh1, Puvvada Nagesh2, Koppada Gowtham3, Gorantla Vivek4, N.Srinivasu5

1Bingu Rajesh, Department of Computer Science Engineering, KL University,  Vaddeswaram, Guntur (Andhra Pradesh), India.
2Puvvada Nagesh, Department of Computer Science Engineering, KL University, Vaddeswaram, Guntur (Andhra Pradesh), India.
3K.Gowtham, Department of Computer Science Engineering, KL University, Vaddeswaram, Guntur (Andhra Pradesh), India.
4G.Vivek, Department of Computer Science Engineering, KL University, Vaddeswaram, Guntur (Andhra Pradesh), India.
5N.Srinivasu, Department of Computer Science Engineering, KL University, Vaddeswaram, Guntur (Andhra Pradesh), India.
Manuscript received on 05 February 2019 | Revised Manuscript received on 13 February 2019 | Manuscript published on 28 February 2019 | PP: 174-178 | Volume-8 Issue-4, February 2019 | Retrieval Number: D2679028419/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In our day-to-day life people use many electronic gadgets to control things around, which in turn those things communicate with other things around and get the requested work done, this is Internet of Things. As there would be enormous amount of data generated by Internet of Things why not we store it in cloud? Here, in this paper, we discuss how to secure data for cloud integrated Internet of Things. In two main steps we can ensure the data cannot be tampered. First, the CP-ABE (Cipher text Policy – Attribute Based Encryption) produces a secret key and encrypts the data. The data can only be decrypted when the secret key is correctly produced. The second way uses threshold cryptography where secret key is further encrypted by RSA and then generated key is divided internally and giving to a group of users. Shared key can be produced only if all the authorized users come together. Above proposed scheme not only provides confidentiality but also helps in reducing number of keys and prevents unauthorized/malicious users to access our data.
Keyword: CP-ABE (Cipher Text Policy – Attribute Based Encryption), Threshold cryptography, Confidentiality, Malicious Users.
Scope of the Article: Internet of Things