Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс:
https://dspace.ncfu.ru/handle/20.500.12258/14564| Название: | Scalable data storage design for nonstationary iot environment with adaptive security and reliability |
| Авторы: | Babenko, M. G. Бабенко, М. Г. Chervyakov, N. I. Червяков, Н. И. |
| Ключевые слова: | Cloud computing;Security;Internet of Things;Cryptography;Software reliability;Reliability;Resource management;Residue number system (RNS);Multicloud storage;Computer architecture;Safety |
| Дата публикации: | 2020 |
| Издатель: | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC |
| Библиографическое описание: | Tchernykh, A; Babenko, M; Chervyakov, N; Miranda-Lopez, V; Avetisyan, A; Drozdov, AY; Rivera-Rodriguez, R; Radchenko, G; Du, ZH. Scalable data storage design for nonstationary iot environment with adaptive security and reliability // IEEE INTERNET OF THINGS JOURNAL. - 2020. - Том: 7. - Выпуск: 10. - Стр.: 10171-10188 |
| Источник: | IEEE INTERNET OF THINGS JOURNAL |
| Краткий осмотр (реферат): | Internet-of-Things (IoT) environment has a dynamic nature with high risks of confidentiality, integrity, and availability violations. The loss of information, denial of access, information leakage, collusion, technical failures, and data security breaches are difficult to predict and anticipate in advance. These types of nonstationarity are one of the main issues in the design of the reliable IoT infrastructure capable of mitigating their consequences. It is not sufficient to propose solutions for a given scenario, but mechanisms to adapt the current solution to changes in the environment. In this article, we present a multicloud storage architecture called WA-MRC-RRNS that combines the weighted access scheme, threshold secret sharing, and redundant residue number system with multiple failure detection/recovery mechanisms and homomorphic ciphers. We provide a theoretical analysis of the probability of information loss, data redundancy, speed of encoding/decoding, and show how to dynamically configure parameters to cope with different objective preferences, workloads, and cloud properties. We propose a multiobjective optimization mechanism to adjust redundancy, encryption-decryption speed, and data loss probability. Comprehensive experimental analysis with real data shows that our approach provides a secure way to mitigate the uncertainty of the use of untrusted and not reliable IoT infrastructure. |
| URI (Унифицированный идентификатор ресурса): | http://hdl.handle.net/20.500.12258/14564 |
| Располагается в коллекциях: | Статьи, проиндексированные в SCOPUS, WOS |
Файлы этого ресурса:
| Файл | Размер | Формат | |
|---|---|---|---|
| WoS 936 .pdf Доступ ограничен | 191.67 kB | Adobe PDF | Просмотреть/Открыть |
Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.