Skip to main content
Top

2019 | OriginalPaper | Chapter

Research and Analysis on Comparison Scheme of IoT Encrypted Data in Cloud Computing Environment

Authors : Rong Xu, Fu-yong Bian

Published in: Advanced Hybrid Information Processing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Conventional cloud computing iot encrypted data comparative analysis method to simple encryption scheme comparison, the accuracy of the scheme comparison is not high, for more complex data encryption scheme comparison, comparative stability lower deficiencies, therefore put forward under the cloud computing environment, the Internet of things encrypted data comparison analysis research. Introducing the sliding window technology, build the Internet of things to encrypt data security evaluation mechanism, determine the iot encrypted data comparison analysis algorithm, constructing iot encrypted data comparison analysis model is presented. Run the analysis model, analyze the iot encrypted data comparison scheme, and implement the iot encrypted data comparison scheme analysis. The experimental data show that the proposed scheme is more routine than the conventional scheme analysis, and the stability of the method is maintained at 70%–90%, which is suitable for the comparison scheme analysis of the network encryption data with different difficulty coefficients. The proposed method for comparative analysis of IoT encrypted data is highly effective.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Meng, Q., Ma, J.F., Chen, K.F., et al.: IoT encrypted data comparison solution based on cloud computing platform. J. Commun. 1(4), 34–37 (2018) Meng, Q., Ma, J.F., Chen, K.F., et al.: IoT encrypted data comparison solution based on cloud computing platform. J. Commun. 1(4), 34–37 (2018)
2.
go back to reference Cheng, Z.Q., Lian, H.P.: Research on encryption simulation of IoT communication characteristic data information. Comput. Simul. 33(11), 324–327 (2016) Cheng, Z.Q., Lian, H.P.: Research on encryption simulation of IoT communication characteristic data information. Comput. Simul. 33(11), 324–327 (2016)
3.
go back to reference Cao, J.C.H., Li, C.: Study on IoT database storage system of maritime military mass data. Ship Sci. Technol. 33(12), 175–177 (2016) Cao, J.C.H., Li, C.: Study on IoT database storage system of maritime military mass data. Ship Sci. Technol. 33(12), 175–177 (2016)
4.
go back to reference Ma, X.X., Yu, G.: Publicly accountable ciphertext-policy attribute-based encryption scheme. Comput. Sci. 44(5), 160–165 (2017) Ma, X.X., Yu, G.: Publicly accountable ciphertext-policy attribute-based encryption scheme. Comput. Sci. 44(5), 160–165 (2017)
5.
go back to reference L, Y.: Realization of multi-card recognition in UHF radio frequency identification system in internet of things. Microelectron. Comput. 36(11), 104–107 (2017) L, Y.: Realization of multi-card recognition in UHF radio frequency identification system in internet of things. Microelectron. Comput. 36(11), 104–107 (2017)
6.
go back to reference Li, J.R., Li, X.Y., Gao, Y.L., et al.: Research on data forwarding model in internet of things. J. Softw. 22(1), 196–224 (2018) Li, J.R., Li, X.Y., Gao, Y.L., et al.: Research on data forwarding model in internet of things. J. Softw. 22(1), 196–224 (2018)
7.
go back to reference Qin, X.J.: Research on privacy protection encryption algorithms with smaller space in IoT environment. Bull. Sci. Technol. (2018) Qin, X.J.: Research on privacy protection encryption algorithms with smaller space in IoT environment. Bull. Sci. Technol. (2018)
8.
go back to reference Li, W., Ge, C.H.Y., Gu, D.W., et al.: Research on statistical fault analysis of LED lightweight password algorithm in internet of things environment. J. Comput. Res. Dev. 54(10), 2205–2214 (2017) Li, W., Ge, C.H.Y., Gu, D.W., et al.: Research on statistical fault analysis of LED lightweight password algorithm in internet of things environment. J. Comput. Res. Dev. 54(10), 2205–2214 (2017)
9.
go back to reference Xu, J.G., Zhang, J.: IoT data parallel transmission path prediction simulation. Comput. Simul. 32(1), 172–175 (2018) Xu, J.G., Zhang, J.: IoT data parallel transmission path prediction simulation. Comput. Simul. 32(1), 172–175 (2018)
10.
go back to reference Gu, W.J.: Research on data scheduling of shared resources in internet of things. Comput. Simul. 34(1), 268–271 (2017) Gu, W.J.: Research on data scheduling of shared resources in internet of things. Comput. Simul. 34(1), 268–271 (2017)
Metadata
Title
Research and Analysis on Comparison Scheme of IoT Encrypted Data in Cloud Computing Environment
Authors
Rong Xu
Fu-yong Bian
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-19086-6_22

Premium Partner