Secure Public Key Cryptosystem for in Smart City using Algebraic Structure
Keywords:
Cryptography, Secure Public Key, Smart Cities, Improved frameworkAbstract
Smart city areas have been distinguished as zones which are urbanized and use assorted sorts of electronic information assortment sensors that are used to supervise assets and resources effectively. Keen meters are a unit of brilliant urban communities, and they gather data about clients and their utilization designs. Thus, the Internet of Things (IoT) being at a consistent advancement has incited various clients into having their information gathered from shrewd meters, put away on cloud workers. This is a method of sparing expenses and time engaged with getting to the information. Despite that, the cloud helped IoT faces protection and security issues. This is because of the cloud workers having an untrusted nature. Because of this, it is basic for the information collected from the shrewd meters be encoded heretofore redistributing it to the cloud worker. In any case, having encoded information in the cloud worker prompts an intricacy with regards to getting to the information. For clients who are on an alternate public key framework, it gets nonsensical for the clients to initially download the whole information on the cloud so as to get to the necessary information. In this article we proposed efficient public key cryptosystem for Smart city using near-ring.
References
Elhabob, R., Sella, I., Zhao, Y., Zhu, G., & Xiong, H. (2018). A heterogeneous systems public key encryption with equality test in smart city.
Mahesh, T. R., Kaladevi, A. C., Balajee, J. M., Vivek, V., Prabu, M., & Muthukumaran, V. (2022). An Efficient Ensemble Method Using K-Fold Cross Validation for the Early Detection of Benign and Malignant Breast Cancer. International Journal of Integrated Engineering, 14(7), 204-216.
Krishnamoorthy, S., Muthukumaran, V., Yu, J., & Balamurugan, B. (2019, August). A secure privacy preserving proxy re-encryption scheme for IoT security using near-ring. In Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence (pp. 27-32).
Muthukumaran, V., Ezhilmaran, D., & Anjaneyulu, G. S. G. N. (2018). Efficient authentication scheme based on the twisted near-ring root extraction problem. In Advances in Algebra and Analysis: International Conference on Advances in Mathematical Sciences, Vellore, India, December 2017-Volume I (pp. 37-42). Springer International Publishing.
Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., & Lou, W. (2010, March). Fuzzy keyword search over encrypted data in cloud computing. In 2010 Proceedings IEEE INFOCOM (pp. 1-5). IEEE.
Guptha, N. S., & Patil, K. K. (2017). Earth mover's distance-based CBIR using adaptive regularised Kernel fuzzy C-means method of liver cirrhosis histopathological segmentation. International Journal of Signal and Imaging Systems Engineering, 10(1-2), 39-46.
Patil, K. K., & Ahmed, S. T. (2014, October). Digital telemammography services for rural India, software components and design protocol. In 2014 International Conference on Advances in Electronics Computers and Communications (pp. 1-5). IEEE.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23 (pp. 506-522). Springer Berlin Heidelberg.
Al-Shammari, N. K., Alzamil, A. A., Albadarn, M., Ahmed, S. A., Syed, M. B., Alshammari, A. S., & Gabr, A. M. (2021). Cardiac stroke prediction framework using hybrid optimization algorithm under DNN. Engineering, Technology & Applied Science Research, 11(4), 7436-7441.
Ahmed, S. T., & Basha, S. M. (2022). Information and Communication Theory-Source Coding Techniques-Part II. MileStone Research Publications.
Guptha, N. S., Balamurugan, V., Megharaj, G., Sattar, K. N. A., & Rose, J. D. (2022). Cross lingual handwritten character recognition using long short term memory network with aid of elephant herding optimization algorithm. Pattern Recognition Letters, 159, 16-22.
Muthukumaran, V., Natarajan, R., Kaladevi, A. C., Magesh, G., & Babu, S. (2022). Traffic flow prediction in inland waterways of Assam region using uncertain spatiotemporal correlative features. Acta Geophysica, 1-12.
Fathima, A. S., Prakesh, D., & Kumari, S. (2022). Defined Circle Friend Recommendation Policy for Growing Social Media. International Journal of Human Computations & Intelligence, 1(1), 9-12.
Yang, G., Tan, C. H., Huang, Q., & Wong, D. S. (2010). Probabilistic public key encryption with equality test. In Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings (pp. 119-131). Springer Berlin Heidelberg.
Gothai, E., Muthukumaran, V., Valarmathi, K., Sathishkumar, V. E., Thillaiarasu, N., & Karthikeyan, P. (2022). Map-Reduce based Distance Weighted k-Nearest Neighbor Machine Learning Algorithm for Big Data Applications. Scalable Computing: Practice and Experience, 23(4), 129-145.
Jayagopal, P., Muthukumaran, V., Koti, M. S., Kumar, S. S., Rajendran, S., & Mathivanan, S. K. (2022). Weather-based maize yield forecast in Saudi Arabia using statistical analysis and machine learning. Acta Geophysica, 70(6), 2901-2916.
Merlin Linda, G., Sree Rathna Lakshmi, N. V. S., Murugan, N. S., Mahapatra, R. P., Muthukumaran, V., & Sivaram, M. (2022). Intelligent recognition system for viewpoint variations on gait and speech using CNN-CapsNet. International Journal of Intelligent Computing and Cybernetics, 15(3), 363-382.
Wu, L., Zhang, Y., Choo, K. K. R., & He, D. (2017). Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Generation Computer Systems, 73, 22-31.
Vimala, B. B., Srinivasan, S., Mathivanan, S. K., Muthukumaran, V., Babu, J. C., Herencsar, N., & Vilcekova, L. (2023). Image Noise Removal in Ultrasound Breast Images Based on Hybrid Deep Learning Technique. Sensors, 23(3), 1167.
Batamuliza, J. (2018). Certificateless secure anonymous key distribution scheme for smart grid. International Journal of Computer Applications, 975, 8887.
Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). CCA2 attack and modification of Huang et al.’s public key encryption with authorized equality test. The Computer Journal, 59(11), 1689-1694.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 V Muthukumaran, S Vasudevan, Syeda Ayesha Siddiqha
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.