Bioscience Biotechnology Research Communications

An International  Peer Reviewed Refereed Open Access Journal

P-ISSN: 0974-6455 E-ISSN: 2321-4007

Bioscience Biotechnology Research Communications

An Open Access International Journal

Kiran Kumar Chandriah1, Tasneem Bano Rehman2, G. Karthikeyan3,
Preetha Dulles4, Dinku Worku Debele
5  and P. John Augustine6

1Project Manager, Mercedes Benz Research and Development India Pvt. Ltd., Bangalore, Karnataka, India.

2Associate Professor, Department of Computer Science and Engineering, SAGE University, Bhopal, Madhya Pradesh, India.

3Associate Professor, Department of EEE, Sona College of Technology, Salem, Tamil Nadu, India.

4Assistant Professor, Department of Electrical and Computer Engineering, Madda
Walabu University, Madda Walabu University, Bale Robe, Ethiopia.

5Lecturer and Head, Department of Electrical and Computer Engineering, Madda Walabu
University, Madda Walabu University, Bale Robe, Ethiopia.

6Associate Professor, Department of Computer Science and Engineering, Sri Eshwar
College of Engineering, Coimbatore, Tamil Nadu, India.

Correspionding author email: kiran.chandriah@gmail.com

Article Publishing History

Received: 12/05/2021

Accepted After Revision: 17/07/2021

ABSTRACT:

The conventional methods restricts the number of transactions which enters the global SVM-GMM by implementing a scalable local ledger, but compromising on the peer validation of transactions at local and global level. In this paper, we analyse the security of IoT using privacy based algorithm.  It aims at studying the block chain as a potential solution to secure IoT data management within supply chains in Telehealth. It integrate privacy based algorithm for data management that includes: collection, validation, storage and analysis. The study integrates security algorithm in IoT devices using a closed-loop model, which is developed to address the security related concerns in IoT devices in supply chain. The validation shows that the proposed security protocol offers improved data privacy and integrity than the other security mechanisms.

KEYWORDS:

SVM-GMM, Iot, Privacy Based Algorithm, Closed-Loop Model

Download this article as:

Copy the following to cite this article:


Copy the following to cite this URL: