Secure Mutual Authentication in Fog Computing πŸ”’

Analyzes the performance of a secure mutual authentication scheme tailored for fog computing environments.

Secure Mutual Authentication in Fog Computing πŸ”’
PhDservices. org
12 views β€’ Jun 14, 2024
Secure Mutual Authentication in Fog Computing πŸ”’

About this video

Title:- Secure Mutual Authentication Scheme in Fog Computing
----------------------------------------------------------------
Implementation plan:
------------------------------
Scenario-1 =Elliptic Curve & Arnold Chaotic Map Model:
------------------------------------------------------------------------------
Step 1: Initially, we make connections between the client and Fog-Server system.

Step 2: Then, we get User credentials, create verification certificates and verify through SMS or Emails.

Step 3: Next, we implement the Elliptic Curve & Arnold Chaotic Map algorithm for the key mapping.

Step 4: Then, we store the data into the Database.

Step 5: Finally, we plot the performance metrics for the following:

5.1: Data transfer speed.

5.2: Efficiency.

5.3: Accuracy.

Scenario-2 =RSA & Markov chain Model:
----------------------------------------------------------
Step 1: Initially, we make connections between the client and Fog-Server system.

Step 2: Then, we get User credentials, create verification certificates and verify through SMS or Emails.

Step 3: Next, we implement the RSA & Markov chain algorithm for the key mapping.

Step 4: Then, we store the data into the Database.

Step 5: Finally, we plot the performance metrics for the following:

5.1: Data transfer speed.

5.2: Efficiency.

5.3: Accuracy.

Scenario-3 = Elliptic Curve & One-way hash function Model:
-----------------------------------------------------------------------------------
Step 1: Initially, we make connections between the client and Fog-Server system.

Step 2: Then, we get User credentials, create verification certificates and verify through SMS or Emails.

Step 3: Next, we implement the Elliptic Curve & One-way hash function algorithm for the key mapping.

Step 4: Then, we store the data into the Database.

Step 5: Finally, we plot the performance metrics for the following:

5.1: Data transfer speed.

5.2: Efficiency.

5.3: Accuracy.

Software Requirement:
--------------------------------
I) Development Tool:
-----------------------------
1) Frontend- Python – 3.11.4 with Tkinter
2) Backend- Python -3.11.4
3) Database- MySql (xampp)

II) Operating System:
------------------------------
1) For Server- Windows 10 (64-bit)
2) For Client- Virtual Box (Windows OS)

Note:
---------

1) If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.

2) Please note that this implementation plan does not include any further steps after it is put into implementation.

3) If the above plan satisfies your requirement please confirm with us.

4) We develop simulation based projects only, not in real time.
//////////////////////////////////////////////////////////////////////////////////////////////////////////////
#PerformanceAnalysis
#SecureMutualAuthentication
#FogComputing
#Cybersecurity
#DataPrivacy
#CloudSecurity
#NetworkPerformance
#DataProtection
#AuthenticationScheme
#securecommunication
-------------------------------------------------------------------------------------------------------------
PhD Service offers World’s best knowledge sharing platform for Research Scholars.
Our research team assists endless support for RESEARCH PORPOSAL, PAPER WRITNG, THESIS WRIITNG of your research paper.
Contact us for your research support:
https://phdservices.org/
+91 94448 68310
phdservicesorg@gmail.com

Video Information

Views

12

Duration

10:17

Published

Jun 14, 2024

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.