Skip to main content
Erschienen in: The Journal of Supercomputing 9/2021

18.02.2021

Efficient data management techniques based on hierarchical IoT privacy using block chains in cloud environments

verfasst von: Yoon-Su Jeong, Dong-Ryool Kim, Seung-Soo Shin

Erschienen in: The Journal of Supercomputing | Ausgabe 9/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As cloud services become so ubiquitous that they can be used anytime, anywhere, there is an increasing interest in IoT privacy protection. Manufacturers of small and medium-sized businesses that produce IT devices are increasingly using a variety of technologies to easily connect to other devices, with ease and affordability. However, the importance of protection against IoT privacy is growing as devices connected to the Internet do not know what information is transmitted by third parties. In this paper, we propose an IoT privacy protection technique in which users’ privacy-related elements are classified into block chains and non-block chains so that the third parties do not use the information used in the cloud environment maliciously, so that users’ privacy can be handled probabilistically by grouping them into service chains. The proposed model uses user privacy information as a block chain to handle identity attributes and access control policies so that IoT privacy information is not exposed to third parties. This process can be used to protect users’ privacy, regardless of the size or purpose of the cloud environment. In the proposed technique, IoT privacy was grouped into hierarchical multilevel forms, while efficiency was improved by an average of 11.1% using computational-intensive cryptographic policies. In addition, because the proposed technique has improved the accessibility of IoT privacy information over the existing one, it has reduced the overhead of cloud servers by more than 17.2%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Choi JG, Noh BN (2011) Security technology research in cloud computing environment. J Secur Eng 8(3):371–384 Choi JG, Noh BN (2011) Security technology research in cloud computing environment. J Secur Eng 8(3):371–384
2.
Zurück zum Zitat Jeong YS (2015) An efficiency management scheme using big data of healthcare patients using puzzy AHP. J Digit Converg 13(4):227–233CrossRef Jeong YS (2015) An efficiency management scheme using big data of healthcare patients using puzzy AHP. J Digit Converg 13(4):227–233CrossRef
3.
Zurück zum Zitat Jeong YS (2016) An efficient IoT healthcare service management model of location tracking sensor. J Digit Converg 14(3):261–267CrossRef Jeong YS (2016) An efficient IoT healthcare service management model of location tracking sensor. J Digit Converg 14(3):261–267CrossRef
4.
Zurück zum Zitat Echenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security. pp 41–47 Echenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security. pp 41–47
5.
Zurück zum Zitat Chan H, Perrig A, Song D (2003) Random key predistribution schemes for Sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy. pp 197–213 Chan H, Perrig A, Song D (2003) Random key predistribution schemes for Sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy. pp 197–213
6.
Zurück zum Zitat Zhu S, Setia S, Jajodia S (2002) A distributed group key managemet protocol for ad hoc networks. George Mason University Press, Fairfax, pp 1–150 Zhu S, Setia S, Jajodia S (2002) A distributed group key managemet protocol for ad hoc networks. George Mason University Press, Fairfax, pp 1–150
7.
Zurück zum Zitat Khalili A, Katz J, Arbaugh WA (2003) Toward secure key distribution in truly ad-hoc networks. In: Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT’03 Workshops). pp 342–346 Khalili A, Katz J, Arbaugh WA (2003) Toward secure key distribution in truly ad-hoc networks. In: Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT’03 Workshops). pp 342–346
8.
Zurück zum Zitat Notra S, Siddiqi M, Gharakheili HH, Sivaraman V, Boreli R (2014) An experimental study of security and privacy risks with emerging household appliances. In: Proceedings of the 2014 IEEE Conference on Communications and Network Security (CNS). pp 79–84 Notra S, Siddiqi M, Gharakheili HH, Sivaraman V, Boreli R (2014) An experimental study of security and privacy risks with emerging household appliances. In: Proceedings of the 2014 IEEE Conference on Communications and Network Security (CNS). pp 79–84
9.
Zurück zum Zitat Sivaraman V, Chan D, Earl D, Boreli R (2016) Smart-phones attacking smart-homes. In: Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks. pp 195–200 Sivaraman V, Chan D, Earl D, Boreli R (2016) Smart-phones attacking smart-homes. In: Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks. pp 195–200
10.
Zurück zum Zitat Chakravorty A, Wlodarczyk T, Rong C (2013) Privacy preserving data analytics for smart homes. In: Proceedings of the 2013 IEEE in Security and Privacy Workshops (SPW). pp 23–27 Chakravorty A, Wlodarczyk T, Rong C (2013) Privacy preserving data analytics for smart homes. In: Proceedings of the 2013 IEEE in Security and Privacy Workshops (SPW). pp 23–27
11.
Zurück zum Zitat Jayalakshmi P, Saravanan R (2019) Link stable routing with minimal delay nodes for MANETs. Int J Soc Humanist Comput 3(1):46–60CrossRef Jayalakshmi P, Saravanan R (2019) Link stable routing with minimal delay nodes for MANETs. Int J Soc Humanist Comput 3(1):46–60CrossRef
12.
Zurück zum Zitat Trattner C, Kappe F (2013) Social stream marketing on Facebook: a case study. Int J Soc Humanist Comput 2(1/2):86–103CrossRef Trattner C, Kappe F (2013) Social stream marketing on Facebook: a case study. Int J Soc Humanist Comput 2(1/2):86–103CrossRef
13.
Zurück zum Zitat Jeong YS (2016) Measuring and analyzing WiMAX security adopt to wireless environment of U-healthcare. J Digit Converg 11(3):279–284 Jeong YS (2016) Measuring and analyzing WiMAX security adopt to wireless environment of U-healthcare. J Digit Converg 11(3):279–284
14.
Zurück zum Zitat Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115CrossRef Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115CrossRef
15.
Zurück zum Zitat Singh S, Jeong YS, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222CrossRef Singh S, Jeong YS, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222CrossRef
16.
Zurück zum Zitat Shen H, Zhang M, Shen J (2017) Efficient privacy-preserving cube-data aggregation scheme for smart grids. IEEE Trans Inf Forens Secur 12(6):1369–1381CrossRef Shen H, Zhang M, Shen J (2017) Efficient privacy-preserving cube-data aggregation scheme for smart grids. IEEE Trans Inf Forens Secur 12(6):1369–1381CrossRef
17.
Zurück zum Zitat Bao H, Lu R (2015) A new differentially private data aggregation with fault tolerance for smart grid communications. IEEE Internet Things J 2(3):248–258CrossRef Bao H, Lu R (2015) A new differentially private data aggregation with fault tolerance for smart grid communications. IEEE Internet Things J 2(3):248–258CrossRef
18.
Zurück zum Zitat Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312CrossRef Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312CrossRef
19.
Zurück zum Zitat Ni J, Zhang K, Lin X, Shen XS (2019) Balancing security and efffciency for smart metering against misbehaving collectors. IEEE Trans Smart Grid 10(2):1225–1236CrossRef Ni J, Zhang K, Lin X, Shen XS (2019) Balancing security and efffciency for smart metering against misbehaving collectors. IEEE Trans Smart Grid 10(2):1225–1236CrossRef
20.
Zurück zum Zitat Alghamdi WY, Wu H, Kanhere SS (2017) Reliable and secure end-to-end data aggregation using secret sharing in WSNs. In: Proceedings of the 2017 IEEE Wireless Communications and Networking Conference(WCNC). pp 1–6 Alghamdi WY, Wu H, Kanhere SS (2017) Reliable and secure end-to-end data aggregation using secret sharing in WSNs. In: Proceedings of the 2017 IEEE Wireless Communications and Networking Conference(WCNC). pp 1–6
21.
Zurück zum Zitat Qian J, Qiu F, Wu F, Ruan N, Chen G, Tang S (2017) Privacy preserving selective aggregation of online user behavior data. IEEE Trans Comput 66(2):326–338MathSciNetMATH Qian J, Qiu F, Wu F, Ruan N, Chen G, Tang S (2017) Privacy preserving selective aggregation of online user behavior data. IEEE Trans Comput 66(2):326–338MathSciNetMATH
22.
Zurück zum Zitat Memon RA, Li JP, Nazeer MI, Khan AN, Ahmed J (2019) DualFog-IoT: additional fog layer for solving blockchain integration problem in internet of things. IEEE Access 7:169073–169093CrossRef Memon RA, Li JP, Nazeer MI, Khan AN, Ahmed J (2019) DualFog-IoT: additional fog layer for solving blockchain integration problem in internet of things. IEEE Access 7:169073–169093CrossRef
23.
Zurück zum Zitat Yao H, Mai T, Wang J, Ji Z, Jiang C, Qian Y (2019) Resource trading in blockchain-based industrial internet of things. IEEE Trans Ind Inform 15(6):3602–3609CrossRef Yao H, Mai T, Wang J, Ji Z, Jiang C, Qian Y (2019) Resource trading in blockchain-based industrial internet of things. IEEE Trans Ind Inform 15(6):3602–3609CrossRef
24.
Zurück zum Zitat li R, Song T, Mei B, Li H, Cheg X, Sun L (2019) Blockchain for large-scale internet of things data storage and protection. IEEE Trans Serv Comput 12(5):762–771CrossRef li R, Song T, Mei B, Li H, Cheg X, Sun L (2019) Blockchain for large-scale internet of things data storage and protection. IEEE Trans Serv Comput 12(5):762–771CrossRef
25.
Zurück zum Zitat Li Z, Yang Z, Xie S (2019) Computing resource trading for edge-cloud-assisted internet of things. IEEE Trans Ind Inform 15(6):3661–3669CrossRef Li Z, Yang Z, Xie S (2019) Computing resource trading for edge-cloud-assisted internet of things. IEEE Trans Ind Inform 15(6):3661–3669CrossRef
26.
Zurück zum Zitat Xu J, Xue K, Li S, Tian H (2019) Healthchain: a blockchain-based privacy preserving scheme for large-scale health data. IEEE Internet Things J 6(5):8770–8781CrossRef Xu J, Xue K, Li S, Tian H (2019) Healthchain: a blockchain-based privacy preserving scheme for large-scale health data. IEEE Internet Things J 6(5):8770–8781CrossRef
27.
Zurück zum Zitat Zhang J, Huang H, Wang X (2016) Resource provision algorithms in cloud computing: a survey. J Netw Comput Appl 64:23–42CrossRef Zhang J, Huang H, Wang X (2016) Resource provision algorithms in cloud computing: a survey. J Netw Comput Appl 64:23–42CrossRef
28.
Zurück zum Zitat Varadharajan V, Tupakula U (2014) Security as a service model for cloud environment. IEEE Trans Netw Serv Manag 11(1):60–75CrossRef Varadharajan V, Tupakula U (2014) Security as a service model for cloud environment. IEEE Trans Netw Serv Manag 11(1):60–75CrossRef
29.
Zurück zum Zitat Iera A, Morabito G, Atzori L (2016) The internet of things moves into the cloud. In: Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW). pp 191–191 Iera A, Morabito G, Atzori L (2016) The internet of things moves into the cloud. In: Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW). pp 191–191
30.
Zurück zum Zitat Saha HN, Mandal A, Sinha A (2017) Recent trends in the internet of things. In: Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC). pp 1–4 Saha HN, Mandal A, Sinha A (2017) Recent trends in the internet of things. In: Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC). pp 1–4
31.
Zurück zum Zitat Celesti A, Mulfari D, Fazio M, Villari M, Puliafito A (2016) Exploring container virtualization in IoT clouds. In: Proceedings of the 2016 IEEE International Conference on Smart Computing (SMARTCOMP). pp 1–6 Celesti A, Mulfari D, Fazio M, Villari M, Puliafito A (2016) Exploring container virtualization in IoT clouds. In: Proceedings of the 2016 IEEE International Conference on Smart Computing (SMARTCOMP). pp 1–6
32.
Zurück zum Zitat Dar KS, Taherkordi A, Eliassen F (2016) Enhancing dependability of cloud-based IoT services through virtualization. In: Proceedings of the 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI). pp 106–116 Dar KS, Taherkordi A, Eliassen F (2016) Enhancing dependability of cloud-based IoT services through virtualization. In: Proceedings of the 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI). pp 106–116
Metadaten
Titel
Efficient data management techniques based on hierarchical IoT privacy using block chains in cloud environments
verfasst von
Yoon-Su Jeong
Dong-Ryool Kim
Seung-Soo Shin
Publikationsdatum
18.02.2021
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 9/2021
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-021-03653-3

Weitere Artikel der Ausgabe 9/2021

The Journal of Supercomputing 9/2021 Zur Ausgabe

Premium Partner