Autor: |
Sheeba, M. R., Suganthi, G., Rose, R. Jemila |
Předmět: |
|
Zdroj: |
ICTACT Journal on Communication Technology; Dec2022, Vol. 13 Issue 4, p2830-2835, 6p |
Abstrakt: |
The term Internet of Things is used to describe a wide range of webenabled services and products, including cutting-edge gadgetry. To put it simply, cloud computing is the method of making information and software normally housed on separate local servers available to consumers through the Internet on demand. Cloud services mediate between IoT devices and the applications that control them. Because of this, essential data may be easily accessed without the need for costly infrastructure. The cloud based IoT paradigm connects the virtual and real realms. Two devices need to check their identities against each other before they can exchange data. Creating a one-of-a-kind identifier for every piece of electrical equipment; this might be a number or a name A person's right to privacy has been violated because this data can be used to harm them. Therefore, the suggested system will only store essential information about the user. If you want to keep the exam's identifiers secret, you should choose a method that leaves no paper trail. Therefore, protecting the privacy of users is so crucial. Viruses and other malicious software pose a significant risk to your network and the data it contains. Many IoT applications necessitate the construction of a distributed, scalable, and geographically dispersed datacenter network to meet the demands of their users. The providers of the desired information services are the ones responsible for automating the extensive data classification, analysis, and processing. Protective measures should ideally be handled by the security service desk. Using current approaches exposes too much data and services to risk. The goal of this completely new layout is to create a framework that can't be harmed by environmental elements in any way. [ABSTRACT FROM AUTHOR] |
Databáze: |
Supplemental Index |
Externí odkaz: |
|