Title | Internet of Things enabled Block Level Security Mechanism to Big Data Environment using Cipher Security Policies |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Lavanya, P., Subbareddy, I.V., Selvakumar, V. |
Conference Name | 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) |
Keywords | Big Data, BIGDATA, Block Level Security, blockchain, critical infrastructure, Fog Processing, human factors, Internet of Things, IoT, Metrics, Network security, Organizations, privacy, pubcrawl, Resiliency, Scalability, security policies, Standards organizations, Taxonomy |
Abstract | The proliferation of linked devices in decisive infrastructure fields including health care and the electric grid is transforming public perceptions of critical infrastructure. As the world grows more mobile and connected, as well as as the Internet of Things (IoT) expands, the growing interconnectivity of new critical sectors is being fuelled. Interruptions in any of these areas can have ramifications across numerous sectors and potentially the world. Crucial industries are critical to contemporary civilization. In today's hyper-connected world, critical infrastructure is more vulnerable than ever to cyber assaults, whether they are state-sponsored, carried out by criminal organizations, or carried out by individuals. In a world where more and more gadgets are interconnected, hackers have more and more entry points via which they may damage critical infrastructure. Significant modifications to an organization's main technological systems have created a new threat surface. The study's goal is to raise awareness about the challenges of protecting digital infrastructure in the future while it is still in development. Fog architecture is designed based on functionality once the infrastructure that creates large data has been established. There's also an in-depth look of fog-enabled IoT network security requirements. The next section examines the security issues connected with fog computing, as well as the privacy and trust issues raised by fog-enabled Internet of Things (IoT). Block chain is also examined to see how it may help address IoT security problems, as well as the complimentary interrelationships between block-chain and fog computing. Additionally, Formalizes big data security goal and scope, develops taxonomy for identifying risks to fog-based Internet of Things systems, compares current development contributions to security service standards, and proposes interesting study areas for future studies, all within this framework |
DOI | 10.1109/ACCAI53970.2022.9752603 |
Citation Key | lavanya_internet_2022 |