Visible to the public Study of security algorithms to secure IOT data in middleware

TitleStudy of security algorithms to secure IOT data in middleware
Publication TypeConference Paper
Year of Publication2018
AuthorsPallavi, K.N., Kumar V., Ravi, Kulal, Pooja
Conference Name2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)
Keywordscloud, cloud computing, Cloud System, composability, data privacy, fog, Internet of Things, IoT, IoT data, middleware, middleware security, policy-based governance, privacy, pubcrawl, resilience, Resiliency, security algorithms, security of data
AbstractIn the present generation internet plays a major role. The data being sent by the user is created by the things like pc, mobiles, sensors etc. and these data are sent to the cloud system. When a data from the IOT devices are sent to the cloud, there is a question of privacy and security. To provide security for the data well-known security algorithms are used in fog layer and are successful in transferring the data without any damage. Here different techniques used for providing security for IOT data are discussed.
DOI10.1109/ICGCIoT.2018.8753024
Citation Keypallavi_study_2018