Method of modular exponent secure distributed computation for accelerated implementation of data protection mechanisms in IoT

Authors

DOI:

https://doi.org/10.18372/2073-4751.76.18243

Keywords:

modular exponentiation, secure cloud computing, IoT security, homomorphic encryption, digital signature

Abstract

The article proposes a method of secure modular exponentiation on IoT terminal platforms involving cloud computing for fast implementation of public key cryptographic protection algorithms. The method implements a new principle of distribution of calculations between the terminal and remote platforms when implementing modular exponentiation - at the level of processing each individual bit of the exponent code. This makes it possible to reduce the computing load on the terminal platform by three times and, accordingly, to speed up the calculation of the basic operation of public key cryptography by three times compared to the known methods of distributed calculation of the modular exponent.

References

Elgazzar K., et al. Revisiting the internet of things: New trends, opportunities and grand challenges. Frontiers in Internet of Things. 2022. Vol. 1. P. 1–18.

Kumar S., Tiwari P., Zymbler M. Internet of Things is a revolutionary approach for future technology enhancement: a review. Journal of Big Data. 2019. No. 6. 111.

Jurcut A.D., Ranaweera P., Xu L. Introduction to IoT Security. IoT Security: Advances in Authentication. John Wiley & Sons Ltd, 2020. P. 27–64.

Unal D., Al-Ali A., Catak F.O., Hammoudeh M. A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Future Generation Computer Systems. 2021. V. 125. P. 433–445.

Bardis N. Secure, Green Implementation of Modular Arithmetic Operations for IoT and Cloud Applications. Green IT Engineering: Components, Networks and System Implementation. Springer, 2017. P. 43–64.

Meneghello F., Calore M., Zucchetto D., Polese M., Zalella A. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices. IEEE Internet of Things Journal. 2019. V. 6. No. 5. P. 8182–8201.

Alfred Menezes, Paul C. van Oorschot, Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 2001. 780 p.

Markovskyi O., Bardis N., Doukas N., Kirilenko S. Secure Modular Exponentiation in Cloud Systems. Proceedings of The Congress on Information Technology, Computational and Experimental Physics (CITCEP 2015) / Krakow, Poland, 2015. P. 266–269.

Jose Alberto de Jesus Borges, Haidukevych Oleksandra, Mirataei Alireza, Nikos Doukas. A Secure Cloud Computing Method for Rapid Implementation of Cryptographic Data Protection in IoT. Proceeding of The 13th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT’2023 / Athens, Greece, 2023. P. 50–53.

Published

2023-12-25

Issue

Section

Статті