SlideShare a Scribd company logo
1 of 9
Download to read offline
Irish Interdisciplinary Journal of Science & Research (IIJSR)
Vol.6, Iss.2, Pages 131-139, April-June 2022
ISSN: 2582-3981 www.iijsr.com
131
Secure Data Transmission using IBOOS in VANET
Priyadharshini S.V.1
, Deepika Shree K2
, Gana Sudha V3
& Manibharathi N4
1
Assistant Professor, Department of Information Technology, Vivekanandha College of Technology for Women.
2-4
Student, Department of Information Technology, Vivekanandha College of Technology for Women.
DOI: http://doi.org/10.46759/IIJSR.2022.6217
Copyright © 2022 Priyadharshini S.V. et al. This is an open access article distributed under the terms of the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Article Received: 20 March 2022 Article Accepted: 25 May 2022 Article Published: 17 June 2022
Introduction
Conveyed registering is the on-demand openness of PC system resources, especially data amassing
(appropriated capacity) and figuring power, without direct unique organization by the client. The term is all
around used to depict server ranches open to various clients over the Internet. Gigantic fogs, overpowering
today, every now and again have limits passed on over various regions from central laborers. If the
relationship with the client is reasonably close, it may be allotted an edge specialist. Fogs may be limited to a
lone affiliation (try fogs), or be open to various affiliations (public cloud).
Conveyed processing relies upon sharing of resources for achieve comprehensibility and economies of scale.
Promoters of public and crossbreed fogs note that circulated registering licenses associations to avoid or
restrict ahead of time IT system costs. Advocates furthermore ensure that circulated processing licenses dares
to prepare their applications for activity speedier, with further developed reasonableness and less help, and
that it engages IT gatherings to even more rapidly change resources for fulfill fluctuating and surprising need,
giving the burst enrolling capacity: high figuring power at explicit seasons of zenith interest. Cloud providers
usually use a "pay-all the more just as expenses emerge" model, which can provoke unanticipated working
expenses in the event that chiefs are not familiar with cloud-assessing models. The openness of high-limit
associations, ease PCs and limit contraptions similarly as the inevitable gathering of gear virtualization,
organization organized plan and autonomic and utility handling has provoked advancement in appropriated
figuring.
Distributed computing is an organization access model that intends to straightforwardly and pervasively share
countless registering assets. These are rented by a specialist co-op to computerized clients, typically through
the Internet. Because of the rising number of car crashes and disappointment of street clients in vehicular
organizations, the significant focal point of current arrangements given by canny transportation frameworks is
on further developing street security and guaranteeing traveler solace. Distributed computing advances can
possibly further develop street security and voyaging experience in ITSs by giving adaptable arrangements
ABSTRACT
Vehicular conveyed processing (VCC) is made from different circled vehicular fogs (VCs), which are outlined on-the-fly by intensely
consolidating underutilized vehicular resources including figuring force, accumulating, and so forth. Existing recommendation for lifestyle
as-a-organization (IDaaS) are not suitable for use in that frame of mind of confined handling resources and limit cutoff of introduced vehicle
devices. we at first propose an improved ciphertext-methodology trademark based encryption (CPABE) plot.
Irish Interdisciplinary Journal of Science & Research (IIJSR)
Vol.6, Iss.2, Pages 131-139, April-June 2022
ISSN: 2582-3981 www.iijsr.com
132
(i.e., elective courses, synchronization of traffic signals, and so on) required by different street wellbeing
entertainers like police, and catastrophe and crisis administrations. To further develop traffic security and
offer computational types of assistance to street clients, another distributed computing model called
VANET-Cloud applied to vehicular specially appointed networks is proposed. Different transportation
administrations given by VANET-Cloud are explored, and some future exploration bearings are featured,
including security and protection, information conglomeration, energy productivity, interoperability, and
asset the board.
Motivation
VANETs will have unique necessities of independent vehicles with high versatility, low inactivity,
continuous applications, and availability, which may not be settled by regular distributed computing. Thus,
converging of haze figuring with the traditional cloud for VANETs is talked about as a possible answer for a
long time in current and future VANETs. What's more, haze figuring can be improved by coordinating
Software-Defined Network (SDN), which gives adaptability, programmability, and worldwide information
on the organization.
Objective
To make the VANET correspondence all the more effectively. The RSU (street side unit) must be associated
with the server. To make the CP-ABE on IBOOS based way to deal with give profoundly productive
outcome.
Related Works
lightweight information sharing plan (LDSS) alongside Decisional q-Parallel Bilinear Diffie-Hellman
Exponent Assumption was utilized in the current framework With the reputation of dispersed registering,
PDAs can store/recuperate individual data from wherever at whatever point. Along these lines, the data
security issue in adaptable cloud ends up being progressively outrageous and hinders further headway of
compact cloud. There are liberal assessments that have been directed to further develop the cloud security. In
any case, most of them are not important for adaptable cloud since phones simply have limited figuring
resources and power. Courses of action with low computational upward are in fantastic necessity for
adaptable cloud applications.
Elliptic Curve Cryptography (ECC) is a way to deal with public-key cryptography, in light of the
arithmetical design of elliptic bends over limited fields. ECC requires a more modest key when contrasted
with non-ECC cryptography to give identical security (a 256-bit ECC security has comparable security
achieved by 3072-piece RSA cryptography).
For a superior comprehension of Elliptic Curve Cryptography, understanding the nuts and bolts of the
Elliptic Curve is vital. An elliptic bend is a planar logarithmic bend characterized by a situation of the
structure
y^2 = x^3 + hatchet + b
Irish Interdisciplinary Journal of Science & Research (IIJSR)
Vol.6, Iss.2, Pages 131-139, April-June 2022
ISSN: 2582-3981 www.iijsr.com
133
Where, 'a' is the co-effective of x and 'b' is the consistent of the situation.
The Diffie-Hellman calculation is being utilized to lay out a common mystery that can be utilized for secret
interchanges while trading information over a public organization utilizing the elliptic bend to create focuses
and get the mystery key utilizing the boundaries.
For effortlessness and down to earth execution of the calculation, we will think about just 4 factors, one
prime P and G (a crude foundation of P) and two private qualities an and b.
P and G are both openly accessible numbers. Clients (say Alice and Bob) pick private qualities an and b and
they produce a key and trade it freely. The contrary individual gets the key and that creates a mystery key,
after which they have a similar mystery key to encode.
Azzedine Boukerche, Robson E. De Grande et al., has proposed Intelligent transportation frameworks are
intended to give imaginative applications and administrations identifying with traffic the board, just as to
work with the admittance to data for different frameworks and clients. The convincing inspiration for
utilizing underutilized locally available assets for transportation frameworks and the headways in
administration innovation for Cloud figuring assets has advanced the idea of Vehicular Clouds. This work
assembles and portrays the latest methodologies and answers for Vehicular Clouds, including applications,
administrations, and traffic models that can empower Vehicular Cloud in a more powerful climate. We have
considered an enormous number of utilizations and administrations that showed importance in the extent of
the transportation framework, profiting its administration, drivers, travelers, and walkers.
Paul Dunphy and Fabien A.P. Petitcolas et al., has proposed Twenty-four years have passed since Peter
Steiner originally showed the world that "on the Internet, no one knows you're not kidding," yet that
celebrated attracting still stands to represent the test to recognize people on the web. Today, we are a long
way from the public registry vision of the designers of public-key cryptography during the 1970s or the
terrific plan of progressive confirmation visualized during the 1980s. Character the board (IdM) on the
Internet actually depends on what Cameron called 10 years prior a "interwoven of personality one-offs,"1
involving a few kinds of IdM frameworks that are limited to explicit spaces and don't collaborate much with
each other. Brought together models of IdM at present face difficulties because of the expanding routineness
of information breaks that lead to notoriety harm; character extortion; or more each of the, a deficiency of
protection for all concerned. These common occasions feature an absence of control and possession that end
clients experience with their advanced characters.
Mohamed Amine Ferrag, Makhlouf Derdour et al., has proposed This paper presents a complete overview of
the current blockchain conventions for the Internet of Things (IoT) organizations. We start by depicting the
blockchains and summing up the current studies that manage blockchain advancements. At that point, we
give an outline of the application spaces of blockchain advances in IoT, e.g., Internet of Vehicles, Internet of
Energy, Internet of Cloud, Fog registering, and so forth Also, we give an order of danger models, which are
considered by blockchain conventions in IoT organizations, into five principle classes, to be specific,
character based assaults, manipulation based assaults, cryptanalytic assaults, notoriety based assaults, and
Irish Interdisciplinary Journal of Science & Research (IIJSR)
Vol.6, Iss.2, Pages 131-139, April-June 2022
ISSN: 2582-3981 www.iijsr.com
134
administration based assaults. Furthermore, we give a scientific categorization and a next to each other
correlation of the cutting edge techniques towards secure and protection safeguarding blockchain
advancements concerning the blockchain model, explicit security objectives, execution, limits, calculation
intricacy, and correspondence overhead.
Proposed Methodology
Personality Based Online/Offline Digital Signature (IBOOS) is the proposed calculation that is used. In
request to expand the exhibition of WSNs we utilize a productive and valuable technique called bunching.
The study is worried about the safe information transmission for Cluster-based Wireless Sensor Networks
(CWSN). To accomplish energy ability we have presented two new Secure and Efficient Data Transmission
(SET) protocols. IBOOS which depends on the Identity-Based Digital Signature (IBS) plan and
Identity-Based Online/Offline Digital Signature (IBOOS) scheme which makes improvement to the current
lightweight CP-ABE scheme. To acknowledge secure access client, the data is scrambled by the superior
proposed technique and transferred to the VC as code text. Initially, the investment of believed authority is
diminished, which can diminish correspondence upward on both confided in power and each VC. There is a
focal regulator which contains the detail of content server, RSU(ROAD SIDE UNIT) subtleties and the
vehicle subtleties. As many number of control server can be produced with the rsu and the accessible
substance server id will be displayed in the regarded rsu form. These can be associated with the substance
server as the client required and the vehicle hub subtleties will be displayed in the rsu structure . information
replication should be possible in the vehicle as the closest rsu is accessible.
Irish Interdisciplinary Journal of Science & Research (IIJSR)
Vol.6, Iss.2, Pages 131-139, April-June 2022
ISSN: 2582-3981 www.iijsr.com
135
Encryption Module
CP-ABE based IBOOS plan chooses a lot of characteristics to each client. Every quality worth has a private
key. The encryptor fosters a procedure for deciphering. Clients whose attributes don't satisfy the technique
can't unscramble the ciphertext. Proposed a lightweight CP-ABE plot for flexible cloud helped digital actual
systems, which has three computations as follows. This computation is at risk for dispersing public limits
and keeping a specialist secret key securely for the whole system.
Encryption: This computation is obligated for creating the ciphertext through contributing the public limits,
data, and access procedure. By then the ciphertext is moved to the cloud. Unscrambling: This computation is
at risk for recovering the data with the ciphertext, expert secret key, and a lot of characteristics.
Central Controller Server
In the focal regulator module the rsu details, accessible substance server id, and the reaching the closest
vehicle through rsu every one of the subtleties can be kept up with. This module holds as the focal center as
the rsu goes under the substance server ,rsu id and the area id can be seen and made in the server. Information
replication in the vehicle likewise done in a piece of server. Software-characterized organizations can be
automatically designed, that is to say, network chairmen can compose their own SDN projects to arrange,
make due, secure, and streamline network assets through computerized scripts. For this, open and VANET
method are required, as we framed. The advantage of open application programming connection points
(APIs) is that a server secure is stayed away from. Through this reflection, it doesn't make any difference
which equipment is utilized, likewise to PCs.
Bi Linear Paring Module
The calculation of bilinear pairings has been viewed as the most costly activity in matching based
cryptographic conventions. In this paper, we initially propose a proficient and secure reevaluating
calculation for bilinear pairings in the two untrusted program model.
Contrasted and the cutting edge calculation, a distinctive property of our proposed calculation is that the
(asset obliged) outsourcer isn't expected to play out any costly activities, like point duplications or
exponentiations. Moreover, we use this calculation as a subroutine to accomplish re-appropriate secure
personality based encryptions and marks.
Data Replication Module
In this module the information replication is conceivable if the RSU in the vehicle adhoc network is more
précised and the each RSU has its own adhoc module where the copy records are recognized and the each
copy records are investigated. The records which are coordinated with the other rsu will distinguish the
information and the replication module. Every vehicle adhoc network in the rsu unit will deal with the
specific vehicle adhoc network. We can utilize the Database Replication module to import information from
existing data sets. Complex mappings over different table joins are additionally conceivable. You can
designed in the client or from Java.
Irish Interdisciplinary Journal of Science & Research (IIJSR)
Vol.6, Iss.2, Pages 131-139, April-June 2022
ISSN: 2582-3981 www.iijsr.com
136
Results
Trial investigation is indented to be useful to scientists from all fields to tentatively concentrate on
calculations. In light of the leaving work given in the Chapter 3 and on the proposed work given in the
Chapter 4, the outcomes are examined in this part through exploratory examination.
Computational Complexity (Time)
For any circle, we find out the runtime of the square inside them and increase it by the times the program will
rehash the circle. All circles that develop relatively to the info size make some direct memories intricacy
O(n). Assuming you circle through just 50% of the exhibit, that is still O(n), Time intricacy addresses the
times an assertion is executed.
The time intricacy of a calculation isn't the genuine time expected to execute a specific code, since that relies
upon different elements like anything the information, this will return in a fixed, limited time.
ALGORITHM Time (ms)
IBOOS 1250
DEFFIE
HELLMAN
2200
In the above intricacy the least runtime to execute the program was iboos calculation with the avg of 1250
ms, and the additional time taken to execute is deffie hellman.
Cryptography Cost
Encryption should be done consecutively both encryption and decoding can be parallelized. Accordingly, on
a VANET execution, iboos encryption and unscrambling is regularly quicker than existing technique and
less time with safer is created. As the encryption strategy is more productive in the proposed technique, the
rsu will be more proficient in information replication. This is estimated in number of bytes. More bytes
brings about safer.
TIME (ms),
IBOOS, 1250
TIME (ms),
DEFFIE
HELLMAN,
2200
Irish Interdisciplinary Journal of Science & Research (IIJSR)
Vol.6, Iss.2, Pages 131-139, April-June 2022
ISSN: 2582-3981 www.iijsr.com
137
ALGORITHM Cryptography cost (bytes)
IBOOS 145
DEFFIE HELLMAN 120
Storage Overhead
ALGORITHM Storage overhead (bits)
IBOOS 500
DEFFIE
HELLMAN
6789
Cryptography
cost(bytes),
IBOOS, 145
Cryptography
cost(bytes),
DEFFIE
HELLMAN, 120
IBOOS
DEFFIE
HELLMAN
Storage
overhead(),
IBOOS, 500
Storage
overhead(),
DEFFIE
HELLMAN,
6789
Storage overhead (bits)
IBOOS
DEFFIE
HELLMAN
Irish Interdisciplinary Journal of Science & Research (IIJSR)
Vol.6, Iss.2, Pages 131-139, April-June 2022
ISSN: 2582-3981 www.iijsr.com
138
Communication Complexity
ALGORITHM
Communication
complexity (bits)
IBOOS 6
DEFFIE
HELLMAN
49
Conclusion
In this paper, we proposed a compelling information access control CP-ABE plan to divide information
between different application service suppliers and distributed storage frameworks for vehicles in a VANET.
Our plan gives both client and trait renouncements by different characteristics. We likewise utilized cloud
compute hubs to share the computational heap of encryption and unscrambling to offer help for asset obliged
gadgets; this approach makes CP-ABE careful the IBOOS more reasonable for VANETs.
Through the far reaching security investigation and experimental evaluation results, we show that our answer
maintains user protection as well as is secure against different assaults. Moreover, our plot ensures both
versatility and effectiveness. In future work, we will test our plan in a true climate and measure latencies
between substances.
Future Works
Research study is the finished top to bottom examination on a particular region. The exploration work will
affect the future work and a continuous action goes on and on forever. This exploration work can be improved
in the future with the accompanying extensions:
(1) The VANET can be carried out through the 5G gadgets and organization
(2) Enormous measure of VANET and MANET can be executed through the system.
Communication
complexity (bits),
IBOOS, 6
Communication
complexity (bits),
DEFFIE HELLMAN,
49
IBOOS
DEFFIE
HELLMAN
Irish Interdisciplinary Journal of Science & Research (IIJSR)
Vol.6, Iss.2, Pages 131-139, April-June 2022
ISSN: 2582-3981 www.iijsr.com
139
Declarations
Source of Funding
This research did not receive any grant from funding agencies in the public or not-for-profit sectors.
Consent for publication
Authors declare that they consented for the publication of this research work.
References
[1] Boukerche and E. Robson, "Vehicular distributed computing: Architectures, applications, and
portability," Computer organizations, vol. 135, pp. 171–189, 2018.
[2] P. Dunphy and F. A. Petitcolas, "A first glance at personality the board plans on the blockchain," IEEE
Security and Privacy, vol. 16, no. 4, pp. 20–29, 2018.
[3] M. A. Ferrag, M. Derdour, M. Mukherjee, A. Derhab, L. Maglaras, and H. Janicke, "Blockchain advances
for the web of things: Research issues and difficulties," IEEE Internet of Things Journal, vol. 6, no. 2, pp.
2188–2204, 2018.
[4] T. H. Vo, W. Fuhrmann, and K.- P. Fischer-Hellmann, "Privacy preserving client character in
Identity-as-a-Service," in 2018 21st Conference on Innovation in Clouds, Internet and Networks and
Workshops (ICIN). IEEE, 2018, pp. 1–8.
[5] X. Zhu and Y. Badr, "Character the executives frameworks for the Internet of Things: A study towards
blockchain arrangements," Sensors, vol. 18, no. 12, p. 4215, 2018.
[6] Q. He, N. Zhang, Y. Wei, and Y. Zhang, "Lightweight property based encryption conspire for versatile
cloud helped digital actual frameworks," Computer Networks, vol. 140, pp. 163–173, 2018.
[7] K. Bian, G. Zhang, and L. Tune, "Toward secure group detecting in vehicle-to-everything organizations,"
IEEE Network, vol. 32, no. 2, pp. 126–131, 2017.
[8] H. Vranken, "Manageability of Bitcoin and blockchains," Current assessment in ecological
maintainability, vol. 28, pp. 1–9, 2017.
[9] G. Kappes, A. Hatzieleftheriou, and V. S. Anastasiadis, "Multitenant access control for cloud-mindful
conveyed file systems," IEEE Trans. Reliable and Secure Computing, 2017.
[10] J.- H. Lee, "BIDaaS: Blockchain based ID as an assistance," IEEE Access, vol. 6, pp. 2274–2278, 2017.

More Related Content

Similar to Secure Data Transmission using IBOOS in VANET

TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud SystemsHong-Linh Truong
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing surveyIAESIJEECS
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Blockchain Based Car Rental App
Blockchain Based Car Rental AppBlockchain Based Car Rental App
Blockchain Based Car Rental AppIRJET Journal
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformSamuel Borthwick
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemConference Papers
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
EMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid CloudEMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid CloudAi-Ling See
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 

Similar to Secure Data Transmission using IBOOS in VANET (20)

TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud Systems
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
B017660813
B017660813B017660813
B017660813
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Blockchain Based Car Rental App
Blockchain Based Car Rental AppBlockchain Based Car Rental App
Blockchain Based Car Rental App
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
 
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKETCLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Cloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing Seminar
Cloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing SeminarCloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing Seminar
Cloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing Seminar
 
EMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid CloudEMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid Cloud
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 

More from Associate Professor in VSB Coimbatore

Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...Associate Professor in VSB Coimbatore
 
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Associate Professor in VSB Coimbatore
 
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...Associate Professor in VSB Coimbatore
 
A Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionA Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionAssociate Professor in VSB Coimbatore
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Associate Professor in VSB Coimbatore
 
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...Associate Professor in VSB Coimbatore
 
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...Associate Professor in VSB Coimbatore
 
A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...Associate Professor in VSB Coimbatore
 
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Associate Professor in VSB Coimbatore
 
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Associate Professor in VSB Coimbatore
 
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Associate Professor in VSB Coimbatore
 
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Associate Professor in VSB Coimbatore
 
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Associate Professor in VSB Coimbatore
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal Associate Professor in VSB Coimbatore
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal Associate Professor in VSB Coimbatore
 
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Associate Professor in VSB Coimbatore
 

More from Associate Professor in VSB Coimbatore (20)

Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
 
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
 
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
 
A Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionA Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee Retention
 
Digital Planting Pot for Smart Irrigation
Digital Planting Pot for Smart Irrigation  Digital Planting Pot for Smart Irrigation
Digital Planting Pot for Smart Irrigation
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
 
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
 
A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...
 
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
 
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
 
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, NigeriaEcological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
 
Mass & Quark Symmetry
Mass & Quark SymmetryMass & Quark Symmetry
Mass & Quark Symmetry
 
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
 
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
 
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal
 
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
 
Hepatitis and its Transmission Through Needlestick Injuries
Hepatitis and its Transmission Through Needlestick Injuries Hepatitis and its Transmission Through Needlestick Injuries
Hepatitis and its Transmission Through Needlestick Injuries
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 

Secure Data Transmission using IBOOS in VANET

  • 1. Irish Interdisciplinary Journal of Science & Research (IIJSR) Vol.6, Iss.2, Pages 131-139, April-June 2022 ISSN: 2582-3981 www.iijsr.com 131 Secure Data Transmission using IBOOS in VANET Priyadharshini S.V.1 , Deepika Shree K2 , Gana Sudha V3 & Manibharathi N4 1 Assistant Professor, Department of Information Technology, Vivekanandha College of Technology for Women. 2-4 Student, Department of Information Technology, Vivekanandha College of Technology for Women. DOI: http://doi.org/10.46759/IIJSR.2022.6217 Copyright © 2022 Priyadharshini S.V. et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Article Received: 20 March 2022 Article Accepted: 25 May 2022 Article Published: 17 June 2022 Introduction Conveyed registering is the on-demand openness of PC system resources, especially data amassing (appropriated capacity) and figuring power, without direct unique organization by the client. The term is all around used to depict server ranches open to various clients over the Internet. Gigantic fogs, overpowering today, every now and again have limits passed on over various regions from central laborers. If the relationship with the client is reasonably close, it may be allotted an edge specialist. Fogs may be limited to a lone affiliation (try fogs), or be open to various affiliations (public cloud). Conveyed processing relies upon sharing of resources for achieve comprehensibility and economies of scale. Promoters of public and crossbreed fogs note that circulated registering licenses associations to avoid or restrict ahead of time IT system costs. Advocates furthermore ensure that circulated processing licenses dares to prepare their applications for activity speedier, with further developed reasonableness and less help, and that it engages IT gatherings to even more rapidly change resources for fulfill fluctuating and surprising need, giving the burst enrolling capacity: high figuring power at explicit seasons of zenith interest. Cloud providers usually use a "pay-all the more just as expenses emerge" model, which can provoke unanticipated working expenses in the event that chiefs are not familiar with cloud-assessing models. The openness of high-limit associations, ease PCs and limit contraptions similarly as the inevitable gathering of gear virtualization, organization organized plan and autonomic and utility handling has provoked advancement in appropriated figuring. Distributed computing is an organization access model that intends to straightforwardly and pervasively share countless registering assets. These are rented by a specialist co-op to computerized clients, typically through the Internet. Because of the rising number of car crashes and disappointment of street clients in vehicular organizations, the significant focal point of current arrangements given by canny transportation frameworks is on further developing street security and guaranteeing traveler solace. Distributed computing advances can possibly further develop street security and voyaging experience in ITSs by giving adaptable arrangements ABSTRACT Vehicular conveyed processing (VCC) is made from different circled vehicular fogs (VCs), which are outlined on-the-fly by intensely consolidating underutilized vehicular resources including figuring force, accumulating, and so forth. Existing recommendation for lifestyle as-a-organization (IDaaS) are not suitable for use in that frame of mind of confined handling resources and limit cutoff of introduced vehicle devices. we at first propose an improved ciphertext-methodology trademark based encryption (CPABE) plot.
  • 2. Irish Interdisciplinary Journal of Science & Research (IIJSR) Vol.6, Iss.2, Pages 131-139, April-June 2022 ISSN: 2582-3981 www.iijsr.com 132 (i.e., elective courses, synchronization of traffic signals, and so on) required by different street wellbeing entertainers like police, and catastrophe and crisis administrations. To further develop traffic security and offer computational types of assistance to street clients, another distributed computing model called VANET-Cloud applied to vehicular specially appointed networks is proposed. Different transportation administrations given by VANET-Cloud are explored, and some future exploration bearings are featured, including security and protection, information conglomeration, energy productivity, interoperability, and asset the board. Motivation VANETs will have unique necessities of independent vehicles with high versatility, low inactivity, continuous applications, and availability, which may not be settled by regular distributed computing. Thus, converging of haze figuring with the traditional cloud for VANETs is talked about as a possible answer for a long time in current and future VANETs. What's more, haze figuring can be improved by coordinating Software-Defined Network (SDN), which gives adaptability, programmability, and worldwide information on the organization. Objective To make the VANET correspondence all the more effectively. The RSU (street side unit) must be associated with the server. To make the CP-ABE on IBOOS based way to deal with give profoundly productive outcome. Related Works lightweight information sharing plan (LDSS) alongside Decisional q-Parallel Bilinear Diffie-Hellman Exponent Assumption was utilized in the current framework With the reputation of dispersed registering, PDAs can store/recuperate individual data from wherever at whatever point. Along these lines, the data security issue in adaptable cloud ends up being progressively outrageous and hinders further headway of compact cloud. There are liberal assessments that have been directed to further develop the cloud security. In any case, most of them are not important for adaptable cloud since phones simply have limited figuring resources and power. Courses of action with low computational upward are in fantastic necessity for adaptable cloud applications. Elliptic Curve Cryptography (ECC) is a way to deal with public-key cryptography, in light of the arithmetical design of elliptic bends over limited fields. ECC requires a more modest key when contrasted with non-ECC cryptography to give identical security (a 256-bit ECC security has comparable security achieved by 3072-piece RSA cryptography). For a superior comprehension of Elliptic Curve Cryptography, understanding the nuts and bolts of the Elliptic Curve is vital. An elliptic bend is a planar logarithmic bend characterized by a situation of the structure y^2 = x^3 + hatchet + b
  • 3. Irish Interdisciplinary Journal of Science & Research (IIJSR) Vol.6, Iss.2, Pages 131-139, April-June 2022 ISSN: 2582-3981 www.iijsr.com 133 Where, 'a' is the co-effective of x and 'b' is the consistent of the situation. The Diffie-Hellman calculation is being utilized to lay out a common mystery that can be utilized for secret interchanges while trading information over a public organization utilizing the elliptic bend to create focuses and get the mystery key utilizing the boundaries. For effortlessness and down to earth execution of the calculation, we will think about just 4 factors, one prime P and G (a crude foundation of P) and two private qualities an and b. P and G are both openly accessible numbers. Clients (say Alice and Bob) pick private qualities an and b and they produce a key and trade it freely. The contrary individual gets the key and that creates a mystery key, after which they have a similar mystery key to encode. Azzedine Boukerche, Robson E. De Grande et al., has proposed Intelligent transportation frameworks are intended to give imaginative applications and administrations identifying with traffic the board, just as to work with the admittance to data for different frameworks and clients. The convincing inspiration for utilizing underutilized locally available assets for transportation frameworks and the headways in administration innovation for Cloud figuring assets has advanced the idea of Vehicular Clouds. This work assembles and portrays the latest methodologies and answers for Vehicular Clouds, including applications, administrations, and traffic models that can empower Vehicular Cloud in a more powerful climate. We have considered an enormous number of utilizations and administrations that showed importance in the extent of the transportation framework, profiting its administration, drivers, travelers, and walkers. Paul Dunphy and Fabien A.P. Petitcolas et al., has proposed Twenty-four years have passed since Peter Steiner originally showed the world that "on the Internet, no one knows you're not kidding," yet that celebrated attracting still stands to represent the test to recognize people on the web. Today, we are a long way from the public registry vision of the designers of public-key cryptography during the 1970s or the terrific plan of progressive confirmation visualized during the 1980s. Character the board (IdM) on the Internet actually depends on what Cameron called 10 years prior a "interwoven of personality one-offs,"1 involving a few kinds of IdM frameworks that are limited to explicit spaces and don't collaborate much with each other. Brought together models of IdM at present face difficulties because of the expanding routineness of information breaks that lead to notoriety harm; character extortion; or more each of the, a deficiency of protection for all concerned. These common occasions feature an absence of control and possession that end clients experience with their advanced characters. Mohamed Amine Ferrag, Makhlouf Derdour et al., has proposed This paper presents a complete overview of the current blockchain conventions for the Internet of Things (IoT) organizations. We start by depicting the blockchains and summing up the current studies that manage blockchain advancements. At that point, we give an outline of the application spaces of blockchain advances in IoT, e.g., Internet of Vehicles, Internet of Energy, Internet of Cloud, Fog registering, and so forth Also, we give an order of danger models, which are considered by blockchain conventions in IoT organizations, into five principle classes, to be specific, character based assaults, manipulation based assaults, cryptanalytic assaults, notoriety based assaults, and
  • 4. Irish Interdisciplinary Journal of Science & Research (IIJSR) Vol.6, Iss.2, Pages 131-139, April-June 2022 ISSN: 2582-3981 www.iijsr.com 134 administration based assaults. Furthermore, we give a scientific categorization and a next to each other correlation of the cutting edge techniques towards secure and protection safeguarding blockchain advancements concerning the blockchain model, explicit security objectives, execution, limits, calculation intricacy, and correspondence overhead. Proposed Methodology Personality Based Online/Offline Digital Signature (IBOOS) is the proposed calculation that is used. In request to expand the exhibition of WSNs we utilize a productive and valuable technique called bunching. The study is worried about the safe information transmission for Cluster-based Wireless Sensor Networks (CWSN). To accomplish energy ability we have presented two new Secure and Efficient Data Transmission (SET) protocols. IBOOS which depends on the Identity-Based Digital Signature (IBS) plan and Identity-Based Online/Offline Digital Signature (IBOOS) scheme which makes improvement to the current lightweight CP-ABE scheme. To acknowledge secure access client, the data is scrambled by the superior proposed technique and transferred to the VC as code text. Initially, the investment of believed authority is diminished, which can diminish correspondence upward on both confided in power and each VC. There is a focal regulator which contains the detail of content server, RSU(ROAD SIDE UNIT) subtleties and the vehicle subtleties. As many number of control server can be produced with the rsu and the accessible substance server id will be displayed in the regarded rsu form. These can be associated with the substance server as the client required and the vehicle hub subtleties will be displayed in the rsu structure . information replication should be possible in the vehicle as the closest rsu is accessible.
  • 5. Irish Interdisciplinary Journal of Science & Research (IIJSR) Vol.6, Iss.2, Pages 131-139, April-June 2022 ISSN: 2582-3981 www.iijsr.com 135 Encryption Module CP-ABE based IBOOS plan chooses a lot of characteristics to each client. Every quality worth has a private key. The encryptor fosters a procedure for deciphering. Clients whose attributes don't satisfy the technique can't unscramble the ciphertext. Proposed a lightweight CP-ABE plot for flexible cloud helped digital actual systems, which has three computations as follows. This computation is at risk for dispersing public limits and keeping a specialist secret key securely for the whole system. Encryption: This computation is obligated for creating the ciphertext through contributing the public limits, data, and access procedure. By then the ciphertext is moved to the cloud. Unscrambling: This computation is at risk for recovering the data with the ciphertext, expert secret key, and a lot of characteristics. Central Controller Server In the focal regulator module the rsu details, accessible substance server id, and the reaching the closest vehicle through rsu every one of the subtleties can be kept up with. This module holds as the focal center as the rsu goes under the substance server ,rsu id and the area id can be seen and made in the server. Information replication in the vehicle likewise done in a piece of server. Software-characterized organizations can be automatically designed, that is to say, network chairmen can compose their own SDN projects to arrange, make due, secure, and streamline network assets through computerized scripts. For this, open and VANET method are required, as we framed. The advantage of open application programming connection points (APIs) is that a server secure is stayed away from. Through this reflection, it doesn't make any difference which equipment is utilized, likewise to PCs. Bi Linear Paring Module The calculation of bilinear pairings has been viewed as the most costly activity in matching based cryptographic conventions. In this paper, we initially propose a proficient and secure reevaluating calculation for bilinear pairings in the two untrusted program model. Contrasted and the cutting edge calculation, a distinctive property of our proposed calculation is that the (asset obliged) outsourcer isn't expected to play out any costly activities, like point duplications or exponentiations. Moreover, we use this calculation as a subroutine to accomplish re-appropriate secure personality based encryptions and marks. Data Replication Module In this module the information replication is conceivable if the RSU in the vehicle adhoc network is more précised and the each RSU has its own adhoc module where the copy records are recognized and the each copy records are investigated. The records which are coordinated with the other rsu will distinguish the information and the replication module. Every vehicle adhoc network in the rsu unit will deal with the specific vehicle adhoc network. We can utilize the Database Replication module to import information from existing data sets. Complex mappings over different table joins are additionally conceivable. You can designed in the client or from Java.
  • 6. Irish Interdisciplinary Journal of Science & Research (IIJSR) Vol.6, Iss.2, Pages 131-139, April-June 2022 ISSN: 2582-3981 www.iijsr.com 136 Results Trial investigation is indented to be useful to scientists from all fields to tentatively concentrate on calculations. In light of the leaving work given in the Chapter 3 and on the proposed work given in the Chapter 4, the outcomes are examined in this part through exploratory examination. Computational Complexity (Time) For any circle, we find out the runtime of the square inside them and increase it by the times the program will rehash the circle. All circles that develop relatively to the info size make some direct memories intricacy O(n). Assuming you circle through just 50% of the exhibit, that is still O(n), Time intricacy addresses the times an assertion is executed. The time intricacy of a calculation isn't the genuine time expected to execute a specific code, since that relies upon different elements like anything the information, this will return in a fixed, limited time. ALGORITHM Time (ms) IBOOS 1250 DEFFIE HELLMAN 2200 In the above intricacy the least runtime to execute the program was iboos calculation with the avg of 1250 ms, and the additional time taken to execute is deffie hellman. Cryptography Cost Encryption should be done consecutively both encryption and decoding can be parallelized. Accordingly, on a VANET execution, iboos encryption and unscrambling is regularly quicker than existing technique and less time with safer is created. As the encryption strategy is more productive in the proposed technique, the rsu will be more proficient in information replication. This is estimated in number of bytes. More bytes brings about safer. TIME (ms), IBOOS, 1250 TIME (ms), DEFFIE HELLMAN, 2200
  • 7. Irish Interdisciplinary Journal of Science & Research (IIJSR) Vol.6, Iss.2, Pages 131-139, April-June 2022 ISSN: 2582-3981 www.iijsr.com 137 ALGORITHM Cryptography cost (bytes) IBOOS 145 DEFFIE HELLMAN 120 Storage Overhead ALGORITHM Storage overhead (bits) IBOOS 500 DEFFIE HELLMAN 6789 Cryptography cost(bytes), IBOOS, 145 Cryptography cost(bytes), DEFFIE HELLMAN, 120 IBOOS DEFFIE HELLMAN Storage overhead(), IBOOS, 500 Storage overhead(), DEFFIE HELLMAN, 6789 Storage overhead (bits) IBOOS DEFFIE HELLMAN
  • 8. Irish Interdisciplinary Journal of Science & Research (IIJSR) Vol.6, Iss.2, Pages 131-139, April-June 2022 ISSN: 2582-3981 www.iijsr.com 138 Communication Complexity ALGORITHM Communication complexity (bits) IBOOS 6 DEFFIE HELLMAN 49 Conclusion In this paper, we proposed a compelling information access control CP-ABE plan to divide information between different application service suppliers and distributed storage frameworks for vehicles in a VANET. Our plan gives both client and trait renouncements by different characteristics. We likewise utilized cloud compute hubs to share the computational heap of encryption and unscrambling to offer help for asset obliged gadgets; this approach makes CP-ABE careful the IBOOS more reasonable for VANETs. Through the far reaching security investigation and experimental evaluation results, we show that our answer maintains user protection as well as is secure against different assaults. Moreover, our plot ensures both versatility and effectiveness. In future work, we will test our plan in a true climate and measure latencies between substances. Future Works Research study is the finished top to bottom examination on a particular region. The exploration work will affect the future work and a continuous action goes on and on forever. This exploration work can be improved in the future with the accompanying extensions: (1) The VANET can be carried out through the 5G gadgets and organization (2) Enormous measure of VANET and MANET can be executed through the system. Communication complexity (bits), IBOOS, 6 Communication complexity (bits), DEFFIE HELLMAN, 49 IBOOS DEFFIE HELLMAN
  • 9. Irish Interdisciplinary Journal of Science & Research (IIJSR) Vol.6, Iss.2, Pages 131-139, April-June 2022 ISSN: 2582-3981 www.iijsr.com 139 Declarations Source of Funding This research did not receive any grant from funding agencies in the public or not-for-profit sectors. Consent for publication Authors declare that they consented for the publication of this research work. References [1] Boukerche and E. Robson, "Vehicular distributed computing: Architectures, applications, and portability," Computer organizations, vol. 135, pp. 171–189, 2018. [2] P. Dunphy and F. A. Petitcolas, "A first glance at personality the board plans on the blockchain," IEEE Security and Privacy, vol. 16, no. 4, pp. 20–29, 2018. [3] M. A. Ferrag, M. Derdour, M. Mukherjee, A. Derhab, L. Maglaras, and H. Janicke, "Blockchain advances for the web of things: Research issues and difficulties," IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2188–2204, 2018. [4] T. H. Vo, W. Fuhrmann, and K.- P. Fischer-Hellmann, "Privacy preserving client character in Identity-as-a-Service," in 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN). IEEE, 2018, pp. 1–8. [5] X. Zhu and Y. Badr, "Character the executives frameworks for the Internet of Things: A study towards blockchain arrangements," Sensors, vol. 18, no. 12, p. 4215, 2018. [6] Q. He, N. Zhang, Y. Wei, and Y. Zhang, "Lightweight property based encryption conspire for versatile cloud helped digital actual frameworks," Computer Networks, vol. 140, pp. 163–173, 2018. [7] K. Bian, G. Zhang, and L. Tune, "Toward secure group detecting in vehicle-to-everything organizations," IEEE Network, vol. 32, no. 2, pp. 126–131, 2017. [8] H. Vranken, "Manageability of Bitcoin and blockchains," Current assessment in ecological maintainability, vol. 28, pp. 1–9, 2017. [9] G. Kappes, A. Hatzieleftheriou, and V. S. Anastasiadis, "Multitenant access control for cloud-mindful conveyed file systems," IEEE Trans. Reliable and Secure Computing, 2017. [10] J.- H. Lee, "BIDaaS: Blockchain based ID as an assistance," IEEE Access, vol. 6, pp. 2274–2278, 2017.