1. RETRACTED ARTICLE: Registry service selection based secured Internet of Things with imperative control for industrial applications
- Author
-
R. Nallusamy and P. Kanagaraju
- Subjects
Information privacy ,Cloud computing security ,Computer Networks and Communications ,Computer science ,business.industry ,media_common.quotation_subject ,RSS ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Enterprise information security architecture ,computer.file_format ,Computer security model ,Computer security ,computer.software_genre ,0202 electrical engineering, electronic engineering, information engineering ,Data Protection Act 1998 ,020201 artificial intelligence & image processing ,Quality (business) ,business ,computer ,Software ,media_common - Abstract
The Internet of Things (IoT) technology is currently growing various perspectives on human life. Automated liquid industrial measurement is one of the models which can use the IoT services to optimize the composition performance and regularity across the liquid industrial regions, maximizing the quality of the process measurements, and minimize the negative impact using imperative control algorithm. In this work, we present an IoT architecture customized for industrial applications. The proposed register service selection based security architecture collects the required data and transmits it to a cloud-based back-end where it is processed and analyzed. In this work, register service selection (RSS) based cloud data security algorithm with imperative control procedure is developed to get rid of the existing stated problems. The protection, data privacy, and integrity that serve as a comprehensive guide for achieving higher data protection level in the clouds. The models cover a maximum of the features of reliable clouds, including security and privacy conditions, attacks and warnings that clouds are vulnerable to and the risks and concerns about cloud security. Moreover, we advise a generic security model for cloud computing that helps meet their safety demands and defend the clouds into various malicious behaviors. Feedback operations based on the analyzed data can be sent back to the front-end nodes. Finally, a prototype of the proposed structure to show its appearance advantages.
- Published
- 2018