Enhanced Security protocols for data protection in the Internet of Healthcare Things (IoHTs) using Quantum Key Distribution

Author:

Shyry Prayla1,Selvam Venkatesan2,Gopinath N3

Affiliation:

1. Sathyabama Institute of Science and Technology

2. adhiyaman

3. B.S Abdur Rahman Crescent Institute of Science and Technology

Abstract

Abstract The Internet of Healthcare Things is essential for enhancing people's protection, care, and health. Health-related criteria for patients can be remotely tracked and transferred to medical data centers via cloud storage, saving them the trip to the hospital. Additionally, the volume of data processed by Internet of Healthcare Things devices is growing exponentially. Due to the increased revelation of sensitive information, there are many unresolved issues about data security and privacy gathered through Internet of Healthcare Things devices. The requirement to apply machine learning algorithms to massive industrial data is developing as quickly as categorization methods themselves. We offer an Entangled Fuzzy Logic based Quantum Key Distribution for data protection to improve and assess the degree of security such breaches, data integrity, etc. in order to safely store and handle this information in the cloud. Results show that the proposed method enhancing the level of security to the cloud more than 99%, the works remarkably well.

Publisher

Research Square Platform LLC

Reference46 articles.

1. Wang Q, Wang C, Li J, Ren K, Lou W (2009) : Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the European symposium on research in computer security, Springer, pp 355–370

2. Research on cloud computing security threats using data transmission;Kumar R;Int J Adv Res Comput Sci Softw Eng India,2015

3. Meng D (2013) : Data security in cloud computing. In: Proceedings of the 8th International Conference on Computer Science & Education (ICCSE 2013)

4. Shawish A, Salama M (2014) : Cloud computing: paradigms and technologies. In: Proceedings of the Inter-cooperative collective intelligence: techniques and applications, Springer, pp 39–67

5. An efficent security framework design for cloud computing using artificial neural networks;Negi A;Int J Comput Appl,2015

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3