IJWMT Vol. 11, No. 4, 8 Aug. 2021
Cover page and Table of Contents: PDF (size: 466KB)
Full Text (PDF, 466KB), PP.41-45
Views: 0 Downloads: 0
Cloud Computing, Cloud of Things, Encryption, Obfuscation, Internet of Things.
Cloud of Things (CoT) relates to the convergence between Cloud Computing (CC) and the Internet of Things (IoT) and has significantly transformed the way services are delivered in the ubiquitous realm of devices. This integration has become essential because of the huge data being generated by IoT devices, requiring an infrastructure for storage and processing. Such infrastructure is provided by Cloud Computing services with massive space for data storage and exceptional platform to process complex data. IoT networks are vulnerable to multiple security breaches because of the growing usage of IoT devices in user personal systems. This leads to security and privacy threats that need to be addressed. IoT consists of resource limited devices which have feeble computing power, battery source and storage capacity. This paper addresses security issue by proposing usage of obfuscation and encryption techniques to scramble the data at IoT devices which is later on stored in encrypted form at the cloud server. The data at IoT devices is classified into highly critical or less critical and accordingly the appropriate technique between encryption and obfuscation is applied. The proposed mechanism is evaluated in terms of processing time for cryptographic operations at IoT devices. Evaluation results depict that the proposed mechanism is 1.17 times faster than [22] in terms of encryption and decryption times.
Adil Bashir, Sahil Sholla, " Resource Efficient Security Mechanism for Cloud of Things", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.11, No.4, pp. 41-45, 2021. DOI: 10.5815/ijwmt.2021.04.05
[1]M. Díaz, C. Martín, B. Rubio, State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing, J. Netw. Comput. Appl. 67 (2016) 99–117.
[2]R. Mondal, T. Zulfi, “Internet of Things and Wireless Sensor Network for Smart Cities”, IJCSI International Journal of Computer Science Issues, Volume 14, Issue 5, September 2017.
[3]F. Khedim, N. Labraoui, A.A.A. Ari, A cognitive chronometry strategy associated with a revised cloud model to deal with the dishonest recommendations attacks in wireless sensor networks, J. Netw.Comput. Appl. 123 (2018) 42–56.
[4]N. Labraoui, M. Gueroui, L. Sekhri, A risk-aware reputation-based trust management in wireless sensor networks, Wireless Pers. Commun. 87 (3) (2016) 1037–1055.
[5]A. Khanna, An architectural design for cloud of things, FactaUniversitatis Series: Electron. Energ. 29 (3) (2015) 357–365.
[6]M.S. Ferdous, R. Hussein, A. MadiniAlassafi, R. Walters, G. Wills, Threat taxonomy for Cloud of Things, Internet of Things and Big Data Analysis: Recent Trends and Challenges 1 (2016) 149–191.
[7]T. Bhattasali, R. Chaki, N. Chaki, Secure and trusted cloud of things, in: 2013 Annual IEEE India Conference (INDICON), IEEE, 2013, pp. 1–6.
[8]M. Babaghayou, N. Labraoui, A.A.A. Ari, EPP: Extreme Points Privacy for Trips and Home Identification in Vehicular Social Networks, in: 3rd edition of the National Study Day on Research on Computer Sciences (JERI2019), Saida, Algeria, 2019.http://ceur-ws.org/Vol-2351/paper_67.pdf.
[9]S. Pearson, Privacy, security and trust in cloud computing, in: Privacy and Security for Cloud Computing, Springer, 2013, pp. 3–42.
[10]C. Zhu, H. Nicanfar, V.C. Leung, L.T. Yang, An authenticated trust and reputation calculation and management system for cloud and Sensor Networks Integration, IEEE Trans. Inf. Forensics Secur. 10 (1) (2015) 118–131.
[11]T.D.P. Bai, S.A. Rabara, Design and development of integrated, secured and intelligent architecture for Internet of Things and Cloud Computing, in: 2015 3rd International Conference on Future Internet of Things and Cloud, IEEE, 2015, pp. 817–822.
[12]Y.Hyunsik& K. Young, “Design and Implementation of High-Availability Architecture for IoT-Cloud Services”, Sensors, vol. 19. No. 15, 2019.
[13]C. Stergiou, K.E. Psannis, B.-G. Kim, B. Gupta, Secure integration of IoT and cloud computing, Future Gen. Comput. Syst. 78 (2018) 964–975.
[14]R. Anitha, P. Pradeepan, P. Yogesh, and Saswati Mukherjee, “Data Storage Security in Cloud using Metadata”, 2nd International Conference on Machine Learning and Computer Science(IMLCS'2013), Kuala Lumpur (Malaysia), August 2013, pp 26-30.
[15]S. O. Kamel and S. A. Elhamayed, “Mitigating the Impact of IoT Routing Attacks on Power Consumption in IoT Healthcare Environment using Convolutional Neural Network”, I. J. Computer Network and Information Security, 2020, 4, 11-29.
[16]M. A. Khan, S. Member, and M. Y. Khan, “A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data,” IEEE Access, vol. 8, pp. 52018–52027, 2020.
[17]K. N. Mishra, “A Proficient Mechanism for Cloud Security Supervision in Distributive Computing Environment”, I. J. Computer Network and Information Security, 2020, 6, 57-77.
[18]A. Hameed and A. Alomary, "Security Issues in IoT: A Survey," 2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), Sakhier, Bahrain, 2019, pp. 1-5, doi: 10.1109/3ICT.2019.8910320.
[19]B. Adil & M. Ajaz, “Securing Communication in MQTT enabled Internet of Things with Lightweight security protocol”, EAI Endorsed Transactions on Internet of Things. 3. 154390, 2018. doi: 10.4108/eai.6-4-2018.154390.
[20]B. Alohali, M. Merabti, K. Kifayat, A Secure Scheme for a Smart House Based on Cloud of Things (CoT), in: 2014 6th Computer Science and Electronic Engineering Conference (CEEC), IEEE, 2014, pp. 115–120.
[21]K. Sekarana , G. R. Vikramb , B.V. Chowdaryc, “Design of Effective Security Architecture for Mobile Cloud Computing to Prevent DDoS Attacks”, I.J. Wireless and Microwave Technologies, 2019, 1, 43-51.
[22]M. B. Mollah, M. A. K. Azad and A. Vasilakos, "Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things," in IEEE Cloud Computing, vol. 4, no. 1, pp. 34-42, Jan.-Feb. 2017, doi: 10.1109/MCC.2017.9.
[23]AES-GCM authenticated encryption, AES with Galois/Counter Mode (AES-GCM), https://www.cryptosys.net/pki/manpki/pki_aesgcmauthencryption.html , accessed on 17-09-2020.
[24]PyCrypto - The Python Cryptography Toolkit, https://www.dlitz.net/software/pycrypto/, accessed on 18-09-2020.