z-logo
open-access-imgOpen Access
Data Security using Trust by Integrating WSN and CC and Reputation Calculation Technique
Author(s) -
Buddesab,
J Thriveni,
K R Venugopan
Publication year - 2019
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.f8334.109119
Subject(s) - cloud computing , computer science , computer security , reputation , wireless sensor network , cloud computing security , service provider , computer network , the internet , data security , service (business) , encryption , world wide web , business , social science , marketing , sociology , operating system
Integration of Cloud Computing and Wireless Sensor Network led tremendous growth in the development of Information Technology, during the trust and reputation of service providers for information technology play an essential role. Cloud computing is web-based computing was in the services based on the internet such as data, storage, and computing resources are delivered to the local devices through the internet. Wireless sensor network deals with monitoring, gathering of the information about the physical or environmental conditions. The integration of these two domains has tremendous advantages to improve the business infrastructure and performance worldwide. The security of data on the cloud and calculation of trust and reputation of the Cloud Service Provides (CSP) and Sensor Network Providers (SNP) are the issues for this new paradigm. To fulfill these issues This paper presents novel techniques, for 1) trust and reputation calculation 2) data security on cloud 3) choosing desirable CSP and SNP for the service. This paper proposes Data Security by taking into account the services of Wireless Sensor Network (WSN) and Cloud Service Providers. Our experimental results help users to choose the best service providers in case of both Cloud and Wireless Sensor Network. In addition to that, data security is provided using a data encryption algorithm.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here