Abstract
SummaryIn a recent scenario of a computing environment, the Internet of Things (IoT) provides a greater impact in several applications and services. For that Edge Computing techniques are effectively incorporated, in which the sensitive data are stored on servers. As a result, edge computing allows for data storage and operation at the network's edge to emerge as optimistic advancement. Regardless, the distinctive characteristics of edge computing including real‐time computing, content perception and parallel processing have introduced a number of innovative challenges in the domain of privacy preservation and data security. Edge computing provides an extension of the cloud for designing and deploying new security resolutions in the area of IoT. In this paper, a Trusted Platform Module with Ciphertext‐policy attribute‐based encryption technique is introduced to provide a solution to a multilayer privacy‐preserving model for efficient data storage. The developed model is adaptable and has a reliable data access control mechanism. Further, the results of the experiments demonstrate that the suggested technique operates better and give 83% results in terms of storage cost, load testing, effective runtime execution, higher security, credibility, and efficiency.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Concurrency and Computation: Practice and Experience
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.