Abstract

ABSTRACT Currently, healthcare services are encountering challenges, particularly in developing countries wherein remote areas encounter a lack of highly developed hospitals and doctors. IoT devices produce enormous security-sensitive data; therefore, device security is considered an important concept. The main aim of this work is to formulate a secure key generation process in the data-sharing approach by exploiting the Rider Horse Herd Optimization Algorithm (RHHO). Here, eight phases, like the initialization phase, registration phase, key generation phase, login phase, data protection phase, authentication phase, verification phase, and data decryption phase are exploited for secure and efficient authentication and multimedia data sharing. The proposed RHHO model is the integration of the Rider Optimization Algorithm (ROA) and Horse herd Optimization Algorithm (HOA). The proposed RHHO model achieved enhanced performance with a computation cost of 0.235, an accuracy of 0.935and memory usage of 2.425 MB.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call