Skip to main content

2020 | OriginalPaper | Buchkapitel

Cryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart City

verfasst von : Segundo Moisés Toapanta Toapanta, Félix Gustavo Mendoza Quimi, Rubén Franklin Reina Salazar, Luis Enrique Mafla Gallegos

Erschienen in: Fourth International Congress on Information and Communication Technology

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

It was analyzed the information of databases, encryption algorithms, and information security that are the main components of a Smart City. The problem is the lack of security of public or secret data that is stored in a repository, where there is access to the citizen, local government, and central government. The objective is to define a security prototype and adopt a cryptographic algorithm to mitigate the risks of the database in the management of a Smart City. It was used the deductive method and exploratory research to analyze the information of the reference articles. It turned out a general prototype of security; an algorithm to implement a database for Smart City; an algorithm of data protection expressed in flowcharts. It was concluded that information protected with an encryption algorithm, is a support to be more efficient, reduce costs, reduce the environmental footprint and improve the management of a Smart City.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
3.
Zurück zum Zitat Zhu, X., Li, J., Liu, Z., Yang, F.: A joint grid segmentation based affinity propagation clustering method for big data. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 144–151 (2016). https://doi.org/10.1109/hpcc-smartcity-dss.2016.0172 Zhu, X., Li, J., Liu, Z., Yang, F.: A joint grid segmentation based affinity propagation clustering method for big data. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 144–151 (2016). https://​doi.​org/​10.​1109/​hpcc-smartcity-dss.​2016.​0172
4.
Zurück zum Zitat Jasim, K., Al-Shaikhli, I.: Mobile technology generations and cryptographic algorithms: analysis study. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT), pp. 50–55 (2015). https://doi.org/10.1109/acsat.2015.26 Jasim, K., Al-Shaikhli, I.: Mobile technology generations and cryptographic algorithms: analysis study. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT), pp. 50–55 (2015). https://​doi.​org/​10.​1109/​acsat.​2015.​26
5.
Zurück zum Zitat Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), p. 1 (2016). Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science Systems; HPCC/SmartCity/DSS 2016, pp. 1392–1393 (2017). https://doi.org/10.1109/hpcc-smartcity-dss.2016.0198; https://doi.org/10.1109/hpcc-smartcity-dss.2016.0198 Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), p. 1 (2016). Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science Systems; HPCC/SmartCity/DSS 2016, pp. 1392–1393 (2017). https://​doi.​org/​10.​1109/​hpcc-smartcity-dss.​2016.​0198; https://​doi.​org/​10.​1109/​hpcc-smartcity-dss.​2016.​0198
7.
8.
13.
Zurück zum Zitat Chaudhury, P., Dhang, S., Roy, M., et al.: ACAFP: asymmetric key based cryptographic algorithm using four prime numbers to secure message communication. A review on RSA algorithm. In: 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), pp. 332–337 (2017). https://doi.org/10.1109/ie-mecon.2017.8079618 Chaudhury, P., Dhang, S., Roy, M., et al.: ACAFP: asymmetric key based cryptographic algorithm using four prime numbers to secure message communication. A review on RSA algorithm. In: 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), pp. 332–337 (2017). https://​doi.​org/​10.​1109/​ie-mecon.​2017.​8079618
14.
Zurück zum Zitat Murali, G., Sivaram Prasad, R.: Comparison of cryptographic algorithms in cloud and local environment using quantum cryptography. In: International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017) Comparison, pp. 55–69 (2017). https://doi.org/10.1109/icecds.2017.8390165 Murali, G., Sivaram Prasad, R.: Comparison of cryptographic algorithms in cloud and local environment using quantum cryptography. In: International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017) Comparison, pp. 55–69 (2017). https://​doi.​org/​10.​1109/​icecds.​2017.​8390165
18.
Zurück zum Zitat IESE Cities in Motion Índice 2014. IESE Business School, Centro de Globalización y Estrategia, Barcelona, España (2014) IESE Cities in Motion Índice 2014. IESE Business School, Centro de Globalización y Estrategia, Barcelona, España (2014)
19.
Zurück zum Zitat IESE Cities in Motion Index: Barcelona. Center for Globalization and Strategy, España (2015) IESE Cities in Motion Index: Barcelona. Center for Globalization and Strategy, España (2015)
23.
Zurück zum Zitat Barnett, T.: Cisco Global Cloud Index 2015–2020, p. 45. Cisco (2016) Barnett, T.: Cisco Global Cloud Index 2015–2020, p. 45. Cisco (2016)
Metadaten
Titel
Cryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart City
verfasst von
Segundo Moisés Toapanta Toapanta
Félix Gustavo Mendoza Quimi
Rubén Franklin Reina Salazar
Luis Enrique Mafla Gallegos
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-32-9343-4_36

Neuer Inhalt