{"title":"提高物联网健康应用安全性的区块链框架","authors":"E. V. Dharshini, K. Thangam","doi":"10.59544/exgs9072/ijatemv02i05p1","DOIUrl":null,"url":null,"abstract":"In the recent years, the big data world has developed a cloud with strong storage management that can verify data integrity and maintain one data duplicate. The data deduplication (DD) issue has been solved by the development of numerous cloud auditing storage techniques, but these methods are weak and unable to withstand brute force attacks. In this paper, the proposed technique explore a three-tier cross-domain architecture and suggest a fast and private huge data deduplication in cloud storage. EPCDD achieves data availability as well as privacy preservation while resisting brute-force attacks. In order to provide better privacy protections than previous systems, this method take accountability into consideration. In terms of compute, communication and storage overheads and then it show that EPCDD performs better than currently used competitive strategies. However, since users and data owners may not be confident in cloud storage providers, data will likely be encrypted before outsourcing. Since different users encrypt identical data in different ways, deduplication efforts are complicated. As a result, to examine the performance of the proposed work is utilizing the java software.","PeriodicalId":297148,"journal":{"name":"International Journal of Advanced Trends in Engineering and Management","volume":"201 10","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Blockchain Framework of Improved Security for Internet of Things Health Applications\",\"authors\":\"E. V. Dharshini, K. Thangam\",\"doi\":\"10.59544/exgs9072/ijatemv02i05p1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the recent years, the big data world has developed a cloud with strong storage management that can verify data integrity and maintain one data duplicate. The data deduplication (DD) issue has been solved by the development of numerous cloud auditing storage techniques, but these methods are weak and unable to withstand brute force attacks. In this paper, the proposed technique explore a three-tier cross-domain architecture and suggest a fast and private huge data deduplication in cloud storage. EPCDD achieves data availability as well as privacy preservation while resisting brute-force attacks. In order to provide better privacy protections than previous systems, this method take accountability into consideration. In terms of compute, communication and storage overheads and then it show that EPCDD performs better than currently used competitive strategies. However, since users and data owners may not be confident in cloud storage providers, data will likely be encrypted before outsourcing. Since different users encrypt identical data in different ways, deduplication efforts are complicated. As a result, to examine the performance of the proposed work is utilizing the java software.\",\"PeriodicalId\":297148,\"journal\":{\"name\":\"International Journal of Advanced Trends in Engineering and Management\",\"volume\":\"201 10\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Advanced Trends in Engineering and Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.59544/exgs9072/ijatemv02i05p1\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Trends in Engineering and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.59544/exgs9072/ijatemv02i05p1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Blockchain Framework of Improved Security for Internet of Things Health Applications
In the recent years, the big data world has developed a cloud with strong storage management that can verify data integrity and maintain one data duplicate. The data deduplication (DD) issue has been solved by the development of numerous cloud auditing storage techniques, but these methods are weak and unable to withstand brute force attacks. In this paper, the proposed technique explore a three-tier cross-domain architecture and suggest a fast and private huge data deduplication in cloud storage. EPCDD achieves data availability as well as privacy preservation while resisting brute-force attacks. In order to provide better privacy protections than previous systems, this method take accountability into consideration. In terms of compute, communication and storage overheads and then it show that EPCDD performs better than currently used competitive strategies. However, since users and data owners may not be confident in cloud storage providers, data will likely be encrypted before outsourcing. Since different users encrypt identical data in different ways, deduplication efforts are complicated. As a result, to examine the performance of the proposed work is utilizing the java software.