Skip to main content
Erschienen in: Optical and Quantum Electronics 3/2024

01.03.2024

Homomorphic encryption algorithm providing security and privacy for IoT with optical fiber communication

Erschienen in: Optical and Quantum Electronics | Ausgabe 3/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data privacy is becoming more important as the internet of things (IoT) rapidly expands. There are significant consequences for the broad adoption of the internet of things. Homomorphic encryption is one possible solution for protecting sensitive data in the IoT. However, there is a great deal of potential for efficiency gains. In order to get enough privacy and security, it is also crucial. Our homomorphic encryption technique for secure and private optical fibre communication is detailed in this publication. The data owner, fog server, and data consumers’ privacy is the primary focus of the proposed architectural design. The performance of this research shows that our FCHE solution improves data security throughout the data storage operation and reduces encryption length. This research also aims to analyse the factors of optical fiber communication cost, storage cost, and computing cost in the context of FCHE.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Alam, T.: A reliable communication framework and its use in internet of things (IoT). CSEIT1835111| Received. 10: 450–456 (2018) Alam, T.: A reliable communication framework and its use in internet of things (IoT). CSEIT1835111| Received. 10: 450–456 (2018)
Zurück zum Zitat Alqahtani, A.S., et al.: Investigation of hybrid spectrum slicing-wavelength division multiplexing (SS-WDM) in transparent medium for mode division multiplexing applications. Opt. Quantum. Electron. 55(3), 243 (2023)MathSciNetCrossRef Alqahtani, A.S., et al.: Investigation of hybrid spectrum slicing-wavelength division multiplexing (SS-WDM) in transparent medium for mode division multiplexing applications. Opt. Quantum. Electron. 55(3), 243 (2023)MathSciNetCrossRef
Zurück zum Zitat Ashik, M.H., Maswood, M.M., Alharbi, A.G.: Designing a fog-cloud architecture using blockchain and analyzing security improvements. In: 2020 International Conference on Electrical, Communication and Computer Engineering (ICECCE). IEEE, (2020) Ashik, M.H., Maswood, M.M., Alharbi, A.G.: Designing a fog-cloud architecture using blockchain and analyzing security improvements. In: 2020 International Conference on Electrical, Communication and Computer Engineering (ICECCE). IEEE, (2020)
Zurück zum Zitat Brakerski, Z., Gentry, C., Halevi, S.: Packed ciphertexts in LWE-based homomorphic encryption. Public-Key Cryptography–PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings 16. Springer, Berlin (2013) Brakerski, Z., Gentry, C., Halevi, S.: Packed ciphertexts in LWE-based homomorphic encryption. Public-Key Cryptography–PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings 16. Springer, Berlin (2013)
Zurück zum Zitat DaXu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE. Trans. Ind. Inform. 10(4), 2233–2243 (2014)CrossRef DaXu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE. Trans. Ind. Inform. 10(4), 2233–2243 (2014)CrossRef
Zurück zum Zitat Gao, Weichao, et al.: Privacy-preserving auction for big data trading using homomorphic encryption. IEEE Trans. Netw. Sci. 7(2), 776–791 (2018) Gao, Weichao, et al.: Privacy-preserving auction for big data trading using homomorphic encryption. IEEE Trans. Netw. Sci. 7(2), 776–791 (2018)
Zurück zum Zitat Han, J.L., et al.: The implemention and application of fully homomorphic encryption scheme. In: 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control. IEEE (2012) Han, J.L., et al.: The implemention and application of fully homomorphic encryption scheme. In: 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control. IEEE (2012)
Zurück zum Zitat Jiang, H.: Secure storage of computer network data based on cloud computing. Scalable. Comput. Pract. Exp. 24(4), 663–672 (2023)CrossRef Jiang, H.: Secure storage of computer network data based on cloud computing. Scalable. Comput. Pract. Exp. 24(4), 663–672 (2023)CrossRef
Zurück zum Zitat Kamruzzaman, M.M., et al.: Design of circular photonic crystal fiber for OAM extraction SDM applications. Opt. Quant. Electron. 54(12), 864 (2022)CrossRef Kamruzzaman, M.M., et al.: Design of circular photonic crystal fiber for OAM extraction SDM applications. Opt. Quant. Electron. 54(12), 864 (2022)CrossRef
Zurück zum Zitat Kumar, S., Tiwari, P., Zymbler, M.: Internet of things is a revolutionary approach for future technology enhancement: a review. J. Big. Data. 6(1), 1–21 (2019)CrossRef Kumar, S., Tiwari, P., Zymbler, M.: Internet of things is a revolutionary approach for future technology enhancement: a review. J. Big. Data. 6(1), 1–21 (2019)CrossRef
Zurück zum Zitat Liu, X., Yang, Y., Choo, K.K., Wang, H.: Security and privacy challenges for internet-of-things and fog computing. Wirel. Commun. Mobile. Comput. 2018, 9373961 (2018)CrossRef Liu, X., Yang, Y., Choo, K.K., Wang, H.: Security and privacy challenges for internet-of-things and fog computing. Wirel. Commun. Mobile. Comput. 2018, 9373961 (2018)CrossRef
Zurück zum Zitat Ma, Y., Wu, Y., Li, J., Ge, J.: “APCN: a scalable architecture for balancing accountability and privacy in large-scale content-based networks. Inf. Sci. 527, 511–532 (2020)MathSciNetCrossRef Ma, Y., Wu, Y., Li, J., Ge, J.: “APCN: a scalable architecture for balancing accountability and privacy in large-scale content-based networks. Inf. Sci. 527, 511–532 (2020)MathSciNetCrossRef
Zurück zum Zitat Mahato, G.K., Chakraborty, S.K.: A comparative review on homomorphic encryption for cloud security. IETE J. Res. 69(8), 5124–5133 (2023)CrossRef Mahato, G.K., Chakraborty, S.K.: A comparative review on homomorphic encryption for cloud security. IETE J. Res. 69(8), 5124–5133 (2023)CrossRef
Zurück zum Zitat Mohan Das, R., et al.: A novel deep learning-based approach for detecting attacks in social IoT. Soft. Comput. 1–11 (2023) Mohan Das, R., et al.: A novel deep learning-based approach for detecting attacks in social IoT. Soft. Comput. 1–11 (2023)
Zurück zum Zitat Nagajayanthi, B.: Decades of internet of things towards twenty-first century: a research-based introspective. Wirel. Pers. Commun. 123(4), 3661–3697 (2022)CrossRefPubMed Nagajayanthi, B.: Decades of internet of things towards twenty-first century: a research-based introspective. Wirel. Pers. Commun. 123(4), 3661–3697 (2022)CrossRefPubMed
Zurück zum Zitat Pătraşcu, A., Maimuţ, D., Simion, E.: New directions in cloud computing. A security perspective. In: 2012 9th International Conference on Communications (COMM). IEEE (2012) Pătraşcu, A., Maimuţ, D., Simion, E.: New directions in cloud computing. A security perspective. In: 2012 9th International Conference on Communications (COMM). IEEE (2012)
Zurück zum Zitat Ramesh Kumar, M., Sudhakaran, P.: Comprehensive survey on detecting security attacks of IoT intrusion detection systems. Adv. Sci. Techno. 124, 738–747 (2023)CrossRef Ramesh Kumar, M., Sudhakaran, P.: Comprehensive survey on detecting security attacks of IoT intrusion detection systems. Adv. Sci. Techno. 124, 738–747 (2023)CrossRef
Zurück zum Zitat Ray, P.P.: A survey on internet of things architectures. J. King Saud. Univ. Comput. Inf. Sci. 30(3), 291–319 (2018) Ray, P.P.: A survey on internet of things architectures. J. King Saud. Univ. Comput. Inf. Sci. 30(3), 291–319 (2018)
Zurück zum Zitat Silva, L.V., et al.: Security and privacy preserving data aggregation in cloud computing. Proceedings of the Symposium on Applied Computing. (2017) Silva, L.V., et al.: Security and privacy preserving data aggregation in cloud computing. Proceedings of the Symposium on Applied Computing. (2017)
Zurück zum Zitat Singh, D., et al.: Security issues in IoT and their countermeasures in smart city applications. Advanced computing and intelligent engineering: Proceedings of ICACIE 2018. Vol 2, pp. 301–313. Springer, Singapore (2020) Singh, D., et al.: Security issues in IoT and their countermeasures in smart city applications. Advanced computing and intelligent engineering: Proceedings of ICACIE 2018. Vol 2, pp. 301–313. Springer, Singapore (2020)
Zurück zum Zitat Tao, H., Bhuiyan, M.Z., Abdalla, A.N., Hassan, M.M., Zain, J.M., Hayajneh, T.: Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J. 6(1), 410–420 (2018)CrossRef Tao, H., Bhuiyan, M.Z., Abdalla, A.N., Hassan, M.M., Zain, J.M., Hayajneh, T.: Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J. 6(1), 410–420 (2018)CrossRef
Zurück zum Zitat Vikas, B.O.: Internet of things (iot): a survey on privacy issues and security. Int. J. Sci. Res. Sci. Eng. Technol. 1(3), 168–173 (2015) Vikas, B.O.: Internet of things (iot): a survey on privacy issues and security. Int. J. Sci. Res. Sci. Eng. Technol. 1(3), 168–173 (2015)
Zurück zum Zitat Wang, H., Wang, Z., Domingo-Ferrer, J.: Anonymous and secure aggregation scheme in fog-based public cloud computing. Futur. Gener. Comput. Syst.. Gener. Comput. Syst. 78, 712–719 (2018)CrossRef Wang, H., Wang, Z., Domingo-Ferrer, J.: Anonymous and secure aggregation scheme in fog-based public cloud computing. Futur. Gener. Comput. Syst.. Gener. Comput. Syst. 78, 712–719 (2018)CrossRef
Zurück zum Zitat Wang, J., et al.: Flow tracer: An effective flow trajectory detection solution based on probabilistic packet tagging in SDN-enabled networks. IEEE Trans. Netw. Serv. Manag.netw. Serv. Manag. 16(4), 1884–1898 (2019)CrossRef Wang, J., et al.: Flow tracer: An effective flow trajectory detection solution based on probabilistic packet tagging in SDN-enabled networks. IEEE Trans. Netw. Serv. Manag.netw. Serv. Manag. 16(4), 1884–1898 (2019)CrossRef
Zurück zum Zitat Yang, Y., Chen, X., Tan, R., Xiao, Y.: Intelligent IoT for the Digital World: Incorporating 5G Communications and Fog/Edge Computing Technologies. John Wiley & Sons, Hoboken (2021)CrossRef Yang, Y., Chen, X., Tan, R., Xiao, Y.: Intelligent IoT for the Digital World: Incorporating 5G Communications and Fog/Edge Computing Technologies. John Wiley & Sons, Hoboken (2021)CrossRef
Zurück zum Zitat Yao, Z., Ge, J., Wu, Y., Jian, L.: A privacy preserved and credible network protocol. J. Parallel. Distrib. Comput. 132, 150–159 (2019)CrossRef Yao, Z., Ge, J., Wu, Y., Jian, L.: A privacy preserved and credible network protocol. J. Parallel. Distrib. Comput. 132, 150–159 (2019)CrossRef
Metadaten
Titel
Homomorphic encryption algorithm providing security and privacy for IoT with optical fiber communication
Publikationsdatum
01.03.2024
Erschienen in
Optical and Quantum Electronics / Ausgabe 3/2024
Print ISSN: 0306-8919
Elektronische ISSN: 1572-817X
DOI
https://doi.org/10.1007/s11082-023-06098-5

Weitere Artikel der Ausgabe 3/2024

Optical and Quantum Electronics 3/2024 Zur Ausgabe

Neuer Inhalt