Abstract

Today with the development of Internet of Things (IoT) technology its security and privacy becomes very much essential because this technology provide the facility for accessing the devices or resources from anywhere and anytime. For providing the security and privacy to IoT various technology has been developed but in this we propose data aggregation mechanism in which it uses one-time pad and symmetric key to make our data secure and preserve the privacy of it. This mechanism takes less computation time, improve processing speed and also require less cost in implementation. The implementation of proposed approach is done in widely used Python technology which produce better results. In last the proposed mechanism provide more security and preserve our data.

Highlights

  • It seems that, billions and trillions [1, 2] of intelligent entities around us will be connected themselves and to their physical environment [3] as per the prediction by the Internet of Things (IoT)

  • Our daily life is being reformed with Internet of Things (IoT)

  • To empower real-time processing, seamless connection and ubiquitous sensing in IoT applications, privacy preserving data aggregation method is considered as a basic element, that utilize storage and computing resources to network edges

Read more

Summary

Introduction

Billions and trillions [1, 2] of intelligent entities around us will be connected themselves and to their physical environment [3] as per the prediction by the Internet of Things (IoT). IoT systems will provide a whole new set of advanced features based on gradual elegant data acquisition in a briefly colonized environment with intelligent things. Illustration of these may be health care system, modern house management system, smart city service or collaborative sensing applications [4, 5]. Extensive collection of data and its processing and distribution in the middle of people’s personal livings create significant privacy issues. Ignoring these problems may result unintended outcomes such as failure to accept but succeed in noble services, damaging reputation or high cost legal cases. We note the explosiveness in the number of smart objects and the advanced methods of system interaction and user response

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call