Abstract
AbstractOnce the Internet of Things was proposed, it has received great attention from all walks of life and has become one of the top ten technologies that change the world. Therefore, more and more people are engaged in the research of the Internet of Things, after the unremitting efforts of all seniors. Now the Internet of Things has been applied to every aspect of our lives. However, in the application process of the Internet of Things, the protection of personal privacy will undoubtedly be involved. If this problem is not effectively resolved, it will become a major obstacle to the development of the Internet of Things. At present, the research of fully homomorphic technology has attracted great attention from the cryptography community. You can directly calculate the encrypted text encryption to obtain the output and decrypt the output. The result is the same as the output of the unencrypted plain text. This article first comprehensively describes the solution to the privacy protection problem in the existing Internet of Things, and then proposes to apply the fully homomorphic technology to the Internet of Things to make the services provided by the network more secure. Through the analysis of the basic composition and architecture of the existing Internet of Things system, a privacy protection interaction model for the Internet of Things is established, which uses a completely homomorphic technology. On this basis, the algorithm for implementing simple homomorphic encryption is improved, and general homomorphic encryption theory is proposed for some security issues. After using this method to encrypt privacy, the success rate of cracking dropped by 24%.
Publisher
Springer Science and Business Media LLC
Reference31 articles.
1. M.E. Khanouche, Y. Amirat, A. Chibani, et al., Energy-centered and QoS-aware services selection for Internet of Things. IEEE Transact Automat Eng 13(3), 1256–1269 (2016)
2. S. Mayer, J. Hodges, D. Yu, et al., An Open Semantic Framework for the Industrial Internet of Things. IEEE Intell Syst 32(1), 96–101 (2017)
3. H. Sun, X. Wang, R. Buyya, et al., CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices. Softw Pract Exp 47(3), 421–441 (2017)
4. S.H.A.H.R. Chandra, W.A.N.G. Yafeng, Cloud Things Construction - the integration of Internet of things and cloud computing. Future Generation Comput Syst 56(C), 684–700 (2016)
5. C. Chang, S.N. Srirama, R. Buyya, Mobile cloud business process management system for the internet of things: a survey. Acm Comput Surv 49(4), 1–42 (2016)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献