IMPROVED AUTHENTICITY OF DATA IN IOT NETWORK DEVICES USING FUZZY BASED APPROACHES
Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.11, No. 02)Publication Date: 2020-02-28
Authors : K. Giri A. Vijayalakshmi;
Page : 69-74
Keywords : Filter based security; IoT Computing; Function-as-a-Service; Virtual machines.;
Abstract
IoT Computing is a cloud provision-driven extension or execution model of IoT. It handles the distribution of virtual machine resources dynamically (IOTs). It operates specifically on the basis of features that serve as a deployment unit which are crucial when functions are isolated from different users. Private data must also be logged when external provision is being made available to external suppliers since it is deemed confidential. In this article, we suggest a new way of solving the credibility and anonymity of computation related to IoT, using the encrypted Fuzzy Logic parser, with the right user authorisation in IoT computing. This is done to detect an unwanted entry for links to external records. The analysis would also reduce IoT overload storage and network overhead. The simulation is carried out to validate filter-based security model results. The findings demonstrate that IoT consumers have increased their data integrity according to current benchmarks.
Other Latest Articles
- SIGNAL PROCESSING OF EEG WAVES USING CONVOLUTIONAL NEURAL NETWORK
- COMBATING COVID-19 USING LEVERAGING DATA SCIENCE
- APPLICATIONS OF POWER ELECTRONIC SYSTEMS ON WIND ENERGY MODELS
- IMAGE CLASSIFICATION IN MEDICAL DATASETS USING FUZZY LOGIC SYSTEM
- COMPREHENSIVE ANALYSIS ON POWER ELECTRONIC SYSTEMS IN RELATION WITH MACHINE LEARNING
Last modified: 2022-03-10 18:41:40