Encryption as a Service for IoT: Opportunities, Challenges and Solutions

A Javadpour, F Ja'fari, T Taleb, Y Zhao… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The widespread adoption of Internet of Things (IoT) technology has introduced new
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …

Performance analysis of two cloud-based iot implementations: Empirical study

M Aleisa, AA Hussein, F Alsubaei… - 2020 7th IEEE …, 2020 - ieeexplore.ieee.org
The emergence of the Internet of things (IoT) has generated demand for computation
performed at the 'edge'of the network. With companies being increasingly challenged to …

Low-cost client-side encryption and secure Internet of things (IoT) provisioning

J Mamvong, G Goteng, Y Gao - Frontiers of Computer Science, 2022 - Springer
Conclusion Security and ease of provisioning of IoT devices onto cloud infrastructure is
instrumental to the deployment of IoT devices. With not much information available on the …

[HTML][HTML] Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives

MR Alagheband, A Mashatan - The Journal of Supercomputing, 2022 - Springer
Abstract The Internet of Things (IoT) is increasingly becoming widespread in different areas
such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse …

CEaaS: Constrained encryption as a service in fog-enabled IoT

PK Deb, A Mukherjee, S Misra - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
In this work, we present a solution toward facilitating dynamic encryption schemes—
Constrained Encryption as a Service (CEaaS)—in fog-enabled IoT environments. CEaaS is …

Securing Cloud-Based Internet of Things: Challenges and Mitigations

N Singh, R Buyya, H Kim - arXiv preprint arXiv:2402.00356, 2024 - arxiv.org
The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a
paradigm shift in the digital landscape. However, these technological strides have also …

Twenty security considerations for cloud-supported Internet of Things

J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …

Fortifying the IoT Landscape: Strategies to Counter Security Risks in Connected Systems

E James, F Rabbi - Tensorgate Journal of Sustainable …, 2023 - research.tensorgate.org
The proliferation of Internet of Things (IoT) devices in our connected world has brought
unparalleled convenience and efficiency to various sectors, ranging from smart homes to …

Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …

A Review on IoT Security: Challenges and Solution using Lightweight Cryptography and Security Service Mechanisms Offloading at Fog

VH Patel, S Patel - 2020 - papers.ssrn.com
With the fast development of IoTs, the usage of varied smart applications like smart home,,
smart traffic, smart healthcare, smart cities are increased exponentially. Data in large volume …