|
Reference paper | Year | Contribution |
|
[17] | 2021 | In this solution, a lightweight algorithm based on block cryptography is used to provide security in fog computing. |
[19] | 2020 | A two-step encryption solution is provided to secure the data stored in the cloud. In this solution, the main data are divided into two parts, which are encrypted by a common key. |
[22] | 2020 | In this article, the authors provide an overview of the most important cryptographic solutions that can be used in fog computing. The results of these studies indicate the need for algorithms and solutions that can create a kind of compromise between security and service quality parameters. |
[24] | 2020 | A framework for use in health care systems along with machine learning for decision-making based on patient data is provided. Also, blockchain has been used to secure the data stream. |
[26] | 2020 | This paper first examines the infrastructure, protocol, and application of the Internet of Things. Then, security problems in the IoT environment are expressed. It also identifies some emerging techniques that can be used to address IoT security issues. In this study, the authors conclude that machine learning, blockchain, and artificial intelligence are the new approaches to solving the problem of IoT security. |
[14] | 2020 | The authors provided a system including a microcontroller with android application that has features for history control and speech recognition. For securing this system, they are using a unique biometric and speech authentication mechanism. |
[15] | 2019 | Authors in this paper provided a low-cost biometric system for IoT devices that used limited resources to reduce memory and computation costs. The proposed system utilizes an algorithm based on the block logic operation to reduce biometric property measurement. |
[21] | 2019 | A number of symmetric cryptographic algorithms have been investigated in terms of performance. Solutions in terms of runtime parameters and memory consumption have been investigated. The purpose of this study was to determine the capabilities and limitations of each cryptographic algorithm. |
[18] | 2018 | In this research, an encryption system based on AES algorithm and asynchronous key transfer system for data exchange is presented. This solution can be used to secure infrastructure with limited processing resources. |
[20] | 2018 | Blockchain has been used as a security solution based on cloud computing. To ensure data security, data are stored in the form of blockchain blocks. |
|