Welcome to Francis Academic Press

International Journal of Frontiers in Engineering Technology, 2021, 3(5); doi: 10.25236/IJFET.2021.030504.

Key technologies of Secure Multi-Party Computing for Perceived Data Transmission in Internet of Things

Author(s)

Haijun Xu

Corresponding Author:
Haijun Xu
Affiliation(s)

Shenzhen Zheyang Technology co., LTD, Shenzhen, 518000, Guangdong, China

Abstract

With the "wisdom of the Earth, connected to physical objects" makes it independent from the Internet gradually connected to the network and the Internet of Things. Internet of Things is another industrial upgrading of information industry after computer and mobile communication. The Internet of Things is based on the Internet. It uses technologies such as RFID, sensors and wireless sensor hardware to build a network information system covering all people and things in the world. It enables human economic, social life, production and operation and personal activities to operate in the intelligent Internet of Things. As an important support of national strategic emerging industries, the Internet of Things is the core and foundation of smart cities, national defense and intelligent manufacturing industries, and multi-domain, open and security are the theoretical requirements of the application of the Internet of Things. Aiming at the resource fragmentation problems caused by the closure of traditional the Internet of Things architecture, such as closure, tight coupling, poor scalability, and some security problems for the open sharing of the Internet of Things resources, this paper proposes an improved multi-domain Web of Things (MWoT) architecture based on the relevant standards of the Web of Things (WoT) architecture. Some related technologies, such as Internet of Things identification and edge cloud computing, are used to realize cross-domain sharing of Internet of Things resources and cross-domain collaboration of services, as well as to solve the problem of data transmission security.

Keywords

Internet of Things, Network Information System, Internet of Things Identification, Edge Cloud Computing

Cite This Paper

Haijun Xu. Key technologies of Secure Multi-Party Computing for Perceived Data Transmission in Internet of Things. International Journal of Frontiers in Engineering Technology (2021), Vol. 3, Issue 5: 30-42. https://doi.org/10.25236/IJFET.2021.030504.

References

[1] Razzaque M A, Milojevic-Jevric M, Palade A, et al. (2017)“Middleware for Internet of Things: A Survey[J]”. IEEE Internet of Things Journal, 3(1), pp.70-95.

[2] Perera C, Chi H L, Jayawardena S. (2017)“The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey[J]”. IEEE Transactions on Emerging Topics in Computing, 3(4) , pp.585-598.

[3] Duchemin W, Anselmetti Y, Patterson M, et al. (2017)“DeCoSTAR: Reconstructing the Ancestral Organization of Genes or Genomes Using Reconciled Phylogenies[J]”. Genome Biology & Evolution, 9(5) , pp.1312-1319.

[4] Paganelli F, Turchi S, Giuli D. (2017)“A Web of Things Framework for RESTful Applications and Its Experimentation in a Smart City[J]”. IEEE Systems Journal, 10(4) , pp.1412-1423.

[5] Liyanage M, Chang C, Srirama S N. (2018)“Adaptive Mobile Web Server Framework for Mist Computing in The Internet of Things[J]”. International Journal of Pervasive Computing and Communications, 14(4) , pp.247-267.

[6] Asadpour M, Dashti M T. (2015)“Scalable, Privacy Preserving Radio‐Frequency Identification Protocol for the Internet of Things[J]”. Concurrency & Computation Practice & Experience, 27(8) , pp.1932-1950.

[7] Hu P, Ning H, Qiu T, et al. (2017)“Fog Computing Based Face Identification and Resolution Scheme in Internet of Things[J]”. IEEE Transactions on Industrial Informatics, 13(4) , pp.1910-1920.

[8] Tao X, Ota K, Dong M, et al. (2017)“Performance Guaranteed Computation Offloading for Mobile-Edge Cloud Computing[J]”. IEEE Wireless Communications Letters, 6(6) , pp.774-777.

[9] Esposito C, Castiglione A, Pop F, et al. (2017)“Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective[J]”. IEEE Cloud Computing, 4(2) , pp.13-17.

[10] Cartwright R. (2018)“An Internet of Things Architecture for Cloud-Fit Professional Media Workflow[J]”. Smpte Motion Imaging Journal, 127(5) , pp.14-25.