Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 6/2020

30.01.2020

RETRACTED ARTICLE: Defense model for preserving the wind turbine Records in Cloud Using fog Computing with coupling based cryptography

verfasst von: A. Agasthian, Rajendra Pamula, L. A. Kumaraswamidhas

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 6/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract2

Security of information put away and handled on the open cloud is a noteworthy concern. In this paper we contend that hybrid cloud gives a perfect situation to applications that require the participation of different associations, every association needs to facilitate a few parts of its movement and offer a few information with a few different associations yet has severe security prerequisites for its very own private information. Such applications could profit by a hybrid cloud condition. In a perfect world, “big data” ought to be scrambled and put away on the open cloud. In this the data from the windmill, wind pump or wind charger are to be stored in cloud, that data must be secured in the cloud by means of a fog computing capability. Towards termination, a third party one round verified key understanding convention had been projected in view of the bilinear blending cryptography that may produce a session key among the members and impart among them safely. At last, the secluded wind turbine information’s were gotten to, put away safely via executing a lure procedure. In this computational cost is low and key size is reduced when compared to all other existing systems. The proposed system reduces the computational cost at 97% compared with the other existing systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Manar Jaradat, Moath Jarrah, Abdelkader Bousselham, Yaser Jararweh, Mahmoud Al-Ayyoub (2015) The Internet of Energy: Smart Sensor Networks and Big Data Management for Smart Grid. The International Workshop on Networking Algorithms and Technologies for IoT (NAT-IoT 2015) 56:592–597 Manar Jaradat, Moath Jarrah, Abdelkader Bousselham, Yaser Jararweh, Mahmoud Al-Ayyoub (2015) The Internet of Energy: Smart Sensor Networks and Big Data Management for Smart Grid. The International Workshop on Networking Algorithms and Technologies for IoT (NAT-IoT 2015) 56:592–597
2.
Zurück zum Zitat Qian P, Zhang D, Tian X, Yulin S, Li L (2019) A novel wind turbine condition monitoring method based on cloud computing. Renew Energy 135:390–398CrossRef Qian P, Zhang D, Tian X, Yulin S, Li L (2019) A novel wind turbine condition monitoring method based on cloud computing. Renew Energy 135:390–398CrossRef
3.
Zurück zum Zitat Xu LD, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans IndInform 10:2233–2243 Xu LD, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans IndInform 10:2233–2243
4.
Zurück zum Zitat Shanzhi C, Hui X, Dake L, Bo H, Hucheng W (2014) A vision of IoT: applications,challenges, and opportunities with China perspective. IEEE Internet of Thing J 1:349–359CrossRef Shanzhi C, Hui X, Dake L, Bo H, Hucheng W (2014) A vision of IoT: applications,challenges, and opportunities with China perspective. IEEE Internet of Thing J 1:349–359CrossRef
5.
Zurück zum Zitat Shifeng F, Da Li X, Yunqiang Z, Jiaerheng A, Huan P, Jianwu Y et al (2014) An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans Ind Inform 10:1596–1605CrossRef Shifeng F, Da Li X, Yunqiang Z, Jiaerheng A, Huan P, Jianwu Y et al (2014) An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans Ind Inform 10:1596–1605CrossRef
6.
Zurück zum Zitat Zhang Y, Xiang Y, Wang L (2017) Power system reliability assessment incorporating cyber-attacks against wind farm energy management systems. IEE Trans Smart Grid 8:2343–2357CrossRef Zhang Y, Xiang Y, Wang L (2017) Power system reliability assessment incorporating cyber-attacks against wind farm energy management systems. IEE Trans Smart Grid 8:2343–2357CrossRef
7.
Zurück zum Zitat Akyol BA (2012) Cyber security challenges in using cloud computing in the electric utility industry. Pacific Northwest, WashingtonCrossRef Akyol BA (2012) Cyber security challenges in using cloud computing in the electric utility industry. Pacific Northwest, WashingtonCrossRef
9.
Zurück zum Zitat Fernando N, Loke SW, Avazpour I, Chen F, Abkenar AB, Ibrahim A (2019) Opportunistic fog for IoT: challenges and opportunities. IEEE Internet Things J Fernando N, Loke SW, Avazpour I, Chen F, Abkenar AB, Ibrahim A (2019) Opportunistic fog for IoT: challenges and opportunities. IEEE Internet Things J
10.
Zurück zum Zitat Noura H, Salman O, Chehab A, Couturier R (2019) Preserving Data Security in Distributed Fog Computing Ad Hoc Networks:2019 Noura H, Salman O, Chehab A, Couturier R (2019) Preserving Data Security in Distributed Fog Computing Ad Hoc Networks:2019
11.
Zurück zum Zitat Mizanur Rahman SKM, Elkhatib K (2010) Private Key agreement and secure comunication for heterogeneous sensor networks. Journal of Parallel and Distributed Computing:858–870 Mizanur Rahman SKM, Elkhatib K (2010) Private Key agreement and secure comunication for heterogeneous sensor networks. Journal of Parallel and Distributed Computing:858–870
12.
Zurück zum Zitat Chen Y, Martínez J-F, Castillejo P, López L (2019) A bilinear map pairing based authentication scheme for smart grid communications: PAuth. Digital Object Identifier 7:22633–22643 Chen Y, Martínez J-F, Castillejo P, López L (2019) A bilinear map pairing based authentication scheme for smart grid communications: PAuth. Digital Object Identifier 7:22633–22643
13.
Zurück zum Zitat Menezes A (2009) An introduction to pairing-based cryptography. In Recent Trends in Cryptography, American Mathematical Society, pp. 47–65 Menezes A (2009) An introduction to pairing-based cryptography. In Recent Trends in Cryptography, American Mathematical Society, pp. 47–65
14.
Zurück zum Zitat Moody D, Perlner R, Regenscheid A, Roginsky A, Chen L (2015) Report on pairing-based cryptography. Journal of Research of the National Institute of Standards and Technology 120:11–27CrossRef Moody D, Perlner R, Regenscheid A, Roginsky A, Chen L (2015) Report on pairing-based cryptography. Journal of Research of the National Institute of Standards and Technology 120:11–27CrossRef
15.
Zurück zum Zitat Jansen WA (2011) Cloud Hooks: Security and Privacy Issues in Cloud Computing. HAWAII International Conference on System Sciences, Koloa Jansen WA (2011) Cloud Hooks: Security and Privacy Issues in Cloud Computing. HAWAII International Conference on System Sciences, Koloa
16.
Zurück zum Zitat Sarode RP and Bhalla S (2019) Data Security in Mobile Cloud Computing, International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), pp. 26–28, Sarode RP and Bhalla S (2019) Data Security in Mobile Cloud Computing, International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), pp. 26–28,
17.
Zurück zum Zitat Voris J, Jill J (2013) Angelos Keromytis, and Salvatore Stolfo. Bait and Snitch: Defending Computer Systems with Decoys. Columbia University Academic Commons Voris J, Jill J (2013) Angelos Keromytis, and Salvatore Stolfo. Bait and Snitch: Defending Computer Systems with Decoys. Columbia University Academic Commons
18.
Zurück zum Zitat Stolfo Salvator J, Salem MB, Kero DA (2012) Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. In IEEE CS Security and Privacy Workshops Stolfo Salvator J, Salem MB, Kero DA (2012) Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. In IEEE CS Security and Privacy Workshops
19.
Zurück zum Zitat M. Sriram, V. Patel, D. Harishma, and N Lakshmanan. A Hybrid Protocol to Secure the Cloud from Insider Threats. In Cloud Computing in Emerging Markets (CCEM), IEEE International Conference, Bangalore,2014 M. Sriram, V. Patel, D. Harishma, and N Lakshmanan. A Hybrid Protocol to Secure the Cloud from Insider Threats. In Cloud Computing in Emerging Markets (CCEM), IEEE International Conference, Bangalore,2014
20.
Zurück zum Zitat Vinod AR, Sunidatta BS, Rani KU, Sasidharan PP (2014) Hindering data theft attacks through fog computing. International Journal of Research in Engineering and Technology 3:427–429CrossRef Vinod AR, Sunidatta BS, Rani KU, Sasidharan PP (2014) Hindering data theft attacks through fog computing. International Journal of Research in Engineering and Technology 3:427–429CrossRef
21.
Zurück zum Zitat Liu W (2012) Research on cloud computing security problem and strategy. IEEE Conference, YichangCrossRef Liu W (2012) Research on cloud computing security problem and strategy. IEEE Conference, YichangCrossRef
22.
Zurück zum Zitat Cufoglu A (2014) User profiling- a short review. Int J Comput Appl 108:1–9 Cufoglu A (2014) User profiling- a short review. Int J Comput Appl 108:1–9
23.
Zurück zum Zitat Nguyen HB (2014) An Overview of the NTRU Cryptographic System, M.S. thesis, Department Mathematics and Statistics, Univ. San Diego State Nguyen HB (2014) An Overview of the NTRU Cryptographic System, M.S. thesis, Department Mathematics and Statistics, Univ. San Diego State
24.
Zurück zum Zitat Gohel H (2015) Design and Development of Combined Algorithm Computing Technique to Enhance Web Security. International Journal of Innovative and Emerging Research in Engineering 2(1):7679 Gohel H (2015) Design and Development of Combined Algorithm Computing Technique to Enhance Web Security. International Journal of Innovative and Emerging Research in Engineering 2(1):7679
25.
Zurück zum Zitat Jansma N, Arrendondo B (2004) Performance comparison of elliptic curve and RSA digital signatures. nicj.net/files Jansma N, Arrendondo B (2004) Performance comparison of elliptic curve and RSA digital signatures. nicj.net/files
26.
Zurück zum Zitat Wen-jun Cui, Zhi-juan Jia, Ming-sheng Hu, Bei-Gong, Li-Peng Wang, “A new Signcryption scheme based on elliptic curves”, International conference on Security and Privacy in New Computing Environments, pp. 538–544, 2019 Wen-jun Cui, Zhi-juan Jia, Ming-sheng Hu, Bei-Gong, Li-Peng Wang, “A new Signcryption scheme based on elliptic curves”, International conference on Security and Privacy in New Computing Environments, pp. 538–544, 2019
Metadaten
Titel
RETRACTED ARTICLE: Defense model for preserving the wind turbine Records in Cloud Using fog Computing with coupling based cryptography
verfasst von
A. Agasthian
Rajendra Pamula
L. A. Kumaraswamidhas
Publikationsdatum
30.01.2020
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 6/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00819-y

Weitere Artikel der Ausgabe 6/2020

Peer-to-Peer Networking and Applications 6/2020 Zur Ausgabe