Secure Mutual Authentication in Fog Computing π
Analyzes the performance of a secure mutual authentication scheme tailored for fog computing environments.

PhDservices. org
12 views β’ Jun 14, 2024

About this video
Title:- Secure Mutual Authentication Scheme in Fog Computing
----------------------------------------------------------------
Implementation plan:
------------------------------
Scenario-1 =Elliptic Curve & Arnold Chaotic Map Model:
------------------------------------------------------------------------------
Step 1: Initially, we make connections between the client and Fog-Server system.
Step 2: Then, we get User credentials, create verification certificates and verify through SMS or Emails.
Step 3: Next, we implement the Elliptic Curve & Arnold Chaotic Map algorithm for the key mapping.
Step 4: Then, we store the data into the Database.
Step 5: Finally, we plot the performance metrics for the following:
5.1: Data transfer speed.
5.2: Efficiency.
5.3: Accuracy.
Scenario-2 =RSA & Markov chain Model:
----------------------------------------------------------
Step 1: Initially, we make connections between the client and Fog-Server system.
Step 2: Then, we get User credentials, create verification certificates and verify through SMS or Emails.
Step 3: Next, we implement the RSA & Markov chain algorithm for the key mapping.
Step 4: Then, we store the data into the Database.
Step 5: Finally, we plot the performance metrics for the following:
5.1: Data transfer speed.
5.2: Efficiency.
5.3: Accuracy.
Scenario-3 = Elliptic Curve & One-way hash function Model:
-----------------------------------------------------------------------------------
Step 1: Initially, we make connections between the client and Fog-Server system.
Step 2: Then, we get User credentials, create verification certificates and verify through SMS or Emails.
Step 3: Next, we implement the Elliptic Curve & One-way hash function algorithm for the key mapping.
Step 4: Then, we store the data into the Database.
Step 5: Finally, we plot the performance metrics for the following:
5.1: Data transfer speed.
5.2: Efficiency.
5.3: Accuracy.
Software Requirement:
--------------------------------
I) Development Tool:
-----------------------------
1) Frontend- Python β 3.11.4 with Tkinter
2) Backend- Python -3.11.4
3) Database- MySql (xampp)
II) Operating System:
------------------------------
1) For Server- Windows 10 (64-bit)
2) For Client- Virtual Box (Windows OS)
Note:
---------
1) If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.
2) Please note that this implementation plan does not include any further steps after it is put into implementation.
3) If the above plan satisfies your requirement please confirm with us.
4) We develop simulation based projects only, not in real time.
//////////////////////////////////////////////////////////////////////////////////////////////////////////////
#PerformanceAnalysis
#SecureMutualAuthentication
#FogComputing
#Cybersecurity
#DataPrivacy
#CloudSecurity
#NetworkPerformance
#DataProtection
#AuthenticationScheme
#securecommunication
-------------------------------------------------------------------------------------------------------------
PhD Service offers Worldβs best knowledge sharing platform for Research Scholars.
Our research team assists endless support for RESEARCH PORPOSAL, PAPER WRITNG, THESIS WRIITNG of your research paper.
Contact us for your research support:
https://phdservices.org/
+91 94448 68310
phdservicesorg@gmail.com
----------------------------------------------------------------
Implementation plan:
------------------------------
Scenario-1 =Elliptic Curve & Arnold Chaotic Map Model:
------------------------------------------------------------------------------
Step 1: Initially, we make connections between the client and Fog-Server system.
Step 2: Then, we get User credentials, create verification certificates and verify through SMS or Emails.
Step 3: Next, we implement the Elliptic Curve & Arnold Chaotic Map algorithm for the key mapping.
Step 4: Then, we store the data into the Database.
Step 5: Finally, we plot the performance metrics for the following:
5.1: Data transfer speed.
5.2: Efficiency.
5.3: Accuracy.
Scenario-2 =RSA & Markov chain Model:
----------------------------------------------------------
Step 1: Initially, we make connections between the client and Fog-Server system.
Step 2: Then, we get User credentials, create verification certificates and verify through SMS or Emails.
Step 3: Next, we implement the RSA & Markov chain algorithm for the key mapping.
Step 4: Then, we store the data into the Database.
Step 5: Finally, we plot the performance metrics for the following:
5.1: Data transfer speed.
5.2: Efficiency.
5.3: Accuracy.
Scenario-3 = Elliptic Curve & One-way hash function Model:
-----------------------------------------------------------------------------------
Step 1: Initially, we make connections between the client and Fog-Server system.
Step 2: Then, we get User credentials, create verification certificates and verify through SMS or Emails.
Step 3: Next, we implement the Elliptic Curve & One-way hash function algorithm for the key mapping.
Step 4: Then, we store the data into the Database.
Step 5: Finally, we plot the performance metrics for the following:
5.1: Data transfer speed.
5.2: Efficiency.
5.3: Accuracy.
Software Requirement:
--------------------------------
I) Development Tool:
-----------------------------
1) Frontend- Python β 3.11.4 with Tkinter
2) Backend- Python -3.11.4
3) Database- MySql (xampp)
II) Operating System:
------------------------------
1) For Server- Windows 10 (64-bit)
2) For Client- Virtual Box (Windows OS)
Note:
---------
1) If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.
2) Please note that this implementation plan does not include any further steps after it is put into implementation.
3) If the above plan satisfies your requirement please confirm with us.
4) We develop simulation based projects only, not in real time.
//////////////////////////////////////////////////////////////////////////////////////////////////////////////
#PerformanceAnalysis
#SecureMutualAuthentication
#FogComputing
#Cybersecurity
#DataPrivacy
#CloudSecurity
#NetworkPerformance
#DataProtection
#AuthenticationScheme
#securecommunication
-------------------------------------------------------------------------------------------------------------
PhD Service offers Worldβs best knowledge sharing platform for Research Scholars.
Our research team assists endless support for RESEARCH PORPOSAL, PAPER WRITNG, THESIS WRIITNG of your research paper.
Contact us for your research support:
https://phdservices.org/
+91 94448 68310
phdservicesorg@gmail.com
Video Information
Views
12
Duration
10:17
Published
Jun 14, 2024
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.