Please use this identifier to cite or link to this item:
Title: An efficient amalgamation of computational models to ensure a secure IoT environment
Authors: Mohanty, Sachi N. 
Radhika, A. 
Dahiya, Vandna 
Pattanaik, Chinmaya R. 
Krishamoorthy, Sujatha 
Issue Date: 2020
Publisher: Science and Engineering Research Support Society
Source: Mohanty, S. N., Radhika, A., Dahiya, V., Pattanaik, C. R. & Krishamoorthy, S. (2020). An efficient amalgamation of computational models to ensure a secure IoT environment. International Journal of Control and Automation, 13(2s), 235-243.
Journal: International Journal of Control and Automation 
Abstract: The cloud computing merges with the IoT environments to enhance the scope of developing new applications and distributing these applications to the real world environment. But the current IoT environment faces many challenges in building an efficient IoT applications. In these challenges, ensuring security in the IoT environment plays a vital role.Traditional cloud models tried to solve the security issues in the IoT applications. But they all failed in producing the optimal solution. To solve the security issues of the IoT applications an amalgamation is performed between computing models such as cloud computing and corner society. The proposed system merges the trust examination model and usage template in which this combination solves the load balancing problem in the cloud computing. The corner environment structure which is made effectively and reducing the usage of the resources through the corner protocols to maximize the ability of the trust examination model. The proposed system gives the flexibility of loading the usage template in the cloud and loading the usage grammar template in the corner protocol in which results in the development of the IoT applications.
Appears in Collections:Scholarly Publications

Files in This Item:
File Description SizeFormat 
wku_schlrs_publcn_000123.pdf913.18 kBAdobe PDFThumbnail
Show full item record

Page view(s)

checked on Apr 2, 2023


checked on Apr 2, 2023

Google ScholarTM


This item is licensed under a Creative Commons License Creative Commons