Skip to main content
Top

2021 | OriginalPaper | Chapter

A Reliable Cloud Assisted IoT Application in Smart Cities

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet-of-Things are an amalgamation of multiple devices running on a different platform. They communicate with various instruments of a different calibre. They take the help of the internet to send and receive messages. As these devices do not have enough storage, they employ a cloud to store the sensed readings. The proposal is the inclusion of both the technologies. The recommendation makes sure about correspondence in vehicular organizations. It supports an access scheme without requiring ciphertext re-sign-based encryption mystery keys generation. It doesn’t depend on an intermediary re-encryption worker to execute the strategy update framework. It presents another unquestionable protection saving redistributed ABSC plot that guarantees adaptable access control, information classification, and verification while supporting arrangement refreshes in cloud helped IoT applications. The proposal enhances the work by adding reliability by 3.31% in comparison to the previous contribution. The system provides forward and backward secrecy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ambika N (2020) Encryption of data in cloud-based industrial IoT devices. In: IoT: security and privacy paradigm. CRC Press, Taylor & Francis Group, pp 111–129 Ambika N (2020) Encryption of data in cloud-based industrial IoT devices. In: IoT: security and privacy paradigm. CRC Press, Taylor & Francis Group, pp 111–129
2.
go back to reference Hasan R, Hossain MM, Khan R (2015) Aura: an IoT based cloud infrastructure for localized mobile computation outsourcing. In: 3rd IEEE International conference on mobile cloud computing, services and engineering, San Francisco, CA, USA Hasan R, Hossain MM, Khan R (2015) Aura: an IoT based cloud infrastructure for localized mobile computation outsourcing. In: 3rd IEEE International conference on mobile cloud computing, services and engineering, San Francisco, CA, USA
3.
go back to reference Chakraborty C, Rodrigues JJPC (2020) A comprehensive review on device-to-device communication paradigm: trends, challenges and applications. Int J Wirel Pers Commun 114:185–207 Chakraborty C, Rodrigues JJPC (2020) A comprehensive review on device-to-device communication paradigm: trends, challenges and applications. Int J Wirel Pers Commun 114:185–207
4.
go back to reference Lalit G, Emeka C, Nasser N, Chinmay C, Garg G (2020) Anonymity preserving IoT-based COVID-19 and other infectious disease contact tracing model. IEEE Access 8:159402–159414 Lalit G, Emeka C, Nasser N, Chinmay C, Garg G (2020) Anonymity preserving IoT-based COVID-19 and other infectious disease contact tracing model. IEEE Access 8:159402–159414
6.
go back to reference Belguith S, Kaaniche N, Hammoudeh M, Dargahi T (2020) Proud: verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications. Future Gener Comput Syst 111:899–918 Belguith S, Kaaniche N, Hammoudeh M, Dargahi T (2020) Proud: verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications. Future Gener Comput Syst 111:899–918
7.
go back to reference Ambika N (2019) Energy-perceptive authentication in virtual private networks using GPS data. In: Security, privacy and trust in the IoT environment. Springer, Cham, pp 25–38 Ambika N (2019) Energy-perceptive authentication in virtual private networks using GPS data. In: Security, privacy and trust in the IoT environment. Springer, Cham, pp 25–38
8.
go back to reference Doukas C, Maglogiannis I (2012) Bringing IoT and cloud computing towards pervasive healthcare. In: 6th International conference on innovative mobile and internet services in ubiquitous computing, Palermo, Italy Doukas C, Maglogiannis I (2012) Bringing IoT and cloud computing towards pervasive healthcare. In: 6th International conference on innovative mobile and internet services in ubiquitous computing, Palermo, Italy
9.
go back to reference Sun E, Zhang X, Li Z (2012) The internet of things (IOT) and cloud computing (CC) based tailings dam monitoring and pre-alarm system in mines. Saf Sci 811–815 Sun E, Zhang X, Li Z (2012) The internet of things (IOT) and cloud computing (CC) based tailings dam monitoring and pre-alarm system in mines. Saf Sci 811–815
10.
go back to reference Henze M et al (2016) A comprehensive approach to privacy in the cloud-based internet of things. Future Gener Comput Syst 56:701–718 Henze M et al (2016) A comprehensive approach to privacy in the cloud-based internet of things. Future Gener Comput Syst 56:701–718
11.
go back to reference Henze M et al (2014) User-driven privacy enforcement for cloud-based services in the internet of things. In 2014 International conference on future internet of things and cloud, Barcelona, Spain, pp 191–196 Henze M et al (2014) User-driven privacy enforcement for cloud-based services in the internet of things. In 2014 International conference on future internet of things and cloud, Barcelona, Spain, pp 191–196
12.
go back to reference Elmisery AM, Rho S, Aborizka M (2017) A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services. Clust Comput 22(1):1611–1638 Elmisery AM, Rho S, Aborizka M (2017) A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services. Clust Comput 22(1):1611–1638
13.
go back to reference Sharma S, Chen K, Sheth A (2018) Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems. IEEE Internet Comput 22(2):42–51 Sharma S, Chen K, Sheth A (2018) Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems. IEEE Internet Comput 22(2):42–51
14.
go back to reference Stergiou C, Psannis KE, Gupta BB, Ishibashi Y (2018) Security, privacy & efficiency of sustainable cloud computing for big data & IoT. Sustain Comput: Inform Syst 19:174–184 Stergiou C, Psannis KE, Gupta BB, Ishibashi Y (2018) Security, privacy & efficiency of sustainable cloud computing for big data & IoT. Sustain Comput: Inform Syst 19:174–184
15.
go back to reference Xu X et al (2018) An IoT-oriented data placement method with privacy preservation in cloud environment. J Netw Comput Appl 124:148–157 Xu X et al (2018) An IoT-oriented data placement method with privacy preservation in cloud environment. J Netw Comput Appl 124:148–157
16.
go back to reference Perera C, Ranjan R, Wang L, Khan SU, Zomaya AY (2015) Big data privacy in the internet of things era. IT Prof 17(3):32–39 Perera C, Ranjan R, Wang L, Khan SU, Zomaya AY (2015) Big data privacy in the internet of things era. IT Prof 17(3):32–39
17.
go back to reference Jayaraman PP, Yang X, Yavari A, Georgakopoulos D, Yi X (2017) Privacy preserving internet of things: from privacy techniques to a blueprint architecture and efficient implementation. Future Gener Comput Syst 76:540–549 Jayaraman PP, Yang X, Yavari A, Georgakopoulos D, Yi X (2017) Privacy preserving internet of things: from privacy techniques to a blueprint architecture and efficient implementation. Future Gener Comput Syst 76:540–549
18.
go back to reference Pape S, Rannenberg K (2019) Applying privacy patterns to the internet of things (IoT) architecture. Mob Netw Appl 24(3):925–933 Pape S, Rannenberg K (2019) Applying privacy patterns to the internet of things (IoT) architecture. Mob Netw Appl 24(3):925–933
19.
go back to reference Ganapathy S (2019) A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Comput Netw 151:181–190 Ganapathy S (2019) A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Comput Netw 151:181–190
20.
go back to reference Lin H, Bergmann NW (2016) IoT privacy and security challenges for smart home environments. Information 7(3):1–15 Lin H, Bergmann NW (2016) IoT privacy and security challenges for smart home environments. Information 7(3):1–15
21.
go back to reference Abduljabbar ZA et al (2016) Privacy-preserving image retrieval in IoT-cloud. In: IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, pp 799–806 Abduljabbar ZA et al (2016) Privacy-preserving image retrieval in IoT-cloud. In: IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, pp 799–806
22.
go back to reference Arabo A (2014) Privacy-aware IoT cloud survivability for future connected home ecosystem. In: EEE/ACS 11th International conference on computer systems and applications (AICCSA), Doha, Qatar, pp 803–809 Arabo A (2014) Privacy-aware IoT cloud survivability for future connected home ecosystem. In: EEE/ACS 11th International conference on computer systems and applications (AICCSA), Doha, Qatar, pp 803–809
23.
go back to reference Choudhury T, Gupta A, Pradhan S, Kumar P, Rathore YS (2017) Privacy and security of cloud-based internet of things (IoT). In: 3rd International conference on computational intelligence and networks (CINE), Odisha, India, pp 40–45 Choudhury T, Gupta A, Pradhan S, Kumar P, Rathore YS (2017) Privacy and security of cloud-based internet of things (IoT). In: 3rd International conference on computational intelligence and networks (CINE), Odisha, India, pp 40–45
24.
go back to reference Du J et al (2018) Distributed data privacy preservation in IoT applications. IEEE Wirel Commun 25(6):68–76 Du J et al (2018) Distributed data privacy preservation in IoT applications. IEEE Wirel Commun 25(6):68–76
25.
go back to reference Deng H, Qin Z, Sha L, Yin H (2020) A flexible privacy-preserving data sharing scheme in cloud-assisted IoT. IEEE Internet Things J 7(12):11601–11611 Deng H, Qin Z, Sha L, Yin H (2020) A flexible privacy-preserving data sharing scheme in cloud-assisted IoT. IEEE Internet Things J 7(12):11601–11611
26.
go back to reference Davies N, Taft N, Satyanarayanan M, Clinch S, Amos B (2016) Privacy mediators: helping IoT cross the chasm. In: 17th International workshop on mobile computing systems and applications, St. Augustine Florida USA, pp 39–44 Davies N, Taft N, Satyanarayanan M, Clinch S, Amos B (2016) Privacy mediators: helping IoT cross the chasm. In: 17th International workshop on mobile computing systems and applications, St. Augustine Florida USA, pp 39–44
27.
go back to reference Subahi A, Theodorakopoulos G (2018) Ensuring compliance of IoT devices with their Privacy Policy Agreement. In: 6th International conference on future internet of things and cloud (FiCloud), Barcelona, Spain, pp 100–107 Subahi A, Theodorakopoulos G (2018) Ensuring compliance of IoT devices with their Privacy Policy Agreement. In: 6th International conference on future internet of things and cloud (FiCloud), Barcelona, Spain, pp 100–107
28.
go back to reference Fernández M, Jaimunk J, Thuraisingham B (2019) Privacy-preserving architecture for cloud-IoT platforms. In: IEEE International conference on web services (ICWS), Milan, Italy, pp 11–19 Fernández M, Jaimunk J, Thuraisingham B (2019) Privacy-preserving architecture for cloud-IoT platforms. In: IEEE International conference on web services (ICWS), Milan, Italy, pp 11–19
29.
go back to reference Ling Z, Liu K, Xu Y, Jin Y, Fu X (2017) An end-to-end view of IoT security and privacy. In: IEEE Global communications conference, Singapore, pp 1–7 Ling Z, Liu K, Xu Y, Jin Y, Fu X (2017) An end-to-end view of IoT security and privacy. In: IEEE Global communications conference, Singapore, pp 1–7
30.
go back to reference Yang Y, Zheng X, Guo W, Liu X, Chang V (2018) Privacy-preserving fusion of IoT and big data for e-health. Future Gener Comput Syst 86:1437–1455 Yang Y, Zheng X, Guo W, Liu X, Chang V (2018) Privacy-preserving fusion of IoT and big data for e-health. Future Gener Comput Syst 86:1437–1455
32.
go back to reference Luo E et al (2018) Privacy protector: privacy-protected patient data collection in IoT-based healthcare systems. IEEE Commun Mag 56(2):163–168 Luo E et al (2018) Privacy protector: privacy-protected patient data collection in IoT-based healthcare systems. IEEE Commun Mag 56(2):163–168
33.
go back to reference Zhao Y, Yang LT, Sun J (2018) Privacy-preserving tensor-based multiple clusterings on cloud for industrial IoT. IEEE Trans Ind Inform 15(4):2372–2381 Zhao Y, Yang LT, Sun J (2018) Privacy-preserving tensor-based multiple clusterings on cloud for industrial IoT. IEEE Trans Ind Inform 15(4):2372–2381
34.
go back to reference Bahrami M, Khan A, Singhal M (2016) An energy efficient data privacy scheme for IoT devices in mobile cloud computing. In: IEEE International conference on mobile services (MS), San Francisco, CA, USA, pp 190–195 Bahrami M, Khan A, Singhal M (2016) An energy efficient data privacy scheme for IoT devices in mobile cloud computing. In: IEEE International conference on mobile services (MS), San Francisco, CA, USA, pp 190–195
35.
go back to reference Togan M, Chifor BC, Florea I, Gugulea G (2017) A smart-phone based privacy-preserving security framework for IoT devices. In: 9th International conference on electronics, computers and artificial intelligence (ECAI), Targoviste, Romania, pp 1–7 Togan M, Chifor BC, Florea I, Gugulea G (2017) A smart-phone based privacy-preserving security framework for IoT devices. In: 9th International conference on electronics, computers and artificial intelligence (ECAI), Targoviste, Romania, pp 1–7
36.
go back to reference Fan K, Xu H, Gao L, Li H, Yang Y (2019) Efficient and privacy preserving access control scheme for fog-enabled IoT. Future Gener Comput Syst 99:134–142 Fan K, Xu H, Gao L, Li H, Yang Y (2019) Efficient and privacy preserving access control scheme for fog-enabled IoT. Future Gener Comput Syst 99:134–142
37.
go back to reference Riad K, Hamza R, Yan H (2019) Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access 7:86384–86393 Riad K, Hamza R, Yan H (2019) Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access 7:86384–86393
Metadata
Title
A Reliable Cloud Assisted IoT Application in Smart Cities
Author
N. Ambika
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-72139-8_4

Premium Partner