Abstract
Edge computing is a promising paradigm that enhances the capabilities of cloud computing in healthcare. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Edge computing is a promising model for improving cloud computing’s capabilities. It is important to maintain a positive climate free of all forms of protection and privacy violations in order to continue using computing services. The edge computing environment’s security and privacy concerns have hampered the technology’s overall acceptance as a reliable paradigm.The blockchain technology emerges as a viable solution because it provides influential features such as continuous secrecy, authentication, and robustness. This proposed work propose a blockchain-enabled distributed security architecture based on edge cloud. Security attacks are detected at the cloud layer, and as a result, security attacks at the IoT network’s edge layer are decreased. The gateway provides dynamic network traffic flow management, which aids in the detection of security attacks by identifying suspicious network traffic flows and reducing security attacks by blocking suspicious flows.For the next-generation IoT, the proposed security architecture has specified state-of-the-art contributions. The proposed algorithm is based on ECC based proxy encryption technique. Proxy re-encryption is a modern encryption scheme designed for protection in a distributed environment, including such smart applications that use the Internet of Things.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.