Statistics
53
Views
0
Downloads
0
Donations
Support
Share
Uploader

高宏飞

Shared on 2025-12-07

AuthorDeepa Jose, Preethi Nanjundan, Sanchita Paul, Sachi Nandan Mohanty

The purpose of this book is to discuss the trends and key drivers of Internet of Things and AI for automation in Industry 4.0. IoT and AI are transforming the industry thus accelerating efficiency and forging a more reliable automated enterprise. AI-Driven IoT Systems for Industry 4.0, explores current research to be carried out in the cutting edge areas of AI for advanced analytics, integration of IIoT solutions and Edge components, automation in cyber-physical systems, world leading Industry 4.0 frameworks and adaptive supply chains etc. The book is broken up into five parts. Part one provides an overview of Industry 4.0, it describes the challenges in digital transformation and automation. Part two discusses digital connectivity and sensors. Part three explores intelligent thinking and data science for Industy 4.0, and AI for optimal decision making. Part four of the book explores automation in Industry 4.0 and hybrid edge computing architecture for automation. The last part examines industrial IOT and edge AI. It presents edge AI powered visual insights using cloud computing for smart factories. It also discusses the potential use of AI in construction of digital twins for speeding up product development lifecycles to identify and predict potential production problems based on sensor data and to suggest decisions in design or process changes in smart factory. The book provides insights into role of deep learning and AI in speeding up product development lifecycles through automation. This book is intended for undergraduates, postgraduates, academicians, researchers, and industry professionals in industrial and computer engineering.

Tags
No tags
ISBN: 1032554150
Publisher: CRC Press
Publish Year: 2025
Language: 英文
Pages: 419
File Format: PDF
File Size: 15.6 MB
Support Statistics
¥.00 · 0times
Text Preview (First 20 pages)
Registered users can read the full content for free

Register as a Gaohf Library member to read the complete e-book online for free and enjoy a better reading experience.

(This page has no text content)
AI-Driven IoT Systems for Industry 4.0 The purpose of this book is to discuss the trends and key drivers of Internet of Things (IoT) and artificial intelligence (AI) for automation in Industry 4.0. IoT and AI are transforming the industry thus accelerating efficiency and forging a more reliable automated enterprise. AI-driven IoT systems for Industry 4.0 explore current research to be carried out in the cutting-edge areas of AI for advanced analytics, integration of industrial IoT (IIoT) solutions and Edge components, automation in cyber-physical systems, world leading Industry 4.0 frameworks and adaptive supply chains, etc. A thorough exploration of Industry 4.0 is provided, focusing on the challenges of digital transformation and automation. It covers digital connectivity, sensors, and the integration of intelligent thinking and data science. Emphasizing the significance of AI, the chapter delves into optimal decision-making in Industry 4.0. It exten- sively examines automation and hybrid edge computing architecture, highlighting their applications. The narrative then shifts to IIoT and edge AI, exploring their convergence and the use of edge AI for visual insights in smart factories. The book concludes by discussing the role of AI in constructing digital twins, speeding up product development lifecycles, and offering insights for decision-making in smart factories. Throughout, the emphasis remains on the transformative impact of deep learning and AI in automating and accelerating manufacturing processes within the context of Industry 4.0. This book is intended for undergraduates, postgraduates, academicians, researchers, and industry professionals in industrial and computer engineering.
For more information about this series, please visit: https://www.routledge.com/ Edge-AI-in-Future-Computing/book-series/EAIFC Edge AI in Future Computing Series Editors: Arun Kumar Sangaiah, SCOPE, VIT University, Tamil Nadu Mamta Mittal, G. B. Pant Government Engineering College, Okhla, New Delhi AI-Driven IoT Systems for Industry 4.0 Deepa Jose, Preethi Nanjundan, Sanchita Paul, and Sachi Nandan Mohanty Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research Chhabi Rani Panigrahi, Victor Hugo C. de Albuquerque, Akash Kumar Bhoi, and Hareesha K. S. Soft Computing Techniques in Engineering, Health, Mathematical and Social Sciences Pradip Debnath and S. A. Mohiuddine Machine Learning for Edge Computing: Frameworks, Patterns and Best Practices Amitoj Singh, Vinay Kukreja, and Taghi Javdani Gandomani Internet of Things: Frameworks for Enabling and Emerging Technologies Bharat Bhushan, Sudhir Kumar Sharma, Bhuvan Unhelkar, Muhammad Fazal Ijaz, and Lamia Karim Soft Computing: Recent Advances and Applications in Engineering and Mathematical Sciences Pradip Debnath, Oscar Castillo, and Poom Kumam Computational Statistical Methodologies and Modeling for Artificial Intelligence Priyanka Harjule, Azizur Rahman, Basant Agarwal, and Vinita Tiwari
AI-Driven IoT Systems for Industry 4.0 Edited by Deepa Jose, Preethi Nanjundan, Sanchita Paul, and Sachi Nandan Mohanty
Cover image: © Shutterstock First edition published 2025 by CRC Press 2385 NW Executive Center Drive, Suite 320, Boca Raton FL 33431 and by CRC Press 4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN CRC Press is an imprint of Taylor & Francis Group, LLC © 2025 selection and editorial matter, Deepa Jose, Preethi Nanjundan, Sanchita Paul, and Sachi Nandan Mohanty, individual chapters, the contributors Reasonable efforts have been made to publish reliable data and information, but the author and pub- lisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or here- after invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978- 750-8400. For works that are not available on CCC please contact mpkbookspermissions@tandf.co.uk Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. ISBN: 978-1-032-55415-0 (hbk) ISBN: 978-1-032-55805-9 (pbk) ISBN: 978-1-003-43231-9 (ebk) DOI: 10.1201/9781003432319 Typeset in Times LT Std by KnowledgeWorks Global Ltd.
v Contents About the Editors ......................................................................................................ix List of Contributors ...................................................................................................xi Preface......................................................................................................................xv Chapter 1 A Novel Hybrid Approach Based on Attribute-Based Encryption for Secured Message Transmittal for Sustainably Smart Networks ................................................................1 Sucheta Panda, Sushree Bibhuprada B. Priyadarshini, Biswa Mohan Acharya, Tripti Swarnkar, and Sachi Nandan Mohanty Chapter 2 Object Detection Using Deep Learning (DL) and OpenCV Approach .............................................................................23 Ajit Kumar Mahapatra, Sushree Bibhuprada B. Priyadarshini, Lokesh Kumar Nahata, Smita Rath, Nikhil Singh, Shatabdi Chakraborty, Jyotirmayee Pradhan, Sachi Nandan Mohanty, and Prabhat Sahu Chapter 3 Enhancing Industrial Operations through AI-Driven Decision-Making in the Era of Industry 4.0 ...................................... 42 Chapter 4 Acne Detection Using Convolutional Neural Networks and Image-Processing Technique ....................................................... 56 Premanand Ghadekar, Aniket Joshi, Atharv Vanjari, Mohammed Raza, Shubhankar Gupta, and Anagha Gajaralwar Chapter 5 Key Driving Technologies for Industry 4.0 ........................................ 70 Anesh D Sundar ArchVictor and C. Emilin Shyni Chapter 6 Opportunities and Challenges of Digital Connectivity for Industrial Internet of Things .........................................................97 Mahesh Visveshwarappa Chapter 7 Malicious QR Code Detection and Prevention ................................ 103 Premanand Ghadekar, Faijan Momin, Tushar Nagre, Sanika Desai, Prathamesh Patil, and Vinay Aher Prakruthi R Rai, Preethi Nanjundan, and Jossy Paul George
vi Contents Chapter 8 Integration of Advanced Technologies for Industry 4.0 ................... 114 Tanmay Paliwal, Aditya Sikdar, and Zidan Kachhi Chapter 9 Challenges in Digital Transformation and Automation for Industry 4.0 ................................................................................. 143 Manjari Sharma, Tanmay Paliwal, and Payashwini Baniwal Chapter 10 Design and Analysis of Embedded Sensors for IIoT: A Systematic Review ........................................................................... 164 Kogila Raghu and Macharla Mounika Chapter 11 AI for Optimal Decision-Making in Industry 4.0 ............................ 185 Ravichandran Bargavi Chapter 12 Challenges in Lunar Crater Detection for TMC-2 Obtained DEM Image Using Ensemble Learning Techniques ........................206 Sanchita Paul, Chinmayee Chaini, and Sachi Nandan Mohanty Chapter 13 A Framework of Intelligent Manufacturing Process by Integrating Various Function ........................................................... 241 T. Rajasanthosh Kumar, Laxmaiah G., and S. Solomon Raj Chapter 14 Adaptive Supply Chain Integration in Smart Factories ................... 255 Deepak Mathivathanan and Sivakumar Kirubanandan Chapter 15 Implementation of Intelligent CPS for Integrating the Industry and Manufacturing Process ............................................... 273 T. Rajasanthosh Kumar, Mahesh. M. Kawade, Chapter 16 Machine-Learning-Enabled Stress Detection in Indian Housewives Using Wearable Physiological Sensors ........................ 289 Shruti Gedam and Sanchita Paul Chapter 17 Rising of Dark Factories due to Artificial Intelligence ....................304 Anjali Mathur Gaurav Kumar Bharti, and Laxmaiah G.
viiContents Chapter 18 Deep Learning for Real-Time Data Analysis from Sensors ............ 315 Sagar C V, Harshit Bhardwaj, and Anupama Bhan Chapter 19 Blockchain as a Controller of Security in Cyber-Physical Systems: A Watchdog for Industry 4.0 ............................................. 339 Adri Jovin John Joseph, Marikkannan Mariappan, and Marikkannu P Chapter 20 Energy Management in Industry 4.0 Using AI ................................ 349 Jeevitha D, Deepa Jose, Sachi Nandan Mohanty, and A. Latha Chapter 21 Deployment of IoT with AI for Automation .....................................364 Abith Kizhakkemuri Sunil, Preethi Nanjundan, and Jossy Paul George Chapter 22 A Comparison of the Performance of Different Machine Learning Algorithms for Detecting Face Masks ............................. 382 Andra Likhith Sai, Gona Jordan Ryan, Namoju Prudhvi Sai, and Neeraj Kumar Misra Index ...................................................................................................................... 399
(This page has no text content)
ix About the Editors Dr. Deepa Jose works as Head of Department of Sponsored Research and Consultancy and Professor of ECE at KCG College of Technology, Chennai, India, and is an IEEE Senior Member and IEEE Women in Engineering Chair. She has done various outreach activities for women empowerment through IEEE WIE. She has completed Ph.D. in VLSI Design from College of Engineering Guindy, Anna University Chennai in the year 2015. She is a life time member of IEI and IET. She has more than 18 years of teaching experience. She has Guideship from Anna University and produced one Ph.D. student and currently guiding eight Ph.D. students. She has Indian Patent Granted, two FER completed and one International Patent Grant. She has published more than 60 research papers in Journals, International Conferences in India and abroad. She is a member of Technical Committees of conferences and journals. Her areas of research interest include VLSI for wireless communication, deep learning, biomedical signal processing, IoT for healthcare, GIS initiatives, soft computing, and AI. She is recipient of Best Academic Practitioner Award from IET Chennai and IEEE Award for Professional Achievement. Deepa Jose has conducted 3 International Conferences and more than 30 Fdps/workshops/webinars. She has won three Best Paper awards. She has won two Best Research Paper Awards in the Fifth International Congress and Expo on Biotechnology and Bioengineering held in the United Kingdom and at IEEE INDISCON 2023 conducted by IEEE India Council. Dr. Preethi Nanjundan is an Associate Professor (SRG) in the Department of Data Science at Christ University, Pune, Lavasa campus, Maharashtra, India. She received her Doctorate degree from Bharathiar University, Coimbatore, in 2014. She received her Master of Philosophy in computer science from Bharathiar University in 2007 and earned Master’s degree in Computer Applications from Bharathidasan University in 2004. Her research and teaching experience spans 18 years. Besides publishing over 20 papers in international refereed journals, she has contributed chapters to various books and published 5 books. Four of her patents have also been granted. In 2020, she received the Best Professor award from Lead India and Vision Digital India. Her contributions to a book titled “Covid 19 and its Impact” have been inducted into the Indian and Asian books of records. Her research area includes machine learning, natural language processing, and neural network. She is a lifetime member of professional societies, including Computer Society of India (CSI), International Association of Computer Science and Information Technology (IACSIT), Computer Science Teachers Association, and Indian Society for Technical Education (ISTE). Dr. Sanchita Paul is presently working as Associate Professor in BIT Mesra, Ranchi, Jharkhand. She received her Ph.D. Degree from BIT Mesra, Ranchi, Jharkhand, in the year January 2012. She received her M. Tech Degree from BIT Mesra, Ranchi, Jharkhand, in the year 2006 and BE Degree from Burdwan University, West Bengal,
x About the Editors in the year of 2004. Her research areas include artificial intelligence, cloud comput- ing, Internet of Things, machine learning and deep learning. She has guided five Ph.D. Scholars. She has published 60 International Journals of International repute. She also has six patents in area of health informatics, IoT and Cloud Computing. She has acted as session chair and editorial member of many international journals and conferences. She has published one book on cloud computing in Scholar’s Press, Germany and five book chapters. She has completed two projects and one ISRO- funded project is ongoing. She is life member of CSI. She is principal investigator in setting of cloud computing lab at BIT Mesra, Ranchi. Dr. Sachi Nandan Mohanty received his PostDoc from IIT Kanpur in the year 2019 and Ph.D. from IIT Kharagpur, India, in the year 2015, with MHRD scholar- ship from Govt of India. He has authored/edited 28 books, published by IEEE-Wiley, Springer, Wiley, CRC Press, NOVA, and DeGruyter. His research areas include data mining, big data analysis, cognitive science, fuzzy decision making, brain-computer interface, cognition, and computational intelligence. Prof. S N Mohanty has received four Best Paper Awards during his Ph.D. at IIT Kharagpur from International Conference at Beijing, China, and the other at International Conference on Soft Computing Applications organized by IIT Roorkee in the year 2013. He has awarded best thesis award first prize by Computer Society of India in the year 2015. He has guided nine Ph.D. scholars. He has published 120 International Journals of International repute and has been elected as FELLOW of Institute of Engineers, European Alliance Innovation (EAI), and Senior member of IEEE Computer Society Hyderabad chapter. He is also the reviewer of Journal of Robotics and Autonomous Systems (Elsevier), Computational and Structural Biotechnology Journal (Elsevier), Artificial Intelligence Review (Springer), Spatial Information Research (Springer).
xi List of Contributors Biswa Mohan Acharya Siksha ‘O’ Anusandhan University Bhubaneswar, Odisha, India Vinay Aher Vishwakarma Institute of Technology Pune, Maharashtra, India Payashwini Baniwal CHRIST (Deemed to be University) Lavasa Campus, Lavasa, Pune, Maharashtra, India Anupama Bhan Amity University Uttar Pradesh Noida, Uttar Pradesh, India Harshit Bhardwaj Amity University Uttar Pradesh Noida, Uttar Pradesh, India Sushree Bibhuprada B. Priyadarshini Siksha O’ Anusandhan University Bhubaneswar, Odisha, India Sagar C. V. Amity University Uttar Pradesh Noida, Uttar Pradesh, India Chinmayee Chaini Birla Institute of Technology Mesra Ranchi, Jharkhand, India Shatabdi Chakraborty Siksha O’ Anusandhan University Bhubaneswar, Odisha, India Jeevitha Damotharan Jeppiaar Engineering College Chennai, Tamil Nadu, India Sanika Desai Vishwakarma Institute of Technology Pune, Maharashtra, India Laxmaiah G Chaitanya Bharathi Institute of Technology Hyderabad, Telangana, India Anagha Gajaralwar Vishwakarma Institute of Technology Pune, Maharashtra, India Shruti Gedam Birla Institute of Technology Mesra Ranchi, Jharkhand, India Jossy Paul George CHRIST University Bengaluru, Karnataka, India Premanand Ghadekar Vishwakarma Institute of Technology Pune, Maharashtra, India Shubhankar Gupta Vishwakarma Institute of Technology Pune, Maharashtra, India Adri Jovin John Joseph Sri Ramakrishna Institute of Technology Coimbatore, Tamil Nadu, India Aniket Joshi Vishwakarma Institute of Technology Pune, Maharashtra, India
xii List of Contributors Zidan Kachhi PES University RR Campus, Bengaluru, Karnataka, India Sivakumar Kirubanandan Loyola Institute of Business Administration Chennai, Tamil Nadu, India Abith Kizhakkemuri Sunil CHRIST (Deemed to be University) Lavasa Campus, Lavasa, Pune, Maharashtra, India Gaurav Kumar Bharti Bharti, Indian Institute of Information Technology Bhopal, Madhya Pradesh, India Ajit Kumar Mahapatra Siksha O’ Anusandhan University Bhubaneswar, Odisha, India M. Kawade Mahesh PES’s Modern College of Engineering Pune, Maharashtra, India Marikkannan Mariappan Government College of Engineering Erode, Tamil Nadu, India Deepak Mathivathanan Loyola Institute of Business Administration Chennai, Tamil Nadu, India Anjali Mathur Vellore Institute of Technology (VIT), Bhopal University Bhopal, Madhya Pradesh, India Sachi Nandan Mohanty Singidunum University Belgrade, Serbia Sachi Nandan Mohanty Siksha ‘O’ Anusandhan University Bhubaneswar, Odisha, India Faijan Momin Vishwakarma Institute of Technology Pune, Maharashtra, India Macharla Mounika DURA Automotive Services (I) Hyderabad, Telangana, India Preethi Nanjundan CHRIST (Deemed to be University) Lavasa Campus, Lavasa, Pune, Maharashtra, India Lokesh Kumar Nahata Siksha O’ Anusandhan University Bhubaneswar, Odisha, India Marikkannu P Anna University Regional Campus Coimbatore, Tamil Nadu, India Tanmay Paliwal CHRIST (Deemed to be University) Lavasa Campus, Lavasa, Pune, Maharashtra, India Sucheta Panda Siksha ‘O’ Anusandhan University Bhubaneswar, Odisha, India Prathamesh Patil Vishwakarma Institute of Technology Pune, Maharashtra, India Sanchita Paul Birla Institute of Technology Mesra Ranchi, Jharkhand, India Jyotirmayee Pradhan Siksha ‘O’ Anusandhan University Bhubaneswar, Odisha, India
xiiiList of Contributors Kogila Raghu Geethanjali College of Engineering & Technology Hyderabad, Telangana, India Tulala Rajasanthosh Kumar Puducherry Technological University Puducherry, India Smita Rath Siksha ‘O’ Anusandhan University Bhubaneswar, Odisha, India Bargavi Ravichandran SRM Institute of Science and Technology Kattankulathur Campus, Chengalpattu, Tamil Nadu, India Prakruthi Ravishanker Rai CHRIST (Deemed to be University) Lavasa Campus, Lavasa, Pune, Maharashtra, India Gona Jordan Ryan VIT-AP University Amaravathi, Andhra Pradesh, India Mohammad Raza Vishwakarma Institute of Technology Pune, Maharashtra, India Prabhat Sahu Siksha ‘O’ Anusandhan University Bhubaneswar, Odisha, India Andra Likhith Sai VIT-AP University Amaravathi, Andhra Pradesh, India Namoju Prudhvi Sai VIT-AP University Amaravathi, Andhra Pradesh, India C. Emilin Shyni Presidency University Bangalore, Karnataka, India Nikhil Singh Siksha ‘O’ Anusandhan University Bhubaneswar, Odisha, India Raj S Solomon Chaitanya Bharathi Institute of Technology Hyderabad, Telangana, India Manjari Sharma CHRIST (Deemed to be University) Lavasa Campus, Lavasa, Pune, Maharashtra, India Aditya Sikdar CHRIST (Deemed to be University) Lavasa Campus, Lavasa, Pune, Maharashtra, India Anesh D Sundar ArchVictor Northwest University, Hodos Institute Mukilteo, Washington, USA Abith Sunil CHRIST (Deemed to be University) Lavasa Campus, Lavasa, Pune, Maharashtra Tripti Swarnkar Siksha ‘O’ Anusandhan University Bhubaneswar, Odisha, India Atharv Vanjari Vishwakarma Institute of Technology Pune, Maharashtra, India Visveshwarappa Mahesh Bangalore, Karnataka, India Jain (Deemed-to-be University)
(This page has no text content)
xv Preface In the era of Industry 4.0, the convergence of artificial intelligence (AI) and the Internet of Things (IoT) has ushered in a transformative wave across industrial land- scapes. This book delves into the intricacies of AI-driven IoT systems, exploring their applications, benefits, and implications for the fourth industrial revolution. It embarks on a journey through the synergy of intelligent algorithms and intercon- nected devices, unraveling the potential to enhance efficiency, productivity, and decision-making in industrial settings. From predictive maintenance to smart manu- facturing, this book provides insights into the dynamic realm of AI-driven IoT, offer- ing readers a comprehensive understanding of the technologies shaping the future of industries. As professionals, researchers, and enthusiasts navigate the complexities of this digital frontier, the chapters unveil practical use cases, challenges, and inno- vations, aiming to equip readers with the knowledge needed to navigate and contrib- ute to the evolving landscape of Industry 4.0.
(This page has no text content)
1DOI: 10.1201/9781003432319-1 A Novel Hybrid Approach Based on Attribute-Based Encryption for Secured Message Transmittal for Sustainably Smart Networks Sucheta Panda, Sushree Bibhuprada B. Priyadarshini, Biswa Mohan Acharya, Tripti Swarnkar, and Sachi Nandan Mohanty 1.1 INTRODUCTION Nowadays, data security plays a crucial role in every domain of life. In this context, cryptography is a strategy for securing the information and communi- cation of the same with the help of certain codes, so that the destined user can read it and do the further processing at his own end. The term cryptography means hidden writing. Cryptography provides a strong base for keeping the data confidential while verifying data integrity. Asymmetric key cryptography and symmetric key cryptography are basically two types of algorithms used in the cryptographic process. In this research, asymmetric algorithm has been used, which is more secure and authentic than symmetric algorithm [1–7]. In this con- text, Rivest, Shamir, Adleman (RSA) algorithm has been employed as it comes under the umbrella of asymmetric algorithm that satisfies the integrity, confiden- tiality, and authenticity of data along with non-repudiation in case of electronic communication. Both the public and the private keys can encrypt a message in RSA cryptography. Here the inverse of the key is used to decrypt it [7–12]. Moreover, the ABE tool is used in cryptography where the shared file can only be encrypted once with the given policy and it can then be decrypted by any recipient who meets the requirement. 1
2 AI-Driven IoT Systems for Industry 4.0 ABE is used in the cloud data security solution, which is a novel approach to create a secure cryptosystem. This method was discussed in [1] as a novice strat- egy for controlling encrypted access. Key-policy attribute-based encryption (KPAE) and cipher text-policy attribute-based encryption (CPAE) are the common forms of ABE. According to an access tree and data that has been encrypted over a number of attributes, KPAE generates users’ secret keys. For providing flexibility in building a cryptosystem, four strategies are used in this encryption technique: (i) the public (PK) and master (MK) keys are generated during the setup phase, (ii) the session key (SK, also known as a private key) is generated in the key generation step, (C) the encryption phase, in which the access structure (policy), message, and public key (PK) are used to construct the cipher text (CT), and (D) the decryption phase, in which the cipher text, private key, and public key are used to decrypt the encrypted text (i.e. CT). To finish the policy update, Sahai and Waters [13] used the cipher text authorisation approach. However, because the key update and cipher text update are constrained by the previous access policy, such approaches cannot meet the integrity and security requirements. Setup, KeyGen, Encrypt, and Decrypt are the four basic algorithms that make up the CPAE encryption method. The most essential benefit of RSA [3] is that the private key remains secret because it is not communicated or revealed to another user. By combining ABE method with RSA algorithm, we propose a model known as the Hybrid Asymmetric Approach based on Attribute-Based Encryption (HAA-ABE), through which we get the higher level of data security in public cloud. The first system with constant-size cipher texts was suggested by J. Herrnaz [4]; where users with at least a few qualities in a given number of attributes, for a thresh- old “T,” get determined with the help of sender, followed by decryption according to our proposed approach. A weighted threshold decryption policy can be added as an addition to our proposed strategy. 1.2 LITERATURE REVIEW The idea of ABE has been discussed in the literature by Sahai and Waters [13]. The ABE scheme is the first attribute encryption scheme to allow single threshold gate rules. Furthermore, Teng et al. [14] proposed the Hierarchical Attribute Set- Based Encryption (HASBE) model which is a merger of Hierarchical Identity-based Encryption (HIBE) and CPAE. The user hierarchy in the HASBE paradigm is hier- archical, where access control method is created with a hierarchical assembly of role based on their attribute values and a preset secure key distribution process. Many domain masters follow the root master at the top of HASBE structure. Every domain user will have a unique group of users, each with a unique set of characteristics [6]. To keep sensitive data safe from snoopers, it is encrypted, and only approved users have access to the decryption keys. 1.2.1 Public Key cryPtograPhy Public key cryptography (PKC) is another name for asymmetric key encryption. It encrypts and decrypts data using public and private keys [7]. The keys consist of two
3Attribute-Based Encryption for Secured Message Transmittal massive numbers that have been matched but are not identical (in case of asymmetric key cryptography). A public key is a key which is shared with anyone. The private key, which is the second key, is kept hidden. A message can be encrypted with any of the keys; the decryption is the inverse of the one used to encrypt the message. Even for key exchange, without utilising a hidden or secret route, PKC is widely utilised to secure electronic communication over open networked environments like the inter- net. According to Zhou et al., the CPAE technique encrypts data using a portion of access tree. Afterwards, it finishes the encryption using the other access policy tree [8]. According to the authors, an access policy’s right sub tree is ordinarily smaller than its left sub tree. The owner of the data can then connect their CT to the proxy server’s cipher text after encrypting their data with the relevant component. This method pre-supposes that the access policy’s root node is an “AND” gate. Alternative solutions to this constraint problem were later presented, such as encrypting data using only one property at first (called a dummy attribute). Borgh et al. [9] developed a strategy that can be used in two cases. Firstly, when the devices do not have enough resources, the method first symmetrically encrypts the data before using the user access policy for symmetric key encryption. Figure 1.1 describes the PKC concept, where the plain text is converted into cipher text at the sender’s site, and with the receiver’s private key, the encrypted text is once more transformed at the receiver’s site back into plain text. FIGURE 1.1 Public key cryptography.