Hybrid Method for Securing Data in IoT Cloud
Vidhya Vijayan1, Eldo P Elias2

1Vidhya Vijayan, Department of Computer Science and Engineering, Mar Athanasius College of Engineering, Kothamangalam (Kerala) India.
2Eldo P Elias, Department of Computer Science and Engineering, Mar Athanasius College of Engineering, Kothamangalam (Kerala) India.
Manuscript received on 07 March 2019 | Revised Manuscript received on 20 March 2019 | Manuscript published on 30 March 2019 | PP: 447-450 | Volume-8 Issue-5, March 2019 | Retrieval Number: E3062038519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Information exchange between items (things), having detecting or registering capacities or both over the web is known as the Internet of Things (IoT). IoT and Cloud computing coordinated to shape a stage called IoT cloud. Since these advancements are altogether utilized, there is a requirement for the security of information accumulated from the gadgets associated through these advances. To solve the transport issue in the symmetric key algorithm and to acquire the high performance, the proposed method and RSA algorithm are combined together. While actualizing the proposed framework, the symmetric key algorithm utilizes low RAM for preparing, in this way, it gives rapid. RSA is one of the best and secures asymmetric encryption method. Here it is used only to encrypt the symmetric key, for this, it requires a negligible computational cost. The proposed method using DNA cryptography and Huffman coding for encrypting and decrypting data. DNA Cryptography can have a special advantage for secure authentication, data storage, steganography, digital signatures and so on. Huffman code is a sort of ideal prefix code. What’s more, it is ordinarily utilized for lossless information compression. This methodology utilizes variable key length so aggressor won’t almost certainly surmise the length of the key recognition.
Keyword: Decryption, DNA Coding, Encryption, Huffman Coding, IoT.
Scope of the Article: IoT