EFFICIENT DATA SEARCH AND RETRIEVAL IN CLOUD ASSISTED IOT ENVIRONMENT
Journal Title: International Journal of Data Science and Artificial Intelligence - Year 2024, Vol 2, Issue 01
Abstract
Internet of Things (IoT) is expanding across a number of industries, including the medical field. Such a scenario might easily reveal sensitive information, such as private digital medical records, presenting potential security issues. Symmetric Searchable Encryption has been widely considered due to its promise to allow well-organized search on encoded data. Nevertheless, most SSE techniques ignore malicious cloud servers and need the data owner to provide the entire key in order to query users. In this paper, a novel technique has been proposed to solve these restrictions. Normalization, tokenization, word removal and stemming are used for preprocessing the data from the data owner and preprocessed data is divided into k-number of clusters using k-means clustering algorithm. The clustered data is encrypted using a Damgard-Jurik encryption algorithm. The efficiency of the proposed P2ADS technique has been determined using assessment metrics such as accuracy, encryption time, and decryption time. The proposed method's decryption time is 7.56%, 5.01%, 4.41%, and 3.50% quicker than that of the existing VPSL, ABKS, PERT, and PP-DSA methods respectively.
Authors and Affiliations
K. Paul Joshua and A. Jenice Prabhu
SELECTIVE FORWARDING ATTACKS DETECTION IN WIRELESS SENSOR NETWORKS USING BLUE MONKEY OPTIMIZED GHOST NETWORK
Wireless Sensor Networks (WSNs) are increasingly the technology of choice due to their wide applicability in both military and civilian domains. The selective forwarding attack, one of the main attacks in WSNs, is the ha...
DINGO OPTIMIZED FUZZY CNN TECHNIQUE FOR EFFICIENT PROTEIN STRUCTURE PREDICTION
Protein is made up of a variety of molecules that are required by living organisms, such as enzymes, hormones, and antibodies. In step 2, the max-pooling layer and the convolutional layer evaluate the input data to creat...
HYBRID OPTIMIZATION INTEGRATED INTRUSION DETECTION SYSTEM IN WSN USING ELMAN NETWORK
Wireless Sensor Networks (WSNs) increases the usage of integrated systems and areas which attracts the attention of attackers. However, WSNs are vulnerable to different kinds of security threats and attacks. To ensure th...
YOLO-VEHICLE: REALTIME VEHICLE LICENCE PLATE DETECTION AND CHARACTER RECOGNITION USING YOLOV7 NETWORK
The demand for a secure lifestyle and travel is increasing due to the rapid development of technology. Since the turn of the century, the number of road vehicles has risen dramatically. The rapid growth of the vehicular...
DEEP REINFORCEMENT LEARNING BASED REAL TIME VIOLENCE DETECTION
In recent days violence is rampant, and the violence that occurs in public places is considered trembling violence in this study. To avert these anomalous activities, a real-time violence identification model is required...