Work place: Department of Computer Science &Engineering Islamic University of Science &Technology, Awantipora, India
E-mail: sahilsholla@gmail.com
Website:
Research Interests: Analysis of Algorithms, Data Structures and Algorithms, Computer Architecture and Organization, Computer systems and computational processes, Information-Theoretic Security, Theory of Computation
Biography
Sahil Sholla, is Assistant Professor at department of Computer Science & Engineering, Islamic University of Science and Technology Awantipora, Pulwama , J&K, India .He has received PhD from National Institute of Technology Srinagar, India. His research focuses on technology ethics, security and Internet of Things.
DOI: https://doi.org/10.5815/ijwmt.2021.04.05, Pub. Date: 8 Aug. 2021
Cloud of Things (CoT) relates to the convergence between Cloud Computing (CC) and the Internet of Things (IoT) and has significantly transformed the way services are delivered in the ubiquitous realm of devices. This integration has become essential because of the huge data being generated by IoT devices, requiring an infrastructure for storage and processing. Such infrastructure is provided by Cloud Computing services with massive space for data storage and exceptional platform to process complex data. IoT networks are vulnerable to multiple security breaches because of the growing usage of IoT devices in user personal systems. This leads to security and privacy threats that need to be addressed. IoT consists of resource limited devices which have feeble computing power, battery source and storage capacity. This paper addresses security issue by proposing usage of obfuscation and encryption techniques to scramble the data at IoT devices which is later on stored in encrypted form at the cloud server. The data at IoT devices is classified into highly critical or less critical and accordingly the appropriate technique between encryption and obfuscation is applied. The proposed mechanism is evaluated in terms of processing time for cryptographic operations at IoT devices. Evaluation results depict that the proposed mechanism is 1.17 times faster than [22] in terms of encryption and decryption times.
[...] Read more.By Asifa Nazir Sahil Sholla Adil Bashir
DOI: https://doi.org/10.5815/ijwmt.2021.01.04, Pub. Date: 8 Feb. 2021
Due to increased number of IoT devices, the marketplace is showing significant growth of sensor deployments around the world. The context involved in any IoT environment needs proper storage, processing and interpretation to get deeper insights from it. Previous research has not focussed much on context-ware security in IoT environment and has primarily relied on context-ware computing methods. In this research paper we implement logical decisions among IoT nodes in healthcare system using ontological approach. With the help of ontological method collected data is transferred between various healthcare devices to the knowledge base thereby achieving security of context like patient data by providing deeper insights, so as to generate intelligent suggested solutions. Incorporation of context-aware rules based on common experience for specific healthcare scenario is done to get implicit insight among IoT nodes. This work designs security ontology using Security Toolbox: Attacks & Countermeasures (STAC) framework that is implemented in Protégé 5. Moreover, Pellet (Incremental) reasoned is used to evaluate the ontology. Emergency ontology that can prove helpful at emergency times has also been designed. Different parameters addressed in this work are authentication, access-control, authorization and privacy using context-awareness methodology that can enable naive users make informed security decision.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals