Secure IoT data management and sharing architecture for information security using cryptographic technique.
Rajiv Kumar MishraRajesh Kumar YadavPrem NathPublished in: J. Intell. Fuzzy Syst. (2023)
Keyphrases
- information security
- smart card
- security issues
- data management
- security requirements
- security level
- sensitive data
- key management
- management system
- countermeasures
- user authentication
- data security
- security analysis
- security mechanisms
- cloud computing
- authentication protocol
- information security management
- information systems
- network security
- mobile computing
- security protocols
- information assurance
- security threats
- intrusion detection
- data protection
- cryptographic protocols
- database management systems
- e government
- cyber defense
- data sharing
- encryption key
- security management
- database systems
- smart grid
- data storage
- data analysis
- wireless sensor networks
- lightweight
- software architecture
- iso iec
- secret key
- multi tier
- security risks
- database
- privacy concerns
- hash functions