Summary Cloud computing has been gaining widespread significance in recent times, especially with the advent of state‐of‐the‐art communication technologies and data‐handling systems. Large volumes of data are being handled in real time and their availability is made feasible to consumers in an efficient manner through cloud computing networks. However, security of such data being transferred through clouds characterized in a centralized configuration is of prime concern, which has been investigated in this research paper. Secured transmission of data through a secured key transmission using appropriate authentication mechanism has been the driving force behind the research carried out in this paper. In order to resolve the existing issues in clouds in terms of computational as well as storage complexities, a secure key transmission Rivest‐Shamir‐Adleman (SKT‐RSA) protocol is proposed based on the secure key transmission. Key distribution between the certified authority and the end user is proposed. The proposed protocol is a tree‐based cluster key distribution scheme.
Cloud computing becomes an important application development platform for processing user data with high security. Service providers are accustomed to providing storage centers outside the trusted location preferred by the data owner. Thus, ensuring the security and confidentiality of the data while processing in the centralized network is very difficult. The secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud network. Intruders are very active over the network like real authenticated user to hack the personal sensitive data, such as bank balance, health data, personal data, and confidential documents over the cloud network. In this research, a secured key agreement between the sender and the receiver using Kerberos authentication protocol with fingerprint is proposed to ensure security in M-Healthcare. Conditions of patients are monitored using wireless sensor devices and are then transferred to the server. Kerberos protocol helps in avoiding unnecessary communication of authenticated data over the cloud network. Biometric security process is a procedure with the best security in most of the authentication field. Trust node is responsible in carrying data packets from the sender to the receiver in the cloud network. The Kerberos protocol is used in trust node to ensure security. Secured communication between the local health center and the healthcare server is ensured by using a fingerprint feature called minutiae form, which refers to the fingerprint image of both sender and receiver. The computational and communicational cost of the proposed system is lesser when compared with other existing authentication methods.
Many Internet renovate supplier (ISPs) have organize peer-to-peer (P2P) hoard in their system in order to decrease valuable inter-ISP transfer. Capable heading question is important to the in general presentation of peer-to-peer (P2P) file contribution systems. Come together aristocracy by their extensive soothe can significantly get better the good quality association of file hesitation. Clustering aristocracy by their corporeal nearness can also get better file enquiry recital. P2P rose to successful profitable system in the internet. It represent the best embodiment of the end to end quarrel, the regularly doubtful plan philosophy that guide the intend of the internet. A work of fiction P2P architecture is planned which attaches ratings to the uploaded text directly. These ratings then develop into as score constituent in its XML statement which has quite a few youngster basics for in twist classification. Eventually, we communicate possible attack on the secrecy of these system and provide examples of demanding attack and martial protector second-hand by the organization we elucidate.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.