Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.12540/169
DC FieldValueLanguage
dc.contributor.authorMohanty, Sachi N.en_US
dc.contributor.authorRadhika, A.en_US
dc.contributor.authorDahiya, Vandnaen_US
dc.contributor.authorPattanaik, Chinmaya R.en_US
dc.contributor.authorKrishamoorthy, Sujathaen_US
dc.date.accessioned2020-09-17T12:04:30Z-
dc.date.available2020-09-17T12:04:30Z-
dc.date.issued2020-
dc.identifier.citationMohanty, S. N., Radhika, A., Dahiya, V., Pattanaik, C. R. & Krishamoorthy, S. (2020). An efficient amalgamation of computational models to ensure a secure IoT environment. International Journal of Control and Automation, 13(2s), 235-243.en_US
dc.identifier.urihttps://hdl.handle.net/20.500.12540/169-
dc.description.abstractThe cloud computing merges with the IoT environments to enhance the scope of developing new applications and distributing these applications to the real world environment. But the current IoT environment faces many challenges in building an efficient IoT applications. In these challenges, ensuring security in the IoT environment plays a vital role.Traditional cloud models tried to solve the security issues in the IoT applications. But they all failed in producing the optimal solution. To solve the security issues of the IoT applications an amalgamation is performed between computing models such as cloud computing and corner society. The proposed system merges the trust examination model and usage template in which this combination solves the load balancing problem in the cloud computing. The corner environment structure which is made effectively and reducing the usage of the resources through the corner protocols to maximize the ability of the trust examination model. The proposed system gives the flexibility of loading the usage template in the cloud and loading the usage grammar template in the corner protocol in which results in the development of the IoT applications.en_US
dc.format.extent9 pagesen_US
dc.format.mimetypeapplication/pdfen_US
dc.language.isoengen_US
dc.publisherScience and Engineering Research Support Societyen_US
dc.relation.ispartofInternational Journal of Control and Automationen_US
dc.rights.urihttps://creativecommons.org/licenses/by-nc/4.0/-
dc.subject.lcshCloud Computingen_US
dc.titleAn efficient amalgamation of computational models to ensure a secure IoT environmenten_US
dc.typeArticleen_US
dc.rights.licenseAttribution-NonCommercial 4.0 International (CC BY-NC 4.0)en_US
dc.subject.keywordsIoT Environmenten_US
Appears in Collections:Scholarly Publications
Files in This Item:
File Description SizeFormat 
wku_schlrs_publcn_000123.pdf913.18 kBAdobe PDFThumbnail
View/Open
Show simple item record

Page view(s)

732
checked on Apr 20, 2024

Download(s)

144
checked on Apr 20, 2024

Google ScholarTM

Check


This item is licensed under a Creative Commons License Creative Commons