À propos de cet article

Citez

Figure 1

Client module.
Client module.

Figure 2

System architecture.
System architecture.

Figure 3

System architecture in DFD.
System architecture in DFD.

Figure 4

Use case diagram.
Use case diagram.

Figure 5

Cloud server login.
Cloud server login.

Figure 6

Client side Login.
Client side Login.

Figure 7

Admin login.
Admin login.

Figure 8

Successful login.
Successful login.

Figure 9

(a–c) Data storage details.
(a–c) Data storage details.

Validation and verification results of the proposed model of resilience to the failures and attacks.

Performance metrics Byzantine failure Malicious data modification attack Even server colluding attacks
Attack level rate 5.6 7.5 6.3
Security level rate 91.5 89.6 90.8
Classification accuracy (%) 95.7 94 97.6
Attack detection rate 0.91 0.896 0.935

Performance analysis.

Performance metrics Attack types ECC-BF (Chinnasamy et al., 2021) AE-SRA (Abdullayeva, 2021) ODN (Velliangiri et al., 2021) SDE with SPIaaS (Shaikh and Meshram, 2021) DS-EL (Su et al., 2021) DS with EDDS (Proposed)
Attack level rate Byzantine failure 25 16.5 23.6 19 23 5.6
Malicious data modification attack 23.6 18.95 26.7 21.5 25 7.5
Even server colluding attacks 19.6 15.8 25.7 18.7 21.8 6.3
Security level rate Byzantine failure 73.5 68.4 55.6 58.9 76.8 91.5
Malicious data modification attack 78.6 75.4 59.3 55.7 68.04 89.6
Even server colluding attacks 71.65 71.54 63.6 53.9 73.8 90.8
Classification Accuracy (%) Byzantine failure Malicious data 73 85.6 60.8 78 83 95.7
modification attack 75.7 81.5 70.2 76.5 82 94
Even server colluding attacks 65.4 78.7 73.5 68.5 79 97.6
eISSN:
1178-5608
Langue:
Anglais
Périodicité:
Volume Open
Sujets de la revue:
Engineering, Introductions and Overviews, other