Cited 15 time in
Secure Cloud Storage Service Using Bloom Filters for the Internet of Things
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Jeong, Junho | - |
| dc.contributor.author | Joo, Jong Wha J. | - |
| dc.contributor.author | Lee, Yangsun | - |
| dc.contributor.author | Son, Yunsik | - |
| dc.date.accessioned | 2023-04-28T05:42:35Z | - |
| dc.date.available | 2023-04-28T05:42:35Z | - |
| dc.date.issued | 2019 | - |
| dc.identifier.issn | 2169-3536 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/8637 | - |
| dc.description.abstract | Today, the Internet of Things (IoT) is used for convenience in everyday life in many areas. Owing to the fact that the data collected from the IoT are generated in large quantities, cloud computing is inevitably used to store and analyze the data. However, cloud storage is not owned by the user, so it is unreliable. Verifying the integrity of data collected in an IoT environment and stored in a cloud has two problems: a large amount of data needs to be verified, and the data verification should be done directly on the IoT device. Many methods for data integrity verification use trusted third parties and devices that provide sufficient resources. However, it is difficult to directly apply existing research to the IoT devices that have limited resources. This paper proposes a secure cloud storage service for an IoT environment that is based on a provable data possession model and uses Bloom filters. The experimental results showed that the proposed method saves time and has no significant differences in the verification rate with existing methods, even though the Bloom filter causes false positives. Therefore, the proposed service can effectively process a large amount of data generated in an IoT environment. | - |
| dc.format.extent | 11 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
| dc.title | Secure Cloud Storage Service Using Bloom Filters for the Internet of Things | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/ACCESS.2019.2915576 | - |
| dc.identifier.scopusid | 2-s2.0-85066126274 | - |
| dc.identifier.wosid | 000468811800001 | - |
| dc.identifier.bibliographicCitation | IEEE ACCESS, v.7, pp 60897 - 60907 | - |
| dc.citation.title | IEEE ACCESS | - |
| dc.citation.volume | 7 | - |
| dc.citation.startPage | 60897 | - |
| dc.citation.endPage | 60907 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordPlus | IOT | - |
| dc.subject.keywordAuthor | Access control | - |
| dc.subject.keywordAuthor | computer security | - |
| dc.subject.keywordAuthor | cryptography | - |
| dc.subject.keywordAuthor | data security | - |
| dc.subject.keywordAuthor | data storage systems | - |
| dc.subject.keywordAuthor | distributed computing | - |
| dc.subject.keywordAuthor | Internet of Things | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
