June 2022 Issue Vol.12 No.6



ANALYSIS OF E-WALLET APPLICATIONS FOR PRIVACY AND SECURE DATA USING MODER COMPUTING PARADIGMS
https://ia601500.us.archive.org/17/items/2022_ijitce/vol12no601.pdf


Dr. K.S. Mohanasathiya
Associate Professor, School of Computer Science,
VET Institute of Arts and Science (Co-Edu) College, Erode, Tamil Nadu, India.

Dr. S. Prasath Assistant Professor, School of Computer Science,
VET Institute of Arts and Science (Co-Edu) College, Erode, Tamil Nadu, India.

Dr. K. R. Ananth Associate Professor & Head, School of Computer Science,
VET Institute of Arts and Science (Co-Edu) College, Erode, Tamil Nadu, India.



Abstract: Due to the development of the Internet of Things (IoT), people are surrounded by millions of smart devices to gather massiv amounts of data. Internet of Things (IoT) smart devices are more familiar and have more processing capacity, whereas vast volumes of data are processed at the edge of computing networks. Data from IoT devices have traditionally been relayed to a central network server housed in a datacentre. Edge computing is a modern computing paradigm in which data is stored at a neighboring edge node with adequate resources to meet device requirements and improve user knowledge. In this work, while providing data to an edge node, maintaining privacy and security is a difficult and a challenging task. As a result, encrypted data are required to be safeguarded from security attacks. In this phase, an attribute-based conjunctive keyword search method is utilized in conjunction with a proxy re-encryption technique to protect user data in the cloud. This makes it easier for the owner to encrypt data using a private key and the user to search for documents using conjunctive keywords. After the data has been reencrypted with a new key, only authenticated users can obtain the required documents. In this phase, designed to track previously searched records in order to minimize search time and enhance search computational overhead. The proposed scheme uses time sealer to guarantee the allocated time to every user in the cloud server and great privacy in the cloud is accomplished with efficiency. The proposed scheme gives better results when compared with existing Time Domain MultiAuthority Outsourcing (TMO) and Online/Offline Multi-Authority Decryption Outsourcing (OOMADO) methods in data security.
Keywords: IOT, OOMADO, TMO, SSE, PEKS

Read complete June 2022


Read complete June 2022