Load Balancing Server and Homomorphic Encryption in Internet of Things
(1) 
(2) Telkom University
(3) Telkom University
(*) Corresponding Author
DOI: https://doi.org/10.23917/khif.v7i2.13607
Abstract
Keywords
Full Text:
PDFReferences
S. D. Riskiono and D. Pasha, “Analisis Metode Load Balancing Dalam Meningkatkan Kinerja Website E-Learning,” J. Teknoinfo, vol. 14, no. 1, p. 22, 2020, doi: 10.33365/jti.v14i1.466.
S. D. Riskiono, “Implementasi Metode Load Balancing Dalam Mendukung Sistem Kluster Server,” pp. 455–460, 2018, doi: 10.31227/osf.io/9vuzx.
Q. Wang, D. Zhou, and Y. Li, “Secure Outsourced Calculations with Homomorphic Encryption,” Adv. Comput. An Int. J., vol. 9, no. 6, pp. 01–14, 2018, doi: 10.5121/acij.2018.9601.
A. Rahmatulloh and F. MSN, “Implementasi Load Balancing Web Server menggunakan Haproxy dan Sinkronisasi File pada Sistem Informasi Akademik Universitas Siliwangi,” J. Nas. Teknol. dan Sist. Inf., vol. 3, no. 2, pp. 241–248, 2017, doi: 10.25077/teknosi.v3i2.2017.241-248.
F. Apriliansyah, I. Fitri, and A. Iskandar, “Implementasi Load Balancing Pada Web Server Menggunakan Nginx,” J. Teknol. dan Manaj. Inform., vol. 6, no. 1, 2020, doi: 10.26905/jtmi.v6i1.3792.
X. W. Wu, E. H. Yang, and J. Wang, “Lightweight security protocols for the Internet of Things,” IEEE Int. Symp. Pers. Indoor Mob. Radio Commun. PIMRC, vol. 2017-Octob, pp. 1–7, 2018, doi: 10.1109/PIMRC.2017.8292779.
B. K. S. Rajaram and N. Krishna Prakash, “Secure mqtt using aes for smart homes in iot network,” Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 5s, pp. 483–485, 2019.
A. M. Al Naamany, A. Al Shidhani, and H. Bourdoucen, “IEEE 802 . 11 Wireless LAN Security Overview,” Ijcsns, vol. 6, no. 5, pp. 138–156, 2006.
M. E. Hameed, M. M. Ibrahim, N. A. Manap, and M. L. Attiah, “Comparative study of several operation modes of AES algorithm for encryption ECG biomedical signal,” Int. J. Electr. Comput. Eng., vol. 9, no. 6, pp. 4850–4859, 2019, doi: 10.11591/ijece.v9i6.pp4850-4859.
Y. Alkady, F. Farouk, and R. Rizk, “Fully Homomorphic Encryption with AES in Cloud Computing Security,” Adv. Intell. Syst. Comput., vol. 845, pp. 370–382, 2019, doi: 10.1007/978-3-319-99010-1_34.
Article Metrics
Abstract view(s): 390 time(s)PDF: 284 time(s)
Refbacks
- There are currently no refbacks.