IOT-CENTRIC DATA PROTECTION USING DEEP LEARNING TECHNIQUE FOR PRESERVING SECURITY AND PRIVACY IN CLOUD
Journal Title: International Journal of Data Science and Artificial Intelligence - Year 2024, Vol 2, Issue 03
Abstract
The Internet of Things (IoT) describes a system where interconnected physical objects are connected online. As the collection and sharing of vast amounts of personal data grow, so do concerns over user privacy within IoT environments. While IoT devices offer significant advantages in terms of productivity, accuracy, and financial benefits by minimizing human intervention and providing exceptional flexibility and convenience, they also face challenges related to communication overhead, security, and privacy. To address these issues, a novel Internet of Things-based Cloud Information Security Preservation (IoT-CISP) has been proposed. This approach enhances the model’s effectiveness and ensures security by first separating sensitive data from nonsensitive data using an SVM classifier, and then employing this data for partial decryption and analysis. Sensitive data is protected through Okamoto-Uchiyama encryption, ensuring that data storage, analysis, and sharing are conducted securely to maintain the system’s safety and privacy. The effectiveness of this novel method was assessed against existing methodologies using parameters like precision, accuracy, F1 score, and recall, revealing its superior security and efficiency compared to other schemes. Results demonstrate that the IoTCISP approach offers encryption times that are 31.24%, 23.12%, and 33.03% shorter than those of the CP-ABE, GDBR, and HP-CPABE algorithms, respectively.
Authors and Affiliations
C. Senthil Singh, Sameena Naaz and G. Saranya
C-AVPSO: DYNAMIC LOAD BALANCING USING AFRICAN VULTURE PARTICLE SWARM OPTIMIZATION
Cloud computing is a novel technology that allows consumers to access services from anywhere, at any time, under different conditions, and is controlled by a third-party cloud provider. Cloud task scheduling is a complic...
SEMANTIC FEATURE ENABLED AGGLOMERATIVE CLUSTERING FOR INFORMATION TECHNOLOGY JOB PROFILE ANALYSIS
The maintenance and implementation of computer systems are the core activities of information technology. Database administration and network architecture are also included in information technology. Professionals have a...
DEEP LEARNING BASED WEARABLE DEVICE FOR OLDER PEOPLE MONITORINGSYSTEM
Activity recognition (AR) systems for older people are common in residential health care settings such as hospitals and nursing homes, thus numerous methodologies and studies have been developed to improve the effectiven...
SAREE TEXTURE ANALYSIS AND CLSSIFICATION VIA DEEP LEARNING FRAMEWORK
Indian women have worn sarees for centuries and have a significant market share in their clothing. Despite the ability to identify saree materials with tactile texture and the possibility to purchase online, it may not a...
DEEP REINFORCEMENT LEARNING BASED REAL TIME VIOLENCE DETECTION
In recent days violence is rampant, and the violence that occurs in public places is considered trembling violence in this study. To avert these anomalous activities, a real-time violence identification model is required...