Cloud computing is the delivery of computing services over the web instead of keeping files on a proprietary disk drive or local memory device. Computing services can include servers, storage, databases, networking, software. The main reason and great advantage for using the cloud are that the user can store and access the stored data in the cloud from anywhere anytime and getting all its services for a low cost. Despite, Security has always been a big concern with cloud computing because the information stored in the cloud is not directly maintained by the customer. When the user uploaded or stored data during a cloud computing service, the info owners are unlikely to understand the path via which their data is being transmitted. The user is unknown to the fact whether the information is being collected, analyzed, and accessed by a third party or not. To overcome the security issues various cryptography algorithm is proposed. This paper focused on the basics of cloud computing and discussed various cryptography algorithms present in the existing work.
Without the need of a fixed foundation or base station, the Mobile Ad hoc Network creates its own wireless network. One of the most troublesome aspects of Mobile Ad hoc Network (MANET) is the occurrence of unexpected loss of network connectivity. As a result of this problem, packets continue to drop, and we must restore the connection by sending Route Request (RREQ) and Route Reply (RREP). As a result, network performance will suffer yet another setback. We used the scenario routing technique to combine the Dream Multipath Routing (DMR), Ad hoc on-demand multipath distance vector (AOMDV), Optimized link-state routing (OLSR), and Ad-hoc on Demand Vector (AODV) routing protocols to build the IHRP routing protocol in this work. According to previous studies, (AODV) is more suited when node motion is high. The purpose of DREAM Multipath Routing (DMR) is to maintain node mobility and location information coordinated. Route packet flooding is prevented by computing the expected chance of node relocation. The number of mobile nodes in the wireless network fluctuates, and the DMR operates on each one individually. In the network, each node maintains a list of nearby nodes and their current locations. Using the AOMDV routing protocol is effective for load balancing and preventing congestion on the network. OLSR is a good fit for networks that priorities link reliability above other considerations when routing traffic. When using the aforementioned (DMR, AODV, AOMDV, and OLSR) protocols to create the IHRP routing protocol, we are capable of better regulation of network behavior and perform. In the case of 100 nodes, data is sent for analysis for The Improved Hybrid Routing Protocol (IHRP), Zone Routing Protocol (ZRP), AOMDV, AODV, and OLSR routing protocols. For data send, the performance of IHRP, ZRP, AOMDV, AODV, and OLSR is 11513, 10240, 10225, 10558, and 9184, respectively, and for 50 nodes, the performance of IHRP, ZRP, AOMDV, AODV, and OLSR is 11151, 9807, 9636, 9586, and 7470, respectively. Thus, with 100 and 50 nodes, the Improved Hybrid Routing Protocol (IHRP) outperforms the AOMDV, ZRP, AODV, and OLSR routing protocols. In the case of 100 nodes and 50 nodes, the data receive analysis for IHRP, ZRP, AOMDV, AODV, and OLSR routing protocols is 11513, 10240, 10225, 10558, and 9184, respectively, and 9367, 8714, 8370, 6730, and 7298, respectively, So IHRP also receives data faster than ZRP, AOMDV, AODV, and OLSR routing protocols. The IHRP outperforms AOMDV, AODV, ZRP, and OLSR routing protocols in terms of data transmit, receive, data drop, PDR, throughput, E-E latency, and NRL.
IoT is a chain of Physical Objects that are installed with sensors, software, and other technologies for the goal of connecting and transferring data with other devices and systems over the Internet. In many research, it has been found that the data and communication between the Internet of Things are insecure. Also, the data which is transferred from one end to the other end is accessible for a shorts distance. A discovered protocol for Data Integrity in IoT communication. A protocol for providing an environmental monitoring solution and a system that facilitates the practical experimentation of the IoT solutions. After the data is secured with the protocols and it has received an environment for the experiments, the message has to be sent over a long distance.
Blockchain is one of the most growing technologies that is playing a vital role in the professional world today. Blockchain is the technology that is going to revolutionize many industries in the future including healthcare. It is simply defined as a decentralized, distributed ledger that records the provenance of a digital asset. Blockchain is used as a backbone for many industries such as cryptocurrencies, bitcoin, and many more. Although its capability and application have to be extended far beyond. The objective of blockchain is to allow digital information to be recorded and distributed, but not edited. In the last couple of years many industries finding new ways to implement blockchain technology with a wide range of domains. And this sudden increase in technology also provided many new application opportunities, including financial services, smart contracts, energy trading, supply chain, healthcare, etc. In this paper, we know briefly about blockchain technologies and some of their applications. We also show how blockchain is going to revolutionize the healthcare industry in the future.
Cloud Computing refers to various services that are accessible through the Internet. These essential sources encompass servers, databases, storage, analytics, software, and different applications. Mobile cloud computing (MCC) is the availability of cloud computing offerings in a cell environment. Mobile Cloud Computing at its simplest refers to an infrastructure where both the storage and therefore, the processing of information happens outside the mobile device. Users can remotely store their data also enjoy high-quality on-demand cloud applications without the restrictions of getting to get and maintain your local hardware and software. Despite the surprising advancement achieved by MCC, the clients of MCC remains below expectations. Thanks to the related risks regarding security and confidentiality. The more and more information is placed onto the cloud by the individuals and enterprises, the more the safety issue begins to grow. This paper gives a summary of the cloud computing concept followed by an outline of mobile cloud computing, and therefore, the different security issues pertinent to the mobile cloud computing environment.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.