Detailed Information

Cited 12 time in webofscience Cited 15 time in scopus
Metadata Downloads

Secure Cloud Storage Service Using Bloom Filters for the Internet of Things

Full metadata record
DC Field Value Language
dc.contributor.authorJeong, Junho-
dc.contributor.authorJoo, Jong Wha J.-
dc.contributor.authorLee, Yangsun-
dc.contributor.authorSon, Yunsik-
dc.date.accessioned2023-04-28T05:42:35Z-
dc.date.available2023-04-28T05:42:35Z-
dc.date.issued2019-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/8637-
dc.description.abstractToday, the Internet of Things (IoT) is used for convenience in everyday life in many areas. Owing to the fact that the data collected from the IoT are generated in large quantities, cloud computing is inevitably used to store and analyze the data. However, cloud storage is not owned by the user, so it is unreliable. Verifying the integrity of data collected in an IoT environment and stored in a cloud has two problems: a large amount of data needs to be verified, and the data verification should be done directly on the IoT device. Many methods for data integrity verification use trusted third parties and devices that provide sufficient resources. However, it is difficult to directly apply existing research to the IoT devices that have limited resources. This paper proposes a secure cloud storage service for an IoT environment that is based on a provable data possession model and uses Bloom filters. The experimental results showed that the proposed method saves time and has no significant differences in the verification rate with existing methods, even though the Bloom filter causes false positives. Therefore, the proposed service can effectively process a large amount of data generated in an IoT environment.-
dc.format.extent11-
dc.language영어-
dc.language.isoENG-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleSecure Cloud Storage Service Using Bloom Filters for the Internet of Things-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/ACCESS.2019.2915576-
dc.identifier.scopusid2-s2.0-85066126274-
dc.identifier.wosid000468811800001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.7, pp 60897 - 60907-
dc.citation.titleIEEE ACCESS-
dc.citation.volume7-
dc.citation.startPage60897-
dc.citation.endPage60907-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusIOT-
dc.subject.keywordAuthorAccess control-
dc.subject.keywordAuthorcomputer security-
dc.subject.keywordAuthorcryptography-
dc.subject.keywordAuthordata security-
dc.subject.keywordAuthordata storage systems-
dc.subject.keywordAuthordistributed computing-
dc.subject.keywordAuthorInternet of Things-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Advanced Convergence Engineering > Department of Computer Science and Artificial Intelligence > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Joo, Jong Wha Joanne photo

Joo, Jong Wha Joanne
College of Advanced Convergence Engineering (Department of Computer Science and Artificial Intelligence)
Read more

Altmetrics

Total Views & Downloads

BROWSE