Sangeetha Yempally, S. K. Singh, Velliangiri Sarveshwaran
{"title":"物联网医疗中安全高效的身份验证和多媒体数据共享方法","authors":"Sangeetha Yempally, S. K. Singh, Velliangiri Sarveshwaran","doi":"10.1080/13682199.2023.2180140","DOIUrl":null,"url":null,"abstract":"ABSTRACT Currently, healthcare services are encountering challenges, particularly in developing countries wherein remote areas encounter a lack of highly developed hospitals and doctors. IoT devices produce enormous security-sensitive data; therefore, device security is considered an important concept. The main aim of this work is to formulate a secure key generation process in the data-sharing approach by exploiting the Rider Horse Herd Optimization Algorithm (RHHO). Here, eight phases, like the initialization phase, registration phase, key generation phase, login phase, data protection phase, authentication phase, verification phase, and data decryption phase are exploited for secure and efficient authentication and multimedia data sharing. The proposed RHHO model is the integration of the Rider Optimization Algorithm (ROA) and Horse herd Optimization Algorithm (HOA). The proposed RHHO model achieved enhanced performance with a computation cost of 0.235, an accuracy of 0.935and memory usage of 2.425 MB.","PeriodicalId":22456,"journal":{"name":"The Imaging Science Journal","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A secure and efficient authentication and multimedia data sharing approach in IoT-healthcare\",\"authors\":\"Sangeetha Yempally, S. K. Singh, Velliangiri Sarveshwaran\",\"doi\":\"10.1080/13682199.2023.2180140\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT Currently, healthcare services are encountering challenges, particularly in developing countries wherein remote areas encounter a lack of highly developed hospitals and doctors. IoT devices produce enormous security-sensitive data; therefore, device security is considered an important concept. The main aim of this work is to formulate a secure key generation process in the data-sharing approach by exploiting the Rider Horse Herd Optimization Algorithm (RHHO). Here, eight phases, like the initialization phase, registration phase, key generation phase, login phase, data protection phase, authentication phase, verification phase, and data decryption phase are exploited for secure and efficient authentication and multimedia data sharing. The proposed RHHO model is the integration of the Rider Optimization Algorithm (ROA) and Horse herd Optimization Algorithm (HOA). The proposed RHHO model achieved enhanced performance with a computation cost of 0.235, an accuracy of 0.935and memory usage of 2.425 MB.\",\"PeriodicalId\":22456,\"journal\":{\"name\":\"The Imaging Science Journal\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Imaging Science Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/13682199.2023.2180140\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Imaging Science Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/13682199.2023.2180140","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A secure and efficient authentication and multimedia data sharing approach in IoT-healthcare
ABSTRACT Currently, healthcare services are encountering challenges, particularly in developing countries wherein remote areas encounter a lack of highly developed hospitals and doctors. IoT devices produce enormous security-sensitive data; therefore, device security is considered an important concept. The main aim of this work is to formulate a secure key generation process in the data-sharing approach by exploiting the Rider Horse Herd Optimization Algorithm (RHHO). Here, eight phases, like the initialization phase, registration phase, key generation phase, login phase, data protection phase, authentication phase, verification phase, and data decryption phase are exploited for secure and efficient authentication and multimedia data sharing. The proposed RHHO model is the integration of the Rider Optimization Algorithm (ROA) and Horse herd Optimization Algorithm (HOA). The proposed RHHO model achieved enhanced performance with a computation cost of 0.235, an accuracy of 0.935and memory usage of 2.425 MB.