A Privacy-Preserving Message Forwarding Framework with key caching for low latency
Prasanthi G1, G Srinivasa Rao2

1S.Dhanasekar*, Vellore Institute of Technology , Chennai Campus, Chennai (Tamil Nadu), India.
Manuscript received on September 16, 2019. | Revised Manuscript received on 24 September, 2019. | Manuscript published on October 10, 2019. | PP: 886-895 | Volume-8 Issue-12, October 2019. | Retrieval Number: I82520981119/2019©BEIESP | DOI: 10.35940/ijitee.I8252.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: For exchanging messages over opportunistic exchanges in cloud calculating-empowered Internet of Things (IoT), opportunistic Cloud of Things (CoT) is encouraging for customers by means of an emergent conveying policy. In recent times, for predicting upcoming interactions by the determination of enlightening message promoting effectiveness as well as system quantity, several informally-awake structures have been placed onward, influencing consumers’ communal features as well as interaction account. Nevertheless, in the extrapolation procedure as well as communication phase of unprincipled CoT distinct secrecy remains commonly ignored. Towards assuring distinct secrecy as well as improving communication effectiveness, in this broadsheet, we develop a secrecy preservative communication promoting context aimed at unprincipled CoT. For improving transmission effectiveness of incurable customers, we mainly assemble twofold-level design of a cloud server. The proposed method can efficiently safeguard distinct secrecy through incorporating a safety-centered flexibility extrapolation procedure using an overpowering assessment procedure. This paper also introduces data key caching to reduce the latency during the transmission process. The proposed method outperforms the conventional methods.
Keywords: Cloud of Things, Individual Privacy, Mobility Prediction, Message Forwarding, Opportunistic Networking, key Caching.
Scope of the Article: Cloud of Things