skip to main content
10.1145/2905055.2905216acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Smart Cities: A Secure Data Transmission Model

Authors Info & Claims
Published:04 March 2016Publication History

ABSTRACT

The concept of Smart cities is gaining popularity at an extremely high rate. The data associated with them is of very large amount. This data affects the various services associated with them be it E Governance, smart transportation or smart education. Till now most of the security approaches that have been suggested, focus on database security and not on security of the data transmission process as a whole. In this paper we have proposed a model for secure transmission of data. This model is implemented using digital signatures for authentication and triple DES for data transmission. Digital signatures are further implemented using MD5 for hashing and RSA algorithm for encryption.

References

  1. Chourabi, H., Nam, T., Walker, S., Gil-Garcia, J. R., Mellouli, S., Nahon, K., ... & Scholl, H. J. (2012, January). Understanding smart cities: An integrative framework. In System Science (HICSS), 2012 45th Hawaii International Conference on (pp. 2289--2297). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Batty, M., Axhausen, K. W., Giannotti, F., Pozdnoukhov, A., Bazzani, A., Wachowicz, M., ... & Portugali, Y. (2012). Smart cities of the future. The European Physical Journal Special Topics, 214(1), 481--518.Google ScholarGoogle Scholar
  3. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer systems, 28(3), 583--592. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Popović, K. (2010, May). Cloud computing security issues and challenges. InMIPRO, 2010 proceedings of the 33rd international convention (pp. 344--349). IEEE.Google ScholarGoogle Scholar
  5. Tsai, W. T., Sun, X., & Balasooriya, J. (2010, April). Service-oriented cloud computing architecture. In Information Technology: New Generations (ITNG), 2010 Seventh International Conference on (pp. 684--689). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Nadeem, A., & Javed, M. Y. (2005, August). A performance comparison of data encryption algorithms. In Information and communication technologies, 2005. ICICT 2005. First international conference on (pp. 84--89). IEEE.Google ScholarGoogle Scholar
  7. Tsudik, G. (1992). Message authentication with one-way hash functions. ACM SIGCOMM Computer Communication Review, 22(5), 29--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Merkle, R. C. (1988, January). A digital signature based on a conventional encryption function. In Advances in Cryptology---CRYPTO'87 (pp. 369--378). Springer Berlin Heidelberg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Smart Cities: A Secure Data Transmission Model

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
        March 2016
        843 pages
        ISBN:9781450339629
        DOI:10.1145/2905055

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 March 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate97of270submissions,36%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader