Smart health system with deep kronecker network-based key generation for privacy-aware aggregate authentication and access control in IoT

被引:0
作者
M. Sathya [1 ]
V. Mareeswari [2 ]
M. Jeyaselvi [3 ]
A. Solairaj [4 ]
机构
[1] Nadar Saraswathi College of Engineering and Technology,Department of Information Technology
[2] AMC Engineering College, Department of CSE
[3] SRM Institute of Science and Technology,Department of Networking and Communications
[4] Sethu Institute of Technology,Department of CSE
关键词
Internet of Things (IoT); Smart health system; Access control; Deep learning (DL); Deep Kronecker Network (DKN);
D O I
10.1007/s10878-025-01303-5
中图分类号
学科分类号
摘要
The Internet of Things (IoT) application is an application and service that incorporates both the physical and information world. Similarly, it is difficult for existing health systems to provide privacy-aware aggregate authentication and fine-grained access control. To bridge the concern, a smart health system (SHS) with Deep Kronecker Network_key generation (DKN_keyGen) for privacy-aware aggregate authentication and access control in IoT is implemented. Here, entities employed for this model such as data owner (DO), registration center (RC), data user (DU) and cloud service provider (CSP). The method follows four steps, such as system initialization, user registration, Health data outsourcing and Health data access. Initially, the RC needs to initialize the security parameters, random parameters and public keys. After that, DO and DU must be registered in RC. Moreover, the smart health care data of DO generates the secret parameter and also obtains the secret parameter from the RC. The cloud storage stores and manages health care data in the health data outsourcing step. Finally, for health data access, the user gives appropriate parameters and access to the data which is implemented in the data access phase. The model is established considering different security functionalities including Encryption, ECC, XoR and hashing function. Here, the key is generated using DKN. The proposed model obtained a minimum computation time of 6.857 s, memory usage of 30 MB, and communication cost of 20.
引用
收藏
相关论文
empty
未找到相关数据