<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="19375" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/19375?output=omeka-xml" accessDate="2026-04-08T13:48:08+00:00">
  <collection collectionId="16">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="51377">
                <text>Conference Papers</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="28">
    <name>Conference Paper</name>
    <description>Faculty Publications- Conference Papers</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="166875">
              <text>Security and Privacy in Internet of Things (IoT) Environments</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="166876">
              <text>Data Flow Analysis; Empirical Experiments; Homomorphic Encryption; Internet of Things (IoT); IoT Ecosystem; Privacy Preservation Techniques; Security Modeling; Threat Intelligence Sharing; User-Centric Design</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="166877">
              <text>Although the proliferation of IoT devices has led to unparalleled ease of use and accessibility, it has also raised serious privacy and safety issues. Using a systematic approach that incorporates security and privacy modelling, data analysis, and empirical trials, this study provides a deep dive into the topic of IoT security and privacy. Our results show how crucial it is to take precautions against 'Information Disclosure' by using strong encryption and authorization protocols. The need to protect against 'Unencrypted Data' vulnerabilities is further emphasized by vulnerability analysis. Encryption (AES-256) and other access control rules fare very well in the assessment of security systems. Furthermore, 'Homomorphic Encryption' is identified as a potential strategy to protecting user privacy while retaining data usefulness based on our review of privacy preservation strategies. A more secure and privacyaware IoT environment may be fostered thanks to the findings of this study, which have ramifications for the industry, government, consumers, and academics. Addressing the ever-evolving security and privacy issues in the IoT will need a future focus on cutting-edge security mechanisms, privacy-preserving technology, regulatory compliance, user-centric design, multidisciplinary cooperation, and threat intelligence sharing.   2024 IEEE.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="166878">
              <text>Bhoomadevi A.; Soundarraj P.L.; Gupta V.; Kumaravel S.K.; Deivasigamani S.; Kumar A.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="166879">
              <text>Proceedings of 9th International Conference on Science, Technology, Engineering and Mathematics: The Role of Emerging Technologies in Digital Transformation, ICONSTEM 2024</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="166880">
              <text>Institute of Electrical and Electronics Engineers Inc.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="166881">
              <text>2024-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="166882">
              <text>&lt;a href="https://doi.org/10.1109/ICONSTEM60960.2024.10568633" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1109/ICONSTEM60960.2024.10568633&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85198836158&amp;amp;doi=10.1109%2FICONSTEM60960.2024.10568633&amp;amp;partnerID=40&amp;amp;md5=f67b22c5c02c3705c015f4db856c9623" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85198836158&amp;amp;doi=10.1109%2fICONSTEM60960.2024.10568633&amp;amp;partnerID=40&amp;amp;md5=f67b22c5c02c3705c015f4db856c9623&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="166883">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="166884">
              <text>ISBN: 979-835036509-2</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="166885">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="166886">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="166887">
              <text>Conference paper</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="166888">
              <text>Bhoomadevi A., Amity Institute of Public Health &amp;amp; Hospital Administration, Amity University, Noida, 201303, India; Soundarraj P.L., School of Business And Management, Christ University, Lavasa, Maharashtra, Pune, 412112, India; Gupta V., Mahatma Gandhi Kashi Vidyapith, Department of Commerce, Varanasi, India; Kumaravel S.K., Mathematics, Vel Tech Rangarajan Dr. Sagunthala R And D Institute of Science And Technology, TamilNadu, Chennai, India; Deivasigamani S., Digipulse Technologies Inc, 811 Church Road, Suite 169, 08002, NJ, United States; Kumar A., Swami Vivekanand Subharti University, Department of Computer Application Faculty of Science, Meerut, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
