Cloud computing facilitates ubiquitous access to shared pool of configurable system resources and services over the Internet. Often due to shared access to this massive amount of data there is equal chances of risk. Transferring sensitive information in the form of text, audio or video, over the cloud one cannot guarantee the safety of the file. This paper assesses the effect of transmission of High Definition videos with the help of cloud-based servers that will improve the security of data being transmitted as well as enhance the quality of experience for end-users. We propose to share video contents to a selective group of people using the Time Domain Attribute based Access Control(TAAC) schema and generate keys using cryptographic method which gives the much needed protection to access these videos. Further stegnographic approaches are practised to maintain the data confidentiality.
Delay Tolerant Networks (DTNs) is a promising current research field that have captured a lot of attention. In DTN, an end-to-end path is not assured and packets are transmitted from a source node to a destination node by the use of store-carry-forward based routing. In case of DTN, a source node or an intermediary node accumulates the packets in its buffer and holds them at the time of moving around in the network. In the majority of routing protocols, each node is necessary to truthfully pass on information. On the other hand, in certain scenarios few nodes possibly will break this principle, and pass on information in a greedy manner with the intention of maximizing their individual gain. The majority of the current security mechanism doesn"t depend on the practice of swarm intelligence based process for selection of untrusted nodes and recognizes the behaviour of illegal nodes. With the aim of solving this complication, this work employs the practice of swarm intelligence method, an Artificial Bee Colony (ABC) based greedy behaviour, in order to match the messages where a smart Mobile Trusted Module (MTM) is launched to supervise the forwarding progression of messages buffered in the node for the purpose of preventing the greedy behaviour. The performance of the proposed protocol was assessed in terms of average relay time, average message delivery ratio and reward ratio. Results confirm that the proposed protocol can onsiderably enhance the average message delivery ratio, diminished delay time and condensed packet overhead ratio by properly selecting the threshold values of forwarding counter and threshold hop counter.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.