Lightweight and Privacy-Preserving ID-as-a-Service
Provisioning in Vehicular Cloud Computing
T. Saravanan Dept. of CSE GITAM School of Technology, GITAM (Deemed to be University) Bengaluru, India tsaravcse@gmail.com Abstract— Cloud computing is composed of different A type of organization access called distributed circulating Cloud Computing that are constructed instantly by computing aims to openly and widely share a large number skillfully fusing unused Cloud Computing resources like of registered assets. These are hired by a specialized calculating power, stockpiling, etc. the variety of tools used to company to sophisticated clientele, typically online. Due to access the data and services. We thus provide a lightweight the rising number of car accidents and the dissatisfaction of identity-based authenticated data sharing protocol in this pedestrians in vehicular organizations, the main focus of the research to enable safe data sharing across physically distant present solutions offered by clever transportation clients and devices. The chosen-cipher-text attack (CCA) frameworks is on ensuring traveler comfort and promoting resistance of the suggested protocol is proved using the decisional Strong Diffie-Hellman (SDH) problem's hardness street wellbeing. By providing flexible arrangements (i.e., assumption. We compare the proposed protocol's efficiency elective courses, synchronization of traffic signals, etc.) with that of the current data-sharing protocols in terms of required by various street security entertainers like police, calculation costs, communication costs, and response times. We disaster and crisis managements, and fiasco and crisis first provide an enhanced CPABE (cipher-text-strategy administrations, distributed computing innovations can characteristic-based encryption). potentially further develop street wellbeing and travel experience in ITSs. Another distributed computing Keywords— Xxx, xxx, xxx, xxx, xxx architecture called VANET-Cloud used to vehicle specifically appointed organizations is offered to further I. INTRODUCTION improve traffic wellness and provide computational forms of The coordination of dispersed processing and vehicular support to street customers. Different VANET- Cloud associations known as vehicular conveyed figuring, or VCC, transportation services are examined, and a few areas for is gaining attention for its potential to support a variety of further research are highlighted, including security and cutting-edge, complex, and challenging applications for protection, information aggregation, energy efficiency, improving traffic flow, energy efficiency, and driving safety, interoperability, and asset managers. among other things. VCC may provide unique compact vehicular cloud organizations for automobiles, similar to II. MOTIVATION & OVERVIEW OF THE RESEARCH scattered processing providing cloud organizations. VCC VANETs will have unique requirements for expert communities (VCCSP) usually demand the car's autonomous, highly adaptable, low- dormancy, running obvious facts to support its requests, regardless of when a applications, and networks that might not be satisfied by vehicle needs to arrive at VCC organizations. standard distributed computing. The convergence of mist processing with the traditional cloud for VANETs is The on-demand availability of PC structure resources, therefore discussed as a plausible solution in both existing particularly data accumulating (distributed capacity) and and future VANETs. The addition of Software-Defined computing power, without direct individual organization by Network (SDN), which offers flexibility, programmability, the consumer is known as circulated registering. The phrase and global information on the company, may also improve is frequently used to refer to server farms that are accessible Mist registration. to different clients online. Huge fogs that are oppressive nowadays frequently have boundaries that are spread In order to provide a protected VANET information throughout several locations by central workers. An edge sharing plan while preserving the security, adaptability, and expert could be assigned if the relationship with the customer fine- granularity components of the original CP-ABE, we is respectably close. Fogs might be accessible to a variety of develop a new multi authority CP- ABE plan. We provide a affiliations or constrained to a single affiliation (attempt client renunciation approach and effective characteristic for fogs) (public cloud). the multi-authority CP-ABE plot in a VANET. We specifically examine some of the figure- focused encryption and unscrambling processes, helping to significantly lessen For coherence and scale economies, circulated the impact on resource-required OBU devices in registration depends on resource sharing. Supporters of automobiles. For VANETs, we suggest a productive and public and hybrid fogs point out that distributed accounting secure information-sharing strategy. introduced the ABE enables organizations to avoid or limit upfront IT concept first. In the ABE plot, a predetermined authority infrastructure investments. Advocates also make sure that generates a framework public key and framework ace key. distributed processing encourages risk-takers to develop their A power that generates keys based on credits has to be applications for activity faster, with more developed reason, predefined; as a result, the keys will have properties for use and with less assistance, and that it engages IT groups to during encryption and unscrambling tasks in the future. even more quickly change resources to satisfy varying and Numerous more refined ABE schemes were created after the unexpected need, giving the burst enlisting capacity: high ABE conspiracy was initially unveiled. figuring power at specific times of apex interest. Cloud Real-time search engines and various mining tools are providers often employ a "pay-all the more just as emerging with millions of users worldwide to enable expenditures arise" methodology, which, if chiefs are individuals to follow the effect of events and news on social unfamiliar with cloud-assessing methods, might result in networking sites. Finding spammers on social networking unexpected operating expenses. Improvement in circulating sites is crucial. This chapter contains the overall structure of figure has been prompted by the openness of high-limit the present work. The following chapter, Review of associations, easy PCs, and limit devices as well as the Literature, lists the works that deal with spam detection. specific collection of hardware virtualization, organization coordinated plan, and autonomic and utility managing. III. RELATED WORK storage device, businesses and users inevitably start to worry about security. They worry that the data is actually A. Light weight delegatable proofs of storage kept in the cloud but is still in the storage device or cannot According to J. Xu, A. Yang, J. Zhou, and D. S. Wong et be accessed for a long time because the cloud server has al., cloud storage is now widely used, which lessens the been removed or destroyed, which prevents users and strain of users having to store their own data locally. businesses from accessing or restoring the data files in the future. This project aims to investigate and build for proven Researchers have also paid a great deal of attention to cloud computing platforms for data storage. When data is ways to guarantee the security and integrity of the saved in the cloud, researchers and developers work to outsourced data kept in a cloud storage server. The primary create a secure and effective proof-storage protocol. Users solution proposed to overcome this issue is proofs of storage may also assign or permit others to publicly verify if the (POS). Publicly verified POS considerably increases the data is truly stored in cloud storage devices. scalability of cloud services by enabling a third party to validate the data integrity on the data owner's behalf. Due to C. Dynamic provable data possession numerous expensive group exponentiation operations, the The proposal was made by C. Erway, A. Kupcu, C. majority of publicly verifiable POS schemes in use today Papamanthou, et al. Data security has been given a lot more compute authentication tags for all data blocks very slowly consideration in cloud storage environments than it did —much more slowly than the typical upload speed of a previously. Important data files owned by users must be network. As a result, this phase of the POS scheme's setup hosted on various cloud service providers in order to becomes the bottleneck. We provide a brand-new alternative guarantee the dependability and availability of outsourced formulation in this article termed "Delegable Proofs of data, increase catastrophe resilience, and improve data Storage (DPOS)". Then, we build a simple privacy- recovery ability (CSPs). However, we are aware that CSP is preserving DPOS scheme that is near to the features of never trustworthy. A new dynamic multiple-replica provable publicly verifiable POS schemes on the one hand, and as data possession (DMR-PDP) approach is suggested in this efficient as private POS schemes on the other. It also case to simultaneously check the integrity of replica files supports third party auditors and may swap auditors at any saved by users on various CSPs. Additionally, we use vector moment. We increase the tag creation process' speed by at dot products rather than the modular power calculation in least several hundred times when compared to conventional the conventional PDP approach, which significantly publicly verifiable POS systems, without losing any other decreases the calculation time and storage space utilization. areas of efficiency. Due to the many advantages, it offers, This is done since the tag set is so important. Additionally, such as reduced infrastructure costs, rapid scalability, and the divided address version mapping table (DAVMT), a availability, LOUD computing has been widely adopted and brand-new dynamic data structure, is introduced and used to used in our daily lives. As the need for local storage grows, address the issue of data dynamic operation. In the end, a more and more individuals rely on cloud storage services. In real-world test confirms the viability of our suggested particular, data is sent to a cloud server and made available strategy. Data integrity becomes a challenge in the cloud for eventual demand-driven access. In the meanwhile, it is storage scenario because when a user uploads local data to crucial to address how to guarantee the security and the cloud, control over the outsourced data may be integrity of the outsourced data without preserving a local completely lost. The PDP plan [5] was put up in 2007 to copy for data owners. Applying proofs of storage (POS), ensure the accuracy of the data that was outsourced. also known as proofs of retrievability (POR) or proofs of According to the PDP system, the data owner (DO) data possession (PDP), is one of the key solutions since it generates a set of homomorphic tags for the outsourced data, allows one to verify the integrity of data kept on a cloud uploads them together with the encrypted file to the CSP, server without having to download all of the data. The and then deletes the local file while retaining the secret key. fundamental concept is to split the whole data file into The DO sends a challenge to the CSP, the CSP answers to numerous blocks, each of which is used to create a the challenge, and the DO validates the response when they homomorphic verifiable tag (HVT), which is then delivered need to confirm the accuracy of the data stored in the cloud. together with the data file to the cloud server. Numerous The DO employs a sampling mechanism with probability in attempts have been made since the original POR and PDP the integrity verification phase of the PDP system, which is schemes were introduced in 2007 to create proofs of storage different from the conventional integrity verification schemes with more sophisticated characteristics including scheme. Although other dynamic PDP methods have been public key verifiability, data dynamics (i.e., presented, the PDP strategy in [5] is only applicable to static changing/adding/deleting data blocks), numerous cloud data and cannot implement the data's dynamic activity (such servers, and data sharing. We concentrate on the first two as update or append). features: support for data dynamics and public verifiability. MR-PDP: Multiple-replica provable data possession- R. B. Hybrid provable data possession at untrusted stores in Burns, O. Khan, R. Curtmola, and others have proposed to cloud computing enhance the availability and longevity of data on unreliable R. Burns, R. Curtmola, and others have proposed Cloud storage systems, many storage systems rely on replication. computing has steadily risen to the top of the Internet As of right now, these storage technologies offer no services in recent years. In order to accomplish random conclusive proof that numerous copies of the data are truly access, data collecting, cost reduction, and the ease of kept. Storage servers can work together to conceal the fact sharing other services, businesses and users will store a that they are only storing one copy of the data while giving massive quantity of data in remote cloud storage devices the impression that they are keeping multiple copies. By once cloud computing settings are at their most ideal. using multiple-replica provable data possession (MR-PDP), However, when data is kept for a long time in a cloud we solve this weakness: A provably secure scheme that enables a client to store t replicas of a file in a storage E. Secure cloud storage public auditing with privacy system to confirm via a challenge-response protocol that (2) preserving the storage system uses t times the storage necessary to store By using cloud storage, users may store their data a single replica and that (1) each unique replica can be remotely and take use of high-quality on-demand apps and produced at the time of the challenge. In a client/server services from a shared pool of reconfigurable computing storage system, the MR-PDP builds on earlier research on resources without having to worry about maintaining and data possession proofs for a single copy of a file (Ateniese storing their data locally. However, since users no longer et al., 2007). It is computationally considerably more physically hold the outsourced data, protecting its integrity effective to store t replicas using MR-PDP than it is to store in the cloud is a challenging issue, particularly for users t independent, unconnected files using a single-replica PDP with limited computer power. Additionally, users should not approach (e.g., by encrypting each file separately prior to need to worry about checking the integrity of the cloud storing it). Another benefit of MR-PDP is that when some of storage; they should just be able to utilize it as if it were the current copies fail, it may quickly and cheaply construct local. Therefore, it is crucial to enable public auditability for further replicas. cloud storage so that consumers may utilize a third-party D. Privacy-preserving auditor (TPA) to verify the accuracy of outsourced data and public auditing for shared data in the cloud be at ease. The auditing procedure should not present any new risks to the privacy of user data or increase the user's Data sharing across numerous users as well as cloud online workload in order to deploy a TPA safely. In this storage are both prevalent with cloud storage providers. research, we provide a private public auditing mechanism However, maintaining identity privacy while allowing for for a secure cloud storage system. We further expand our public auditing of such shared data is still a difficulty. The finding such that the TPA may effectively and first privacy-preserving technique that permits open auditing simultaneously conduct audits for a number of consumers. of shared data kept in the cloud is proposed in this work. We The suggested techniques are provably secure and extremely use ring signatures in particular to compute the verification effective, according to a thorough investigation of security data required to audit the integrity of shared data. Our and performance. Our initial test, carried out on an Amazon system allows a third-party auditor (TPA) to still check the EC2 instance, further confirms the design's quick integrity of shared data without having to download the performance. complete file while maintaining the privacy of the signer on each block. Our experimental findings show how well our In this research, we provide a public auditing suggested technique performs when auditing shared data. By mechanism for cloud computing data storage security that using cloud storage, users may store their data remotely and protects privacy. In order to ensure that the TPA won't take use of high-quality on-demand apps and services from discover any information about the data content stored on a shared pool of reconfigurable computing resources the cloud server during the effective auditing process, we without having to worry about maintaining and storing their use the homomorphic linear authenticator and random data locally. However, since users no longer physically hold masking. This not only relieves the cloud user's burden of the outsourced data, protecting its integrity in the cloud is a performing the time- consuming and potentially expensive challenging issue, particularly for users with limited auditing task, but also allays the users' concerns about the computer power. Additionally, users should not need to leakage of their outsourced data. We further expand our worry about checking the integrity of the cloud storage; they privacy-preserving public auditing protocol into a multiuser should just be able to utilize it as if it were local. Therefore, context, where the TPA may do numerous auditing jobs in a it is crucial to enable public auditability for cloud storage so batch manner for greater speed. TPA may concurrently that consumers may utilise a third-party auditor (TPA) to manage several audit sessions from various users for their verify the accuracy of outsourced data and be at ease. The outsourced data files. Our methods are very effective and auditing procedure should not present any new risks to the provably secure, according to extensive examination. privacy of user data or increase the user's online workload in F. The applications of polynomials and constant- size order to deploy a TPA safely. In this research, we provide a commitments to polynomials private public auditing mechanism for a secure cloud storage system. We further expand our finding such that the Gregory M. Zaverucha, G. Aniket Kate, and others have TPA may effectively and simultaneously conduct audits for suggested, Polynomial commitment systems are introduced, a number of consumers. The suggested techniques are properly defined, and given two effective constructions. A provably secure and extremely effective, according to a committer can commit to a polynomial using a polynomial thorough investigation of security and performance. Our commitment scheme and a brief string that a verifier can use initial test, carried out on an Amazon EC2 instance, further to validate the stated evaluations of the committed confirms the design's quick performance. In this work, we polynomial. The magnitude of the commitments made by suggest Oruta, the first public auditing tool for shared data the homomorphic commitment techniques described in the in the cloud that protects privacy. With Oruta, the TPA can literature can be utilised to accomplish this purpose, but they easily verify the consistency of shared data without being are linear in the degree of the committed polynomial. On the able to see who signed each block, protecting user identify other hand, our schemes' polynomial obligations are always privacy. How to effectively audit the integrity of shared data of the same magnitude (single elements). Initiating a with dynamic groups while yet protecting the identity of the commitment has a continual overhead as well; even opening signer on each block from the third-party auditor is an several assessments merely need a consistent level of intriguing challenge that will be addressed in our future communication. Our techniques can thus be effective work. instruments for lowering the communication expense in cryptographic systems. Regarding that, we use our polynomial commitment approaches to tackle four cryptographic issues: verifiable secret sharing, zero- server component as well as in the car. Programming- knowledge sets, credentials, and content extraction defined organizations may be set up automatically, allowing signatures. Several cryptographic protocols are network administrators to create their own SDN projects to fundamentally composed of commitment schemes. Using a design, manage, secure, and improve network assets using commitment system, a committer can attach herself to a automated scripts. As we stated, an open and VANET message (the binding) by publishing a value known as the strategy is needed for this. Open application programming commitment (hiding). She may open the commitment later interfaces (APIs) provide the benefit of preventing server and show the committed message to the verifier so they lock-in. Comparatively speaking to PCs, it doesn't matter could see if it is in line with the commitment. We go what equipment is used throughout this discussion. through three popular approaches a committer might use to commit to a message. Give two random number generators C. Bilingual paring module of the group G of prime order p, g and h. Simply by writing It has been noted that the most expensive operation in Cg(m) = gm, the committer can commit to a message m R blending-based cryptographic standards is the computation Zp. Under the premise that the discrete logarithm (DL) issue of bilinear pairings. For bilinear pairings in the two is challenging in G, this technique is computationally untrusted programmer paradigm, we first provide an concealing and unconditionally binding. The second efficient and safe re- appropriating calculation in this study. strategy, often referred to as a Pedersen commitment [31], Our suggested calculation differs from the state- of-the-art has the formula Cg,h(m, r) = gmhr, where r R Zp. Pedersen calculation in that the (asset- obligated) outsourcer is not obligations are computationally enforceable and required to do any expensive operations, such as point unconditionally hidden. This paper also has an expanded augmentations or exponentiations. Additionally, we version [24]. Under the DL assumption, this study was implement a subroutine using this computation to finished at the University of Waterloo. Third, for each one- accomplish reevaluating secure character-based encryptions way function H, the committer may publish H(m) or H(m|| and markings. r). A collision-resistant hash function is often employed in D. Module for data replication practice. Commitment plans are covered in great length in a survey by Damgard [16]. If the RSU in the vehicle adhoc network is more precise and each RSU has its own adhoc module where the copy IV. PROPOSED METHODOLOGY records are identified and the individual copy records are broken down, information replication is possible in this A. Suggestive methodology module. The information and the replication module will be This computation is called Character Based distinguished by the records that are coordinated with the Online/Offline Digital Signature (IBOOS). We employ a other rsu. The unique vehicle adhoc network is dealt with by successful and beneficial tactic called grouping to construct each vehicle adhoc network in the rsu unit. The Database the display of WSNs. Concerns concerning secure Replication module may be used to import data from information transmission for cluster-based wireless sensor existing data sets. It is also possible to create complex networks are raised in the evaluation (CWSN). We have mappings over many tables joins. You have the option of introduced two new Secure and Efficient Data Transmission designing yourself or using Java. (SET) protocols to achieve energy skill. By incorporating the more advanced CP-ABE, the Identity-Based V. EXPERIMENTAL SETUP Online/Offline Digital Signature (IBOOS) scheme, which is We calculate the square's runtime for each circle and dependent on the Identity- Based Digital Signature (IBS) multiply it by the number of times the programmer will plan, improves the present lightweight CP-ABE plot. This rehash the circle. All rings that grow according to the scheme defies damnation man calculation. The data is amount of the information produce some direct memory encoded using the developed recommended approach and complexity O(n). Time intricacy considers the number of sent to the VC as code text to acknowledge secure access times an assertion is carried out; even if you circle through clients. The interest in trusted authority is first reduced, 50% of the display, it is still O(n). Since that depends on which might lower the correspondence burden on both several factors, such as the information, this will return in a trusted power and each VC. There is a focal regulator that defined, constrained amount of time, the complexity of a holds information about the content server, RSU (ROAD computation does not accurately reflect the actual time SIDE UNIT), and vehicle. With the rsu, an unlimited required to run a particular code. number of control servers may be created, and the visible substance server id will be shown in the regarded substructure. The rush can be connected to the substance server as needed by the client, and the substructure will show the intricacies of the vehicle hub. Given that the nearest rsu is reachable, information replication in the car should be doable. B. Server of Central Control The available substance server id, the reaching the nearest vehicle using rsu, and all other rsu subtleties may be tracked in the central regulator module. As the rsu passes Fig 1. Time. beneath the substance server, the area id and the rsu id can be observed and created in the server. This module holds as TABLE I. ALGORITHM AND TIME. the focal point. Replication of information is carried out in a Algorithm Time(ms) C. Communication Complexity IBOOS 1250 The suggested conspires correspondence complexity DEFFIE HELLMAN 2200 is contrasted with that of plots. In the suggested plot, n gatherings only need to exchange messages twice, or 2 Iboos computation took the least amount of time to run rounds, as opposed to n times, or 1 round. Additionally, in the aforementioned complexity, taking an average of 1250 MS, while Diffie Hellman took the most time. the correspondence complexity of plans had to have been incorporated in order to communicate information A. Cryptography Cost to other vehicles present in the group. The analysis of Although encryption and decoding can be done the capacity overhead and correspondence complexity simultaneously, encryption should be done sequentially. In this way, bios encryption and decoding perform often faster shows that Ibos outcomes are more productive, as than existing techniques on a VANET execution, resulting shown in fig 4. CRYPTOGRAPHY in less time spent with safety, as shown in fig 2. COST(BYTES) 200 Communication 150 100 complexity (bits) Cryptography 50 cost(bytes) 60 0 50 IBOOS DEFFIE 40 Communication HELLMAN 30 complexity y (bits) 20 10 0 IBOOS DEFFIE Fig 2. Cryptography Cost. HELLMAN Fig 4. Communication complexity. TABLE II. ALGORITHM AND CRYPTOGRAPHY COST. Algorithm Cryptography cost(bytes) TABLE IV. ALGORITHM AND COMMUNICATION COMPLEXITY. IBOOS 145 Algorithm Communication complexity DEFFIE HELLMAN 120 (bits) B. Storage Overhead IBOOS 6 DEFFIE HELLMAN 49 The planned plot's capacity overhead is compared in the section to significant VANETs proposals. Since the vehicle In Fig.3 and Fig.3, each color represents traffic density and RSU capacities are sufficient, this correlation just draws at that timestamp. It concludes that maximum traffic density attention to the cloud server's capacity overhead. so that for Circle-Fix-02 occurs at 18:14:58 pm, whereas Nav the capacity may be used effectively by the vehicle and Sandhkuva Circle-PTZ-01 occurs at 18:16:18 pm. effectively, as shown in fig 3. The maximum traffic density difference between both locations is 6.8% which happens at timestamp 18:14:58. The riders can be redirected from Nav Sandhkuva Circle-Fix-02 (high traffic density region) to Nav Sandhkuva Circle-PTZ- Storage 01(low traffic density region). overhead VI. CONCLUSION 800 0 (bits) The In order to share information among multiple application expert co-ops and distributed storage frameworks for automobiles in a VANET, we suggested a 600 Storage convincing information access control CP- ABE plan in this 0 assignment. Our strategy offers disavowals of both clients overhead 400 () and traits based on many criteria. Additionally, we made use 0 IBOOS DEFFIE of cloud process hubs to distribute the computational load HELLMA associated with encryption and decoding in order to support 200 asset-reliant devices; this approach makes CP-ABE careful Fig 3. 0Storage Overhead. N the IBOOS more suitable for VANETs. We demonstrate the 0 effectiveness of our solution in maintaining client security TABLE III. ALGORITHM AND STORAGE OVERHEAD. as well as being secure against various attacks by the Algorithm Storage overhead(bits) findings of the extensive security research and exploratory IBOOS 500 DEFFIE HELLMAN 6789 City. In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 1834- 1839). IEEE. evaluation. Our strategy also guarantees adaptability and [15]. Liu, Y., Yao, L., Shi, Q., Ding, J., “Optical flow-based urban road vehicle tracking”, 19th IEEE International Conference on efficiency. In further work, we will evaluate our strategy in Computational Intelligence and Security, 2013. a real environment and gauge the synchronization latencies [16]. Saravanan, T., & Saravanakumar, S. (2022, February). Modeling an between components. Energy Efficient Clustering Protocol with Spider Cat Swarm Optimization for WSN. In 2022 IEEE VLSI Device Circuit and System (VLSI DCS) (pp. 188-193). IEEE. [17]. M Lokanath, K Sai Kumar & E Sanath Keerthi, "Accurate object classification and detection by faster-RCNN", IOP Conference Series REFERENCES Materials Science and Engineering, Vol. 263(5):052028, November 2017. [1]. T. Rawal and V. Devadas, “Intelligent Transportation System in India- A Review,” Journal of Development Management and [18]. Saravanan, T., Saravanakumar, S., Rathinam, G. O. P. A. L., Communication, Volume II, No.3, pp: 299-308, July-September, Narayanan, M., Poongothai, T., Patra, PSK., & Sengan, Sudhakar. 2015. (2022). Malicious attack alleviation using improved time-based dimensional traffic pattern generation in UWSN. Journal of [2]. P Indhiradevi, P Saravanakumar, R Varsha, S Shahithya & S Naveen Theoretical and Applied Information Technology, 100(3). Prabhu, "A Review on Smart Traffic Management System", IOP Conference Series Materials Science and Engineering [19]. Zhao, Z.Q., Zheng, P., Xu, S.T., Wu, X., “Object detection with deep 1145(1):012090, 2021 learning: A review”, IEEE Transactions on Neural Networks and Learning Systems, Vol.30(11), pp:3212-3232, 2018. [3]. Handalage, Upulie & Kuganandamurthy, Lakshini.,“ Real-Time Object Detection using YOLO: A review”. [20]. Saravanan, T., & Saravanakumar, S. (2021, December). Privacy 10.13140/RG.2.2.24367.66723, 2021. Preserving using Enhanced Shadow Honeypot technique for Data Retrieval in Cloud Computing. In 2021 3rd International Conference [4]. Saravanan, T., & Sasikumar, P. (2022). Automated Systems using AI on Advances in Computing, Communication Control and Networking in the Internet of Robotic Things: A New Paradigm for Robotics. (ICAC3N) (pp. 1151-1154). IEEE. Machine Learning Methods for Engineering Application Development, 127. [21]. Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Fu, C.Y., Berg, A.C., “SSD: Single shot multibox detector”, European [5]. K. Zaatouri and T. Ezzedine, "A Self-Adaptive Traffic Light Control conference on computer vision, ECCV, pp. 21–37, 2016. System Based on YOLO," International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), pp. 16- [22]. Saravanan, T., & Sasikumar, P. (2021). Assessment and analysis of 19, 2018. action degeneracy due to blackhole attacks in wireless sensor networks. In Proceedings of 6th International Conference on Recent [6]. Ministry of Road Transport & Highways, Government of India, Road Trends in Computing: ICRTC 2020 (pp. 345-355). Springer Accidents in India - 2018, pp. 8, 2019. Singapore. [7]. Saravanan, T., & Saravanakumar, S. (2022, August). Enhancing [23]. Hu, X., Xu, X., Xiao, Y., Hao, C., He, S., Jing, Q., Heng, P.A., reliable communication to improve network lifetime in Wireless “Sinet: A scale-insensitive convolutional neural network for fast Sensor Networks by Displacement and Direction Conscious Adhoc vehicle detection”, IEEE Transactions on Intelligent Transportation On-Demand Multipath Distance Vector routing protocol. In Systems, Vol (99), pp:1–10, 2018. Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing (pp. 597-606). [24]. Saravanan, T., & Nithya, N. S. (2019). Modeling displacement and direction aware ad hoc on-demand distance vector routing standard [8]. W.-H. Lee and C.-Y. Chiu, “Design and Implementation of a Smart for mobile ad hoc networks. Mobile Networks and Applications, 24, Traffic Signal Control System for Smart City Applications,” Sensors, 1804-1813. vol. 20, no. 2, p. 508, Jan. 2020. [25]. R. Girshick, “Fast R-CNN,” IEEE International Conference on [9]. M. Gohar, M. Muzammal and A. U. Rahman, “SMART TSS: Computer Vision (ICCV), pp. 1440-1448, 2015. Defining transportation system behavior using big data analytics in smart cities,” Sustainable Cities and Society, vol.41, 2018. [26]. Saravanan, T., & Nithya, N. S. (2019). Design of Dynamic Source Routing with the Aid of Fuzzy Logic for Cross Layered Mobile Ad [10]. Al-Smadi, M., Abdulrahim, K., Salam, R.A., “Traffic surveillance: A Hoc Networks. International Journal of Engineering and Advanced review of vision-based vehicle detection, recognition, and tracking”, Technology, 8(6), 4241-4247. International Journal of Applied Engineering Research, Vol.11(1), 713–726, 2016. [27]. Bochkovskiy, Alexey & Wang, Chien-Yao & Liao, Hong-yuan. (2020). YOLOv4: Optimal Speed and Accuracy of Object Detection. [11]. Saravanan, T., & Rajulu, G. G. (2022, December). A Reliable and efficient data transfer on wireless sensor networks by using [28]. A. Karnawat, "A Survey on Easy OCR Techniques used to build Optimization algorithms. In 2022 4th International Conference on System for Visually Impaired People", Vol: 6, pp:1425-1429, January Advances in Computing, Communication Control and Networking 2018. (ICAC3N) (pp. 1774-1778). IEEE. [29]. T. Carneiro, R.V.M.D. Nobrega, T. Nepomuceno, G.-B. Bian, [12]. Radhakrishnan, M., “Video object extraction by using background V.H.C.D. Albuquerque and P.P.R. Filho, “Performance Analysis of subtraction techniques for sports applications”, Digital Image Google Colaboratory as a Tool for Accelerating Deep Learning Processing, Vol.5(9), 91–97, 2016. Applications,” IEEE Access, pp. 1-1, 2018. [13]. Qiu-Lin, L.I., & Jia-Feng, H.E., “Vehicles detection based on the [30]. Mohamed, Elhassan & Sirlantzis, Konstantinos & Howells, Gareth. three-frame-difference method and cross-entropy threshold method” "Application of Transfer Learning for Object Detection on Manually Computer Engineering, Vol. 37(4), 172–174, 2018. Collected Data”, Advances in Intelligent Systems and Computing vol: 1037, 2019. [14]. Saravanan, T., Babu, M. D., Vinotha, D., & Saravanakumar, S. (2022, April). Arduino Based Road Congestion Management System in a