ABSTRACT
The concept of Smart cities is gaining popularity at an extremely high rate. The data associated with them is of very large amount. This data affects the various services associated with them be it E Governance, smart transportation or smart education. Till now most of the security approaches that have been suggested, focus on database security and not on security of the data transmission process as a whole. In this paper we have proposed a model for secure transmission of data. This model is implemented using digital signatures for authentication and triple DES for data transmission. Digital signatures are further implemented using MD5 for hashing and RSA algorithm for encryption.
- Chourabi, H., Nam, T., Walker, S., Gil-Garcia, J. R., Mellouli, S., Nahon, K., ... & Scholl, H. J. (2012, January). Understanding smart cities: An integrative framework. In System Science (HICSS), 2012 45th Hawaii International Conference on (pp. 2289--2297). IEEE. Google ScholarDigital Library
- Batty, M., Axhausen, K. W., Giannotti, F., Pozdnoukhov, A., Bazzani, A., Wachowicz, M., ... & Portugali, Y. (2012). Smart cities of the future. The European Physical Journal Special Topics, 214(1), 481--518.Google Scholar
- Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer systems, 28(3), 583--592. Google ScholarDigital Library
- Popović, K. (2010, May). Cloud computing security issues and challenges. InMIPRO, 2010 proceedings of the 33rd international convention (pp. 344--349). IEEE.Google Scholar
- Tsai, W. T., Sun, X., & Balasooriya, J. (2010, April). Service-oriented cloud computing architecture. In Information Technology: New Generations (ITNG), 2010 Seventh International Conference on (pp. 684--689). IEEE. Google ScholarDigital Library
- Nadeem, A., & Javed, M. Y. (2005, August). A performance comparison of data encryption algorithms. In Information and communication technologies, 2005. ICICT 2005. First international conference on (pp. 84--89). IEEE.Google Scholar
- Tsudik, G. (1992). Message authentication with one-way hash functions. ACM SIGCOMM Computer Communication Review, 22(5), 29--38. Google ScholarDigital Library
- Merkle, R. C. (1988, January). A digital signature based on a conventional encryption function. In Advances in Cryptology---CRYPTO'87 (pp. 369--378). Springer Berlin Heidelberg. Google ScholarDigital Library
- Smart Cities: A Secure Data Transmission Model
Recommendations
Efficient signature generation by smart cards
We present a new public-key signature scheme and a corresponding authentication scheme that are based on discrete logarithms in a subgroup of units in p where p is a sufficiently large prime, e.g., p 2512. A key idea is to use for the base of ...
Efficient structure-preserving signature scheme from standard assumptions
SCN'12: Proceedings of the 8th international conference on Security and Cryptography for NetworksWe present an efficient signature scheme that facilitates Groth-Sahai proofs [25] of knowledge of a message, a verification key, and a valid signature on the message, without the need to reveal any of them. Such schemes are called structure-preserving. ...
Proxy-assisted access control scheme of cloud data for smart cities
Security and privacy for smart cities have attached much attention. As cloud computing can provide secure and reliable data storage and data sharing, it has become an important infrastructure for smart cities. However, in the cloud storage system, the ...
Comments