Currently, healthcare services are encountering challenges, particularly in developing countries wherein remote areas encounter a lack of highly developed hospitals and doctors. IoT devices produce enormous security-s...
详细信息
Currently, healthcare services are encountering challenges, particularly in developing countries wherein remote areas encounter a lack of highly developed hospitals and doctors. IoT devices produce enormous security-sensitive data;therefore, device security is considered an important concept. The main aim of this work is to formulate a secure key generation process in the data-sharing approach by exploiting the rider horse herd optimization algorithm (RHHO). Here, eight phases, like the initialization phase, registration phase, key generation phase, login phase, data protection phase, authentication phase, verification phase, and data decryption phase are exploited for secure and efficient authentication and multimedia data sharing. The proposed RHHO model is the integration of the rideroptimizationalgorithm (ROA) and horseherdoptimizationalgorithm (HOA). The proposed RHHO model achieved enhanced performance with a computation cost of 0.235, an accuracy of 0.935and memory usage of 2.425 MB.
ABSTRACTCurrently, healthcare services are encountering challenges, particularly in developing countries wherein remote areas encounter a lack of highly developed hospitals and doctors. IoT devices produce enormous se...
详细信息
ABSTRACTCurrently, healthcare services are encountering challenges, particularly in developing countries wherein remote areas encounter a lack of highly developed hospitals and doctors. IoT devices produce enormous security-sensitive data; therefore, device security is considered an important concept. The main aim of this work is to formulate a secure key generation process in the data-sharing approach by exploiting the rider horse herd optimization algorithm (RHHO). Here, eight phases, like the initialization phase, registration phase, key generation phase, login phase, data protection phase, authentication phase, verification phase, and data decryption phase are exploited for secure and efficient authentication and multimedia data sharing. The proposed RHHO model is the integration of the rideroptimizationalgorithm (ROA) and horseherdoptimizationalgorithm (HOA). The proposed RHHO model achieved enhanced performance with a computation cost of 0.235, an accuracy of 0.935and memory usage of 2.425 MB.
暂无评论