{"title":"Secure efficient task communication mechanisms for Big Data environment","authors":"Vinod Desai, D. Annappaiah","doi":"10.59035/ezob4017","DOIUrl":null,"url":null,"abstract":"In this paper, a Secure Efficient Task Communication (SETC) Mechanism for Big data environment has been proposed. The SETC mechanism detects the oscillating device efficiently (detects the good and bad behaviour of the node). The results have been compared with the current reliability-based security methods. The SETC method has achieved very good detection rate, reduced the detection failure rate, and provided high reliability in comparison to the current reliability-based security methods. It has been seen that the current reliability-based security methods fail to address the issue of the dynamic behaviour of the sensor nodes and feedback-reliability. In addition, in comparison to the conventional cryptography-based authentication method, the reputation-based security system is far more effective at determining the behaviour of the user.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":1.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal on Information Technologies and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.59035/ezob4017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, a Secure Efficient Task Communication (SETC) Mechanism for Big data environment has been proposed. The SETC mechanism detects the oscillating device efficiently (detects the good and bad behaviour of the node). The results have been compared with the current reliability-based security methods. The SETC method has achieved very good detection rate, reduced the detection failure rate, and provided high reliability in comparison to the current reliability-based security methods. It has been seen that the current reliability-based security methods fail to address the issue of the dynamic behaviour of the sensor nodes and feedback-reliability. In addition, in comparison to the conventional cryptography-based authentication method, the reputation-based security system is far more effective at determining the behaviour of the user.