{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T21:09:06Z","timestamp":1774645746131,"version":"3.50.1"},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T00:00:00Z","timestamp":1651795200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T00:00:00Z","timestamp":1651795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Conclusion<\/jats:title><jats:p>Security and ease of provisioning of IoT devices onto cloud infrastructure is instrumental to the deployment of IoT devices. With not much information available on the ease of secure provisioning of IoT devices couple with inherent challenge of these devices in encrypting data before transmission to the cloud due to their constrained nature, this work implements a low-cost client-side encryption algorithm based on the AES to carry out data encryption at the IoT device\u2019s communication end using a SAMG55 microprocessor, following which the device is securely provisioned to a cloud platform as shown in Fig. 3. Related work and direction for future work is further detailed in Online Resources 1 and Online Resources 2.<\/jats:p>","DOI":"10.1007\/s11704-022-1256-9","type":"journal-article","created":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T06:03:36Z","timestamp":1651817016000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Low-cost client-side encryption and secure Internet of things (IoT) provisioning"],"prefix":"10.1007","volume":"16","author":[{"given":"Joseph","family":"Mamvong","sequence":"first","affiliation":[]},{"given":"Gokop","family":"Goteng","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,6]]},"reference":[{"issue":"4","key":"1256_CR1","doi-asserted-by":"publisher","first-page":"485","DOI":"10.14569\/IJACSA.2016.070464","volume":"7","author":"S Aldossary","year":"2016","unstructured":"Aldossary S, Allen W. Data security, privacy, availability and integrity in cloud computing: issues and current solutions. International Journal of Advanced Computer Science and Applications, 2016, 7(4): 485\u2013498","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"1256_CR2","doi-asserted-by":"crossref","unstructured":"Ali O, Ishak M K, Wuttisittikulkij L, Maung T Z B. IoT devices and edge gateway provisioning, realtime analytics for simulated and virtually emulated devices. In: Proceedings of 2020 International Conference on Electronics, Information, and Communication (ICEIC). 2020, 1\u20135","DOI":"10.1109\/ICEIC49074.2020.9051037"},{"key":"1256_CR3","doi-asserted-by":"crossref","unstructured":"Sahu A K, Sharma S, Tripathi S S, Singh K N. A study of authentication protocols in internet of things. In: Proceedings of 2019 International Conference on Information Technology (ICIT). 2019, 217\u2013221","DOI":"10.1109\/ICIT48102.2019.00045"},{"issue":"12","key":"1256_CR4","doi-asserted-by":"publisher","first-page":"11601","DOI":"10.1109\/JIOT.2020.2999350","volume":"7","author":"H Deng","year":"2020","unstructured":"Deng H, Qin Z, Sha L, Yin H. A flexible privacy-preserving data sharing scheme in cloud-assisted IoT. IEEE Internet of Things Journal, 2020, 7(12): 11601\u201311611","journal-title":"IEEE Internet of Things Journal"},{"key":"1256_CR5","doi-asserted-by":"publisher","first-page":"95057","DOI":"10.1109\/ACCESS.2019.2961413","volume":"8","author":"L Liu","year":"2020","unstructured":"Liu L, Wang H, Zhang Y. Secure IoT data outsourcing with aggregate statistics and fine-grained access control. IEEE Access, 2020, 8: 95057\u201395067","journal-title":"IEEE Access"},{"issue":"7","key":"1256_CR6","doi-asserted-by":"publisher","first-page":"5498","DOI":"10.1109\/JIOT.2020.3033435","volume":"8","author":"J N Mamvong","year":"2021","unstructured":"Mamvong J N, Goteng G L, Zhou B, Gao Y. Efficient security algorithm for power-constrained IoT devices. IEEE Internet of Things Journal, 2021, 8(7): 5498\u20135509","journal-title":"IEEE Internet of Things Journal"},{"issue":"8","key":"1256_CR7","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1080\/09720529.2019.1695900","volume":"22","author":"M Jangra","year":"2019","unstructured":"Jangra M, Singh B. Performance analysis of CLEFIA and present lightweight block ciphers. Journal of Discrete Mathematical Sciences and Cryptography, 2019, 22(8): 1489\u20131499","journal-title":"Journal of Discrete Mathematical Sciences and Cryptography"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-022-1256-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-022-1256-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-022-1256-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T21:34:19Z","timestamp":1705700059000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-022-1256-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,6]]},"references-count":7,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["1256"],"URL":"https:\/\/doi.org\/10.1007\/s11704-022-1256-9","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,6]]},"assertion":[{"value":"13 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"166824"}}