Vijay Kalmani

Work place: Jain college of engineering, Computer Science, Belagavi 590014, India

E-mail: vijaykalmani@hotmail.com

Website: https://orcid.org/0000-0003-0738-3211

Research Interests: Autonomic Computing, Information Security, Network Architecture, Network Security, Information Systems

Biography

Vijay Kalmani is a Research Supervisor at the Jain College of Engineering, Belagavi, affiliated with Visvesvaraya Technological University, Belagavi, India. He received his Ph.D. in Computer Science & Engineering from Suresh Gyan University, Jaipur, India. His research interests include cloud computing, network, and information security, AI & ML, etc. He is the author of many research studies published in national and international journals as well as conference proceedings.

Author Articles
Exploratory Analysis of Access Control Mechanisms for Cloud-Based Iot

By Keerti Naregal Vijay Kalmani

DOI: https://doi.org/10.5815/ijeme.2023.03.05, Pub. Date: 8 Jun. 2023

Computing as a utility has been possible with cloud computing technology. Another technology that has evolved with the internet and has become an inseparable part of our lives is the internet of things (IoT). With the growing use of IoT devices, the data generated and used by them is increasing tremendously, and resource-constrained IoT devices can make use of the cloud for data and computing needs. When IoT and cloud converge there are security and privacy issues as the cloud is a shared resource. Access control mechanisms play an important role in maintaining the security of users' data. Attribute-based encryption provides fine-grained access to data, thus ensuring selective access to data. We review the literature on access control mechanisms for cloud-based IoT and provide an analysis of their strengths and weaknesses. We present a comparison of the mechanisms, highlighting the challenges and open research questions in the field of cloud-based IoT access control and provide suggestions for future research and development. Our findings contribute to the understanding of access control mechanisms for cloud-based IoT and provide insights for their selection and deployment in real-world scenarios.

[...] Read more.
Other Articles