Cloud computing offers various features such as creates, configure and customize application online. User can access applications over the Internet and they can also access database via Internet. Open nature and public access make their application vulnerable for several security attacks. This paper attempt to integrated different previously defined security approaches to propose a new and novel model of security. Here, proposed solution approach to improve performance of confidentiality, authentication, integrity and access control with better and strong way. Proposed solution is implemented using java technology and evaluated based on computation time and memory consumption. A detailed comparison with graph is also demonstrated in experimental analysis section.
The Internet of Things (IoT) is one of the most promising scientific fields of the last decade. The number of devices developed that support Internet things makes the application of internet things more interesting. The field of use includes the insurance sector, intelligent monitoring Environment, Smart City, sector-health care, Intelligent City, and also many other applications enabled for smart devices.The vision of the introduction of the internet, forming a network called IoT, where various information technology devices are connected, security and trust are most important for the user, because this network presumably used a large amount of data.However, trust is a significant obstacle that can hinder the growth of the IoT and even slow down the significant compression of many applications.This paper presents an approach using trust management (TM) with next-generation IoT networks for healthcare, agriculture, and sustainable development goals. Implementation of IoT conveys various problems of security and confidentiality. The use of IoT to ensure confidentiality, integrity, authentication, authorization, trust, secrecy, and management challenges are addressed. The paper uses decentralized blockchain technology to solve security and privacy issues in applications with the support of the IoT.Ethereum virtual machine is used to implement theBlockchain distributed networkand healthcare insurance claims are taken as anexample to test the proposed solution. Also, it is provided that the lessons and opinions discussed are primarily about the purpose of the trust, which can be reproduced in the future on the internet.The results show that distributed blockchain technology provides trust management and can improve the existing security and privacy of the IoT in the health and agriculture sectors, which is helpful for next-generation IoT networks.
The ideal Secure Multiparty Computation (SMC) model deploys a Trusted Third Party (TTP) which assists in secure function evaluation. The participating joint parties give input to the TTP which provide the results to the participating parties. The equality check problem in multiple party cases can be solved by simple architecture and a simple algorithm. In our proposed protocol Equality Hash Checkin ideal model, we use a secure hash function. All the parties interested to check equality of their data supply hash of their data to the TTP which then compared all hash values for equality. It declares the result to the parties.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.