Accessing Sensor Data via Hybrid Virtual Private Network Using Multiple Layer Encryption Method in Big Data
Enormous data generation takes place with the increase in the number of systems and enhanced technology. This data generation occurs exponentially with time. Sensor networks are one of the main generators of big data. The data/information received from the sensor network is transferred to the other end user/s via hybrid virtual private network (HVPN) using multiple layer encryption through Internet of things (IoT). The communication between sensors and end user/s takes place through the server with the help of inter-networking procedure called Internet of things (IoT). With the help of IoT, the objects can be traced and controlled from large distances over the network for a nonstop assimilation of the world into computer-based systems resulting in superior efficiency, accuracy, and reduced human intervention. The HVPN using multiple layer encryption strategy will permit the association between the initiator and responder to remain unidentifiable. We have used multiple layer encryption technique to scramble the information to secure IoT. Furthermore, we experimented the contrast of the speed for information transmission and multiple layer encryption and without multiple layer encryption with IoT.
KeywordsHybrid virtual private network (HVPN) Internet of things (IoT) Virtual private network (VPN) Multilayer encryption
- 1.Sherwood, R., Bhatacharjee, B., Srinivasan, A.: P5: a protocol for scalable anonymous communication. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 58–70. 12–15 May 2002Google Scholar
- 5.Goldschlag, D., Reed, M., Syverson, P.: Hiding routing information. In: Proceedings of the 1st International Workshop on Information Hiding, 30 May–01 June, pp. 137–150. Springer (1996)Google Scholar
- 9.Hoang, N.P.: Anonymous communication and its importance in social networking. In: Proceedings of the 16th International Conference on Advanced Communication Technology, 16–19 Feb, pp. 34–39. IEEE Xplore Press (2014)Google Scholar
- 11.Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Proxies for anonymous routing. In: Proceedings of the 12th Annual Computer Security Applications Conference, 9–13 Dec, pp. 95–104. IEEE Xplore Press (1996)Google Scholar