Hashing is transforming a string of characters into a usually shorter value of a fixed length representing the original string.
Besides faster data recovery, Hashing is also used to encrypt and decrypt digital signature.
Introduction
The number of interconnected everyday devices continues to grow and constitutes the Internet of Things (IoT).
Most of these devices do collect data. The data collected is stored in online using web services that sometimes run without any specific security and privacy concerns.
1. OAuth
OAuth (Open Standard Authentication). It is a common protocol which allows social services to communicate with each other and providing a safe way to share personal data.
It offers a Web application framework which gives third parties access to their resources without sharing credentials with their clients.
On its next version after the initial authorisation, a token based approach was implemented. It was to organize and authorize the interaction between the Assets proprietor and HTTP (Hyper Text Transfer Protocol) service
2. Form Based Authentication
Form based authentication is a online networked computer systems based on the Web and the Internet.
In general, it refers to the idea that a user has an editable “file” to fill in and send for logging into some program or service.
In fact, the notion of using certain kinds of information that you enter is a technique that is not specific to the Internet is vague.
3. REST (Representational state transfer)
Representative State Transfer (REST) is an architectural style of software which defines a set of constraints to be used to build Web services.
Web services that conform to the architectural style of REST, called RESTful Web services. It provides interoperability over the Internet between computer systems.
RESTful Web services allow the requesting systems to access and manage. Web resource textual representations using a uniform and predefined collection of stateless operations. Other types of Web services, such as SOAP (Simple Object Access Protocol) Web services, are publishing their own temporary operating sets.
Conclusion
The IoT is about to become the next major technical hype. Every day new services appear which make use of IoT devices. These new services are using web based storage, and the IoT devices are beginning to interact with such web storage.
From such a scenario, two problems arise:
- Privacy and control of the data collected
- Low bit authentication for end to end devices.