Enhancing Data Security in Fitness Tracker Using HAN Algorithm

被引:0
|
作者
Sudhakaran, Pradeep [1 ]
Preetha, M. [2 ]
Sindhu, V [3 ]
机构
[1] SRM Inst Sci & Technol, Sch Comp, Dept Comp Technol, Kattankulathur, Tamil Nadu, India
[2] SRM Inst Sci & Technol, Dept Career Dev Ctr, Kattankulathur, Tamil Nadu, India
[3] Sri Krishna Coll Engn & Technol, Dept Informat Technol, Coimbatore, Tamil Nadu, India
关键词
IoT; Surveillance; Hybrid Algorithm; Privateness; Fitness Tracker; Dactylogram; INTERNET;
D O I
10.47750/pnr.2022.13.S03.075
中图分类号
R9 [药学];
学科分类号
1007 ;
摘要
There are some people who are interested in the Internet of things (IoT), which is a cutting-edge technology that people are interested in. People who use the Internet of Things like it because it makes them more aware, sends information reliably, and processes things quickly. People who build things should use small tools that don't have a lot of power. Typical encryption designs are very complicated because they have a lot of different parts. It takes a lot of time to encrypt, which hurts the energy of the devices. Amalgam encryption is a cutting-edge method that can be used in IoT. This type of encryption leads to a lot of surveillance and little data processing. In this work, we have scheduled to use the amalgam encryption approach which has been supervised so as to diminish safety perils and reinforcing encryption's speed and less calculation intricacy in a fitness tracker made for the army people which will track various health aspects of the army personals, encrypt the data using the hybrid algorithm and store it in the cloud which can only be accessed by giving the fingerprint of the registered officers in order to authenticate the user and keep the individual personals data safe. The fundamental idea of the project is to implement an IoT sensor network along with the security aspect of the data being the primary concern.
引用
收藏
页码:460 / 464
页数:5
相关论文
共 50 条
  • [21] Enhancing Data Security in Cloud Using Split Algorithm, Caesar Cipher, and Vigenere Cipher, Homomorphism Encryption Scheme
    Singh, Abhishek
    Sharma, Shilpi
    EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 157 - 166
  • [22] Enhancing Data Security in video Steganography using Face Recognition
    Patil, Alaknanda S.
    Sundari, G.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (08): : 134 - 144
  • [23] Enhancing Data Security Using Steganography in Spatial Domain Images
    Wahono, Dimas
    Rahman, Hilmy
    Syarif, Hisyam
    De La Croix, Ntivuguruzwa Jean
    Ahmad, Tohari
    2nd International Conference on Emerging Trends in Information Technology and Engineering, ic-ETITE 2024, 2024,
  • [24] Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm
    Mahalle, Vishwanath S.
    Shahade, Aniket K.
    2014 INTERNATIONAL CONFERENCE ON POWER, AUTOMATION AND COMMUNICATION (INPAC), 2014, : 146 - 149
  • [25] Enhancing Data Warehouses Security
    Alkhubouli, Muhanad A.
    Lala, Hany M.
    AlHabshy, AbdAllah A.
    ElDahshan, Kamal A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (03) : 574 - 580
  • [26] Enhancing Security for Multimodal Biometric using Hyper Image Encryption Algorithm
    Nivetha, K.
    Saraswady, D.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 943 - 947
  • [27] Enhancing the Security of Data Stored in the Cloud using customized Data Visualization Patterns
    Archana, M.
    Murtugudde, Gururaj
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (06) : 604 - 610
  • [28] Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy
    Eghmazi, Ali
    Ataei, Mohammadhossein
    Landry, Rene, Jr.
    Chevrette, Guy
    IOT, 2024, 5 (01): : 20 - 34
  • [29] Enhancing Radio Frequency Identification Systems Security using KLEIN algorithm
    Gautam, Grishma Raj
    Murali, Varshini
    AbdAllah, Eslam G.
    2023 IEEE 13TH INTERNATIONAL CONFERENCE ON RFID TECHNOLOGY AND APPLICATIONS, RFID-TA, 2023, : 103 - 106
  • [30] Data Security Algorithm Using Circular Queue and Graycode
    Sumayya, K. A.
    Abraham, Jisha P.
    PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 993 - 1004