版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Department of Computer Science VISTAS Chennai 600117 India Department of Computer Science and Computer Applications Lakshmi Bangaru Arts and Science College Melmaruvathur 603 319 India
出 版 物:《SN Computer Science》 (SN COMPUT. SCI.)
年 卷 期:2024年第5卷第1期
页 面:26页
主 题:Blockchain Cloud computing Decentralized IoT Security Sensitive information Transmission Trust node behavioral rate
摘 要:Nowadays, IoT is growing rapidly and is a security concern as there are multiple security policy violations. Furthermore, blockchain development has grown rapidly since Bitcoin first became popular. IoT security issues can be solved by Blockchain. One way to achieve this is through the use of secure communication between IoT devices. Blockchain has emerged as one of the promising and most abundant technologies for security of cloud infrastructure. Blockchain is designed to store, read, and validate transactions within a distributed database system. Security and confidentiality can be enhanced with a distributed ledger that is shared across cloud nodes. In particular, it provides security through effective caching, encryption, and peer-aware sharing of generated hash values. Cloud computing is a centralized service in the financial sector that protects sensitive information and provides better security to protect personal data. Due to the lack of verified services and unauthorized access, compromised keys can damage important information. In this paper, we introduces the Hook Curve Master Node Key Authentication (HC-MNKA) to improve the security based on Shuffle Standard Padding Encryption Crypto Policy (S2PES) to solve the above issues. The proposed Pre-Ack decentralized chain link (P2PACD) algorithm is used to create new node transactions in the network. Furthermore, the Mutual Trust Node Behavioral Rate (MTNBR) algorithm is used to find network trust rates based on successive weight. Based on the trust rate, the hash index is created depending on the user policy to form a blockchain link. The Hook curve Master node Key authentication is applied to verify the transaction node to check if it’s a valid transaction node in the Network of Things. Security analysis shows that a decentralized blockchain network authenticates validation results, increasing transparency and security. © 2023, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.