Secure Data Transfer in IoT environment: adopting both Cryptography and Steganography techniques

被引:0
|
作者
Das, Ria [1 ]
Das, Indrajit [2 ]
机构
[1] Jadavpur Univ, Sch Mobile Comp & Commun, Kolkata, India
[2] Meghnad Saha Inst Technol, Informat Technol Dept, Kolkata, India
来源
2016 SECOND IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN) | 2016年
关键词
Internet of Things (IoT); Encryption Cryptography; Steganography; Most Significant Bit (MSB); Least Significant Bit (LSB); Substitution technique;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Owing to the unprecedented growth in computing power, electronics miniaturization and mobile and wireless network interconnections the internet has metamorphosed into Internet of Things (IoT) which refers to next stage of the information revolution whose context involves billions of individuals and devices interconnected to facilitate exchange of huge volume of data and information from diverse locations, demanding the consequent necessity for smart data aggregation followed by an increased obligation to index, hoard and process data with higher efficiency and effectiveness. But along with its myriad offered benefits and applications, emerges a novel complexity aspect in terms of many inherent hassles primarily security concerns during data transfer phases in IoT covering mostly data confidentiality and integrity features. Thus to enhance safe data transfer in smart IoT environment, a security scheme is proposed in this paper which addresses both the aforesaid issues, employing an integrated approach of lightweight cryptography and steganography (Simple LSB Substitution) technique during data transfer between IoT device and Home Server and adoption of combined approach of cryptography and steganography (Proposed MSB-LSB Substitution) technique during data transfer phases between Home Server and Cloud Servers.
引用
收藏
页码:296 / 301
页数:6
相关论文
共 50 条
  • [41] PSO-based steganography scheme using DWT-SVD and cryptography techniques for cloud data confidentiality and integrity
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    Journal of Computers (Taiwan), 2019, 30 (06) : 31 - 45
  • [42] Secure Sharing of IOT Data in Cloud Environment Using Attribute-Based Encryption
    Kanimozhi, P.
    Victoire, T. Aruldoss Albert
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (06)
  • [43] SBBS: A Secure Blockchain-Based Scheme for IoT Data Credibility in Fog Environment
    Fan, Yongkai
    Zhao, Guanqun
    Lei, Xia
    Liang, Wei
    Li, Kuan-Ching
    Choo, Kim-Kwang Raymond
    Zhu, Chunsheng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (11) : 9268 - 9277
  • [44] Novel Approach for Secure Cover File of Hidden Data in the Unused Area within EXE File Using Computation between Cryptography and Steganography
    Naji, A. W.
    Zaidan, A. A.
    Zaidan, B. B.
    Hameed, Shihab A.
    Khalifa, Othman O.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (05): : 294 - 300
  • [45] BlockDLO: Blockchain Computing With Deep Learning Orchestration for Secure Data Communication in IoT Environment
    Kokila, M.
    Reddy, K. Srinivasa
    IEEE ACCESS, 2024, 12 : 134521 - 134540
  • [46] Secure data access using blockchain technology through IoT cloud and fabric environment
    Gupta, Sangeeta
    Chithaluru, Premkumar
    El Barachi, May
    Kumar, Manoj
    SECURITY AND PRIVACY, 2024, 7 (02)
  • [47] A Cryptography and Machine Learning Based Authentication for Secure Data-Sharing in Federated Cloud Services Environment
    Singh, Ashutosh Kumar
    Saxena, Deepika
    JOURNAL OF APPLIED SECURITY RESEARCH, 2022, 17 (03) : 385 - 412
  • [48] A Comprehensive Literature Review of Data Encryption Techniques in Cloud Computing and IoT Environment
    Mehmood, Muhammad Sheraz
    Shahid, Muhammad Rehman
    Jamil, Abid
    Ashraf, Rehan
    Mahmood, Toqeer
    Mehmood, Aatif
    2019 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT 2019), 2019, : 54 - 59
  • [49] Towards Blockchain-Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment
    Ullah, Zia
    Raza, Basit
    Shah, Habib
    Khan, Shahzad
    Waheed, Abdul
    IEEE ACCESS, 2022, 10 : 36978 - 36994
  • [50] SURETY-Fog: Secure Data Query and Storage Processing in Fog Driven IoT Environment
    Sharma, Pratibha
    Saini, Hemraj
    Kalia, Arvind
    Sustainable Computing: Informatics and Systems, 2025, 46