2Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography

Ambika N.

Department of Computer Science and Applications, St. Francis College, Bangalore, India


In the previous design, the centre layer of the organization has programming characterized by organizing hubs that precisely manage the organization. Before sending the information of end gadgets of the base layer to the cloud, registering disposes of all possibly terrible and uncertain items to lessen the heap of the cloud. The medical care subsystem partitions deal with observing patient information in a restricted region. A patient wearing brilliant gear can send various snippets of data about its area. The system uses QKD’s BB84 encryption procedure. The suggestion uses a better encryption methodology, which also acts as an identification. The medical services framework in a restricted region can get the patent’s record through that brilliant gadget. The fog hub screens and controls the well-being information of the patient. Assuming the patient requires help, this framework can give the patient information and plans with the patient’s clinical history. Emergency clinics must verify the information by putting the patient’s clinical id on the server. The fog hub has a clever secure health care control calculation. The mist hub plays out a few significant advances. The suggestion generates the private key using the device identification and Merkle tree algorithm. The identification is used ...

Get Quantum Computing in Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.