Sensing devices on the human chest are linked through the Internet of Medical Things (IoMT) to remotely monitor health data on multiple dimensions, including physiological and behavioural impulses. IoMT devices in cli...
详细信息
This paper deals the scalable, flexible, and cost-effective solutions. Distributed file systems play a crucial role in the design and evolution of cloud storage systems, enabling across multiple servers and data cente...
详细信息
The crime monitoring system is a unique and authentic project which functions with the concepts of block chain language. Blockchain technology has the potential to revolutionize the management of criminal records by p...
详细信息
Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracti...
详细信息
Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracting usersto outsource data in the cloud. However, users outsource data directly via cloudstage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographicsolution in a cloud environment, and can be drawn up for access control by dataowners (DO) to define access policy. Unfortunately, an outsourced architectureapplied with attribute-based encryption introduces numerous challenges, including revocation. This issue is a threat to the data security of DO. Furthermore,highly secure and flexible cipher text-based attribute access control with role hierarchy user grouping in cloud storage is implemented by extending the KUNodes(revocation) storage identity-based encryption. Result is evaluated using Cloudsim, and our algorithm outperforms in terms of computational cost by consuming32 MB for 150-MB files.
Ayurveda, a system of complementary medicine that has been used for centuries in India, aids in the early treatment of illnesses. Ayurvedic practitioners hold that space, air, fire, water, and earth are the five funda...
详细信息
The term "Internet of things (IoT) security"refers to the software industry concerned with protecting the IoT and connected devices. Internet of Things (IoT) is a network of devices connected with computers,...
详细信息
Localization in wireless sensor network (WSN) is an important issue since it helps to find the origin of the event. Many localization algorithms have been proposed and are efficient up to certain extent. Energy effici...
详细信息
The proliferation of deep fake technology presents a substantial peril to both individuals and society, underscoring the urgent requirement for the development of effective deep fake detection techniques. This study i...
详细信息
Nowadays, secure and reliable management of logistics is highly needed. Logistics is the delivery of goods from producers to legitimate consumers in accurate amounts and good conditions. The use of low-capable sensor ...
详细信息
Session recording is a valuable tool for developers to gain insights into user behavior in mobile applications. Android, as the most commonly used mobile operating system, offers developers several options for impleme...
详细信息
暂无评论