2022
DOI: 10.1016/j.measen.2022.100486
|View full text |Cite
|
Sign up to set email alerts
|

Service Constraint NCBQ trust orient secure transmission with IoT devices for improved data security in cloud using blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Adequate technique for identifying cyber intrusion is introduced in [52]. An efficient service constraint network condition and behavior quality (NCBQ) scheme is proposed in [53] to include the secure transmission by utilizing different factors of network, user behavior and quality of service. A block chain-based identity authentication system (IAS) protocol is performed in [54] to ensure the authenticity and security of data transmission in CC.…”
Section: Related Workmentioning
confidence: 99%
“…Adequate technique for identifying cyber intrusion is introduced in [52]. An efficient service constraint network condition and behavior quality (NCBQ) scheme is proposed in [53] to include the secure transmission by utilizing different factors of network, user behavior and quality of service. A block chain-based identity authentication system (IAS) protocol is performed in [54] to ensure the authenticity and security of data transmission in CC.…”
Section: Related Workmentioning
confidence: 99%
“…The findings of the deep blockchain framework (DBF) presented in [ 25 ], which uses Bi-LSTM to categorize attack traffic in the BoT-IoT dataset, were compared with those of our own suggested method. Figure 11 gives a comparison of the recall rate of several attack sub-categories.…”
Section: Experimental Implementationmentioning
confidence: 99%
“…CC performs data sharing that allows the user to access the data, services, links, storage, and applications through the internet (Joshi et al, 2021). The data is uploaded into the cloud by the data owner for future access and the user downloads it in the process of CC (Premkumar & Priya, 2022). However, there exist some threats, including data loss, accidental exposure, and leakage, thus resulting in security issues (Ali et al, 2023).…”
mentioning
confidence: 99%