Method for preserving privacy in wearable IoT devices by extending security using fog computing

The overarching objective has been achieved through the development of a method enabling the extension of Fog Computing (FC) to facilitate the transport and encryption of sensitive data from wearable devices. The study presents a method leveraging Fog Computing (FC) to transport and encrypt sensitiv...

Full description

Saved in:
Bibliographic Details
Published in2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0 pp. 1 - 6
Main Authors Sathyaraj, P., Singh, Mukesh, Umaeswari, P., S, Mahesh Kumar A, Vekariya, Vipul, Maranan, Ramya
Format Conference Proceeding
LanguageEnglish
Published IEEE 05.06.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The overarching objective has been achieved through the development of a method enabling the extension of Fog Computing (FC) to facilitate the transport and encryption of sensitive data from wearable devices. The study presents a method leveraging Fog Computing (FC) to transport and encrypt sensitive data from wearable devices, effectively mitigating privacy risks. Through comprehensive tests, NFC emerges as the optimal technology for data transport, while the DHEC algorithm is identified as the best encryption method for securing data between FC and the cloud. Real-world simulations validate the proposed approach, demonstrating its feasibility and effectiveness. The MyNFC app facilitates secure data transmission to AWS, with ServerNFC successfully decrypting data. The AES algorithm exhibited an average CPU usage of 31.8375, with low energy consumption and an average execution time of 26.404 seconds. For the RSA algorithm, the average CPU usage was 33.5875, also with low energy consumption, and an average execution time of 27.8 seconds. The DHEC algorithm showed an average CPU usage of 33.25, with low energy consumption, and an average execution time of 26.711 seconds. Lastly, the HJP algorithm displayed an average CPU usage of 32.375, with low energy consumption, and an average execution time of 30.163 seconds. Overall, the study highlights the ability of FC to safeguard information against interception, endorsing the proposed method's security and scalability.
DOI:10.1109/OTCON60325.2024.10688002