Radius divergence optimized round hash index blockchain-based transaction-secured unified data in smart environment

Uloženo v:
Podrobná bibliografie
Vydáno v:EURASIP Journal on Wireless Communications and Networking vol. 2025, no. 1 (Dec 2025), p. 60
Hlavní autor: Selvi, T. Kalai
Další autoři: Sasirekha, S.
Vydáno:
Springer Nature B.V.
Témata:
On-line přístup:Citation/Abstract
Full Text
Full Text - PDF
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!

MARC

LEADER 00000nab a2200000uu 4500
001 3238847528
003 UK-CbPIL
022 |a 1687-1472 
022 |a 1687-1499 
024 7 |a 10.1186/s13638-025-02489-2  |2 doi 
035 |a 3238847528 
045 2 |b d20251201  |b d20251231 
084 |a 130323  |2 nlm 
100 1 |a Selvi, T. Kalai  |u Erode Sengunthar Engineering College, Department of CSE, Perundurai, Erode, India (GRID:grid.252262.3) (ISNI:0000 0001 0613 6919) 
245 1 |a Radius divergence optimized round hash index blockchain-based transaction-secured unified data in smart environment 
260 |b Springer Nature B.V.  |c Dec 2025 
513 |a Journal Article 
520 3 |a In the guise of numerous mobile gadgets and IoT devices associated to the Internet a huge amount of data called, unified data structure is generated in different forms. With the intention of coping with the coercion of storing and assessing tremendous amounts of unified data both locally and globally, data owners generally store them in cloud servers. However, the data owner will lose control of this unified data and it will be at the fear of being vandalized with and deleted. To address on these issues, in this article, a Radius Divergence-optimized and Round Hash Index Blockchain-based (RD-RHIB) transaction-secured unified data is proposed. The RD-RHIB transaction-secured unified data model is split into two sections, namely optimization and transaction security. First, Shannon Information Radius Divergence-based Unified Storage Optimization is applied to the unified stored data to ensure optimal unified data storage for further analysis. Second, Round Hash Index Asymmetric Key Blockchain-based transaction security model is designed. To this end, unification employs blockchain ledger for efficiently transmitted access permissions that grant exchange of data instead of the transfer of data itself. Followed by which complicated mathematical problems are to be solved to group validated transactions into blocks and include them into blockchain ledger. Upon successful meeting of the conditions, transaction is said to be executed and recorded on the blockchain. A suite of experiments are validated and analyzed to verify the proposed RD-RHIB method’s service availability, reliability and scalability. According to the results of the performance analysis, our RD-RHIB method has the highest data confidentiality with an improvement of 38%, data integrity improvement of 28% when compared to other conventional methods. 
653 |a Accuracy 
653 |a Data integrity 
653 |a Deep learning 
653 |a Datasets 
653 |a Internet of Things 
653 |a Distributed network protocols 
653 |a Artificial intelligence 
653 |a Communication 
653 |a Optimization techniques 
653 |a Data structures 
653 |a Confidentiality 
653 |a Blockchain 
653 |a Optimization 
653 |a Design 
653 |a Data storage 
653 |a Information sharing 
653 |a Privacy 
653 |a Access control 
653 |a Cybersecurity 
700 1 |a Sasirekha, S.  |u National Institute of Technical Teachers Training and Research, Department of CSE, Chennai, India (GRID:grid.466947.e) (ISNI:0000 0004 0423 0647) 
773 0 |t EURASIP Journal on Wireless Communications and Networking  |g vol. 2025, no. 1 (Dec 2025), p. 60 
786 0 |d ProQuest  |t Advanced Technologies & Aerospace Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3238847528/abstract/embedded/IZYTEZ3DIR4FRXA2?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3238847528/fulltext/embedded/IZYTEZ3DIR4FRXA2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3238847528/fulltextPDF/embedded/IZYTEZ3DIR4FRXA2?source=fedsrch