In recent years, health applications based on the internet of medical things have exploded in popularity in smart cities (IoMT). Many real-time systems help both patients and professionals by allowing remote data access and appropriate responses. The major research problems include making timely medical judgments and efficiently managing massive data utilising IoT-based resources. Furthermore, in many proposed solutions, the dispersed nature of data processing openly raises the risk of information leakage and compromises network integrity. Medical sensors are burdened by such solutions, which reduce the stability of real-time transmission systems. As a result, this study provides a machine-learning approach with SDN-enabled security to forecast network resource usage and enhance sensor data delivery. With a low administration cost, the software define network (SDN) design allows the network to resist dangers among installed sensors. It provides an unsupervised machine learning approach that reduces IoT network communication overheads and uses dynamic measurements to anticipate link status and refines its tactics utilising SDN architecture. Finally, the SDN controller employs a security mechanism to efficiently regulate the consumption of IoT nodes while also protecting them against unidentified events. When the number of nodes and data production rate varies, the suggested approach enhances network speed. As a result, to organise the nodes in a cluster, the suggested model uses an iterative centroid technique. By balancing network demand via durable connections, the multihop transmission technique for routing IoT data improves speed while simultaneously lowering the energy hole problem.
Cloud computing provides a simplest way of data sharing, it provides various benefits to the users. But directly outsourcing the shared data to the cloud server will bring security issues as the data may contain valuable information. Hence, it is necessary to place cryptographically enhanced access control on the shared data, named Identity-based encryption to build a practical data sharing system. when some user's authorization is expired, there should be a mechanism that can remove him/her from the system. Consequently, the revoked user cannot access both the previously and subsequently shared data. Thus, we propose a notion called revocable-storage identity-based encryption (RS-IBE), which introducing the functionalities of user revocation and cipher text update simultaneously.Keywords: Revocation, Encryption, Key Exchange, Private key generator, cipher text. 1.INTRODUCTIONCloud computing is a model for enabling convenient, on demand network access to a shared pool of computing resources (eg. Networks,servers,storage and services).In the earliest stage of cloud computing security is provided by Certificate Based Encryption which encrypt the data based on certificate which is provided to the data user. Unauthorized user may duplicate the certificate which may lead to security issue. To overcome the issue, Identity Based Encryption replaces this technique. In which the user's id (name, email address, ip address, port number, etc.) is used to generate the keys which are used to encrypt the data. This does not provide security to data shared in cloud because the data is stored for a longer period by then the data is accessible to the third party very easily. To avoid this Identity Based Encryption With Efficient Revocation was introduced. In this approach the data provider can provide the life time of the key provided to the user. At the end of the life time the user can revoke the key with the help of central authority called Private Key Generator (PKG). After this Revocable Storage Identity Based Encryption is proposed, this provides both forward and backward security which is absent in previous technique. This technique allows the data provider to specify the life time of the data shared as well as the private key provided to the data user. Once this time expires the private key generator (pkg) is responsible for revoking the cipher text and private key of each user. This mechanism of providing security in both the ends is called as forward and backward security. LITERATURE SURVEY: 2.1CERTIFICATE-BASED ENCRYPTION:A certificate, namely a signature acts not only as a certificate but also as a decryption key. A key holder needs both its secret key and an up-to-date certificate from its CA to decrypt a message. Certificate-based encryption combines the best aspects of identitybased encryption and public key encryption. Certificate include at least the name of a user and its public key. Often, the certificate authority includes a serial number as well as the certificate issue date and expiration date. if ...
The actual meaning of Benami is without a name. The word "Benami" means buying property in the name of another person. However, when you are making a purchase, you are not purchasing a plot on your name. You are purchasing this plot on the name of close relatives. The property purchased like this will be considered as a Benami property. The holder of the property is known as benamidar. In this paper, we introduce an Uniform Cost Search algorithm for efficient searching of benamidar. The benamidar is a person who has the movable and immovable, tangible, intangible, any right or interest, or legal documents asserts of another person in their name. As such, even gold or financial securities including bank accounts could qualify to be Benami. To identify the benamidar, the details of Aadhar card, the details of PAN card, the details of asserts and details of Bank are filled and stored. The interlink of Aadhar card, PAN card, asserts and Bank account is done. The mining of details is done by generating family tree and by pruning the person is being extracted. Each property is linked with Aadhar card so that on examining the details will help to find the benamidar by the Income Tax Officer.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.