ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

IMPROVED AUTHENTICITY OF DATA IN IOT NETWORK DEVICES USING FUZZY BASED APPROACHES

Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.11, No. 02)

Publication Date:

Authors : ;

Page : 69-74

Keywords : Filter based security; IoT Computing; Function-as-a-Service; Virtual machines.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

IoT Computing is a cloud provision-driven extension or execution model of IoT. It handles the distribution of virtual machine resources dynamically (IOTs). It operates specifically on the basis of features that serve as a deployment unit which are crucial when functions are isolated from different users. Private data must also be logged when external provision is being made available to external suppliers since it is deemed confidential. In this article, we suggest a new way of solving the credibility and anonymity of computation related to IoT, using the encrypted Fuzzy Logic parser, with the right user authorisation in IoT computing. This is done to detect an unwanted entry for links to external records. The analysis would also reduce IoT overload storage and network overhead. The simulation is carried out to validate filter-based security model results. The findings demonstrate that IoT consumers have increased their data integrity according to current benchmarks.

Last modified: 2022-03-10 18:41:40