A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption

An organization can be created through the Industrial Internet of Things (IIoT), which can transform an existing bound structure. The Industrial Internet of Things (IIoT) and its remote organization requirements for current sensors are very productive. The IIoT's introduced sensors monitor the conditions of contemporary machines and devices. Silicon Cloud demonstrated the advantages of modern distributed computing advancements for intelligent and planning applications. As a result, constant quality and security have emerged as the primary concerns in the IIoT. This presents several distinct and consistently increasing wagers on the advanced system. The research deals with the aim of cutting-edge handheld GPS devices. In a similar vein, recent region-based organizations make use of regional data. There is enough fragile data in the region data provided to these area-based expert communities to warrant overemphasis. As a result, experts are working on finding a solution for safe regional data. Most of the investigation frameworks that were suggested were designed to make them believe that the research objectives are fulfilled rather than precise headings of the client's region.

[1]  Pratibha Rani,et al.  Big data analytics challenges to implementing the intelligent Industrial Internet of Things (IIoT) systems in sustainable manufacturing operations , 2023, Technological Forecasting and Social Change.

[2]  Ambrish Sharma,et al.  A Taxonomy towards Blockchain based Multimedia content Security , 2022, 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT).

[3]  Ashish Tiwari,et al.  A Taxonomy towards fog computing Resource Allocation , 2022, 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT).

[4]  Ashish Tiwari,et al.  Attack Detection Taxonomy System in cloud services , 2022, 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT).

[5]  Shenmin Zhang,et al.  Efficient Gaussian Kernel Microcluster Real-Time Clustering Method for Industrial Internet of Things (IIoT) Streams , 2022, IEEE Internet of Things Journal.

[6]  Govind P. Gupta,et al.  BDTwin: An Integrated Framework for Enhancing Security and Privacy in Cybertwin-Driven Automotive Industrial Internet of Things , 2022, IEEE Internet of Things Journal.

[7]  Govind P. Gupta,et al.  P2TIF: A Blockchain and Deep Learning Framework for Privacy-Preserved Threat Intelligence in Industrial IoT , 2022, IEEE Transactions on Industrial Informatics.

[8]  Udit Mamodiya,et al.  Detection of recurring vulnerabilities in computing services , 2022, Journal of Discrete Mathematical Sciences and Cryptography.

[9]  Dinesh Singh,et al.  Chaos based image encryption security in cloud computing , 2022, Journal of Discrete Mathematical Sciences and Cryptography.

[10]  K. Kotecha,et al.  An efficient, provably-secure DAG based consensus mechanism for industrial internet of things , 2022, International Journal on Interactive Design and Manufacturing (IJIDeM).

[11]  C. Diwaker,et al.  Efficient Opportunities and Boundaries towards Internet of Things (IoT) Cost Adaptive Model , 2022, 2022 IEEE Delhi Section Conference (DELCON).

[12]  M. Rafsanjani,et al.  Digital Watermarking-Based Cryptosystem for Cloud Resource Provisioning , 2022, Int. J. Cloud Appl. Comput..

[13]  Ashish Tiwari,et al.  A Optimized Taxonomy on Spot Sale Services Using Mathematical Methodology , 2022, Int. J. Secur. Priv. Pervasive Comput..

[14]  Ashish Tiwari,et al.  Reservation System for Cloud Computing Resources (RSCC): Immediate Reservation of the Computing Mechanism , 2022, Int. J. Cloud Appl. Comput..

[15]  Ashish Tiwari,et al.  Orrs Orchestration of a Resource Reservation System Using Fuzzy Theory in High-Performance Computing: Lifeline of the Computing World , 2022, Int. J. Softw. Innov..

[16]  Ashish Tiwari,et al.  Adaptive Ontology-Based IoT Resource Provisioning in Computing Systems , 2022, International Journal on Semantic Web and Information Systems.

[17]  Zhen Ying,et al.  An Overview of Computational Models for Industrial Internet of Things to Enhance Usability , 2021, Complex..

[18]  Rupinder Kaur,et al.  Optimization classification of sunflower recognition through machine learning , 2021 .

[19]  K. Vijayakumar Concurrent Engineering: Research and Applications (CERA)– An international journal: Special issue on “Data Analytics in Industrial Internet of Things (IIoT)” , 2021, Concurrent Engineering - Research and Applications.

[20]  Manjusha Pandey,et al.  IIoT: A Survey and Review of Theoretical Concepts , 2020, Interoperability in IoT for Smart Systems.

[21]  Awais Ahmed,et al.  A novel and secure attacks detection framework for smart cities industrial internet of things , 2020 .

[22]  Jacques Jansen,et al.  A Framework for Industrial Internet of Things , 2020, I3E.

[23]  B. Muthusenthil,et al.  A reliable next generation cyber security architecture for industrial internet of things environment , 2020 .

[24]  Dong-Seong Kim,et al.  Toward Reliable Fog Computing Architecture for Industrial Internet of Things , 2019 .

[25]  Sarvesh Kumar Kumar,et al.  Security Challenges and Application for Underwater Wireless Sensor Network , 2018 .

[26]  Joe Cunningham,et al.  The industrial internet of things (IIoT): An analysis framework , 2018, Comput. Ind..

[27]  Leandros A. Maglaras,et al.  Managing incident response in the industrial internet of things , 2018 .

[28]  Manal M. Khayyat,et al.  Blockchain enabled optimal Hopfield Chaotic Neural network based secure encryption technique for industrial internet of things environment , 2022, Alexandria Engineering Journal.

[29]  The Industrial Internet of Things Networking Framework , 2022 .

[30]  T. Chelladurai,et al.  The industrial internet of things (IIoT): An analysis framework for industry 4.0 applications , 2022, INTERNATIONAL CONFERENCE ON RESEARCH IN SCIENCES, ENGINEERING & TECHNOLOGY.

[31]  R. Suman,et al.  Upgrading the manufacturing sector via applications of Industrial Internet of Things (IIoT) , 2021, Sensors International.

[32]  Mamoona Humayun,et al.  Cyber Security and Privacy Issues in Industrial Internet of Things , 2021, Comput. Syst. Sci. Eng..

[33]  Sudip Misra,et al.  Deep Learning-Based Reliable Routing Attack Detection Mechanism for Industrial Internet of Things , 2021, Ad Hoc Networks.

[34]  Ritu Garg,et al.  ACCOS: A Hybrid Anomaly-Aware Cloud Computing Formulation-Based Ontology Services in Clouds , 2021, ISIC.

[35]  Ashish Tiwari,et al.  A Skywatch on the Challenging Gradual Progression of Scheduling in Cloud Computing , 2019, Lecture Notes in Electrical Engineering.

[36]  Ashish Tiwari,et al.  Eagle Techniques in Cloud Computational Formulation , 2019, International Journal of Innovative Technology and Exploring Engineering.

[37]  Megan Kline,et al.  Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting , 2017, IoTBDS.

[38]  Ashish Tiwari,et al.  Efficient Service Utilization in Cloud Computing Exploitation Victimization as Revised Rough Set Optimization Service Parameters , 2015 .