International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Design of Maintaining Data Security on IoT Data Transferred Through IoT Gateway System to Cloud Storage

Author NameAuthor Details

S. Alexander Suresh, R. Jemima Priyadarsini

S. Alexander Suresh[1]

R. Jemima Priyadarsini[2]

[1]Department of Computer Science, Bishop Heber College (Affiliated to Bharathidasan University), Trichy, Tamil Nadu, India

[2]Department of Computer Science, Bishop Heber College (Affiliated to Bharathidasan University), Trichy, Tamil Nadu, India

Abstract

IoT is a smart-device environment; it acts smarter and gives higher quality to enhance the user experience. IoT is an open network environment. However, IoT's security challenges are more vulnerable because the devices are openly accessible to all in the network. IoT communication can be formed in different ways, where the device generates the data is communicated to other devices or gateway or cloud. Therefore, security challenges are in everywhere IoT environment. IoT Communication considered in this paper is gateway communication. Data generated from the IoT environment are directed to the cloud over a gateway system. Hence, the data essentials to be protected from the IoT devices to the gateway system and the gateway system to the cloud storage. The cloud is a public environment that makes security is a challenge to keep data secure. Therefore, securing IoT data to the cloud environment is the most significant focus. This paper focuses on securing the data from the gateway system to the cloud storage. The paper proposes an enhanced modern symmetrical encryption to secure data to ensure data security in the travel and storage of IoT data to the cloud. The proposed Enhanced Modern Symmetric Data Encryption (EMSDE) is a block cipher encryption technique. It encrypts data by 64-bit block. Proposed encryption is tested according to time and level of security. Thingspeak stores the IoT data sent from the IoT gateway system for implementation and testing. Based on the testing, the proposed EMSDE produces better results, and it is tailored to secure data stored in the cloud from IoT devices.

Index Terms

IoT-Cloud

IoT Gateway

Data Security

Cryptography

Symmetric Key

Encryption

Key Generation

Reference

  1. 1.
    Panagiotis I. Radoglou Grammatikis, Panagiotis G. Sarigiannidis, Ioannis D. Moscholios, Securing the Internet of Things: Challenges, threats and solutions, Internet of Things, Elsevier, Vol. 5, 2019, pp. 41–70.
  2. 2.
    Hossein Ahmadi, Goli Arji, Leila Shahmoradi, Reza Safdari, Mehrbakhsh Nilashi and Mojtaba Alizadeh, The application of Internet of things in health-care: a systematic literature review and classification, Universal Access in the Information Society, 2019, Vol. 18, pp. 837–869.
  3. 3.
    Faizan Khursheeed, M Sami-Ud-din, Irshad Ahmed Sumra, Muhammad Safder, A Review of Security Mechanism in the Internet of Things, IEEE, 2020, pp. 1-19.
  4. 4.
    Dewanjee, R., P. Verma, and R. Vjas. "Cryptography Techniques and Internet of Things." IEEE International Conference on Electronics and Communication Systems, 2016, pp. 1-4.
  5. 5.
    Ali Hameed and Alauddin alomary, "Security Issues in IoT: A Survey", IEEE International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 2019, pp. 1-5.
  6. 6.
    Subir Halder and Mauro Conti, CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem, IEEE Transactions on Cloud Computing, 2021, pp. 1-14.
  7. 7.
    Preeti Mishra, Sachin Kumar, Umang Garg, Emmanuel S. Pilli and R.C. Joshi, Security Perspectives of Various IoT Cloud Platforms: A Review & Case Study, IEEE International Conference on Computing, Communication, and Intelligent Systems, 2021, pp. 727-731.
  8. 8.
    Raja S., Manikandasaran S.S., Doss R., "Threat Modeling and IoT Attack Surfaces". In: Aurelia S., Paiva S. (eds) Immersive Technology in Smart Cities. EAI/Springer Innovations in Communication and Computing. Springer, Cham. 2022, pp. 229-258.
  9. 9.
    Nickson M. Karie, Nor Masri Sahri and Paul Haskell-Dowland, "IoT Threat Detection Advances, Challenges and Future Directions", IEEE Workshop on Emerging Technologies for Security in IoT, 2020, pp. 22-29.
  10. 10.
    Ali Hameed and Alauddin alomary, Security Issues in IoT: A Survey, IEEE International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 2019, pp. 1-5.
  11. 11.
    C. Linda Hepsiba, Dr. R. Jemima Priyadarsini, Dr. S.Titus, A Comprehensive Study on Routing Attacks with Countermeasures in the Internet of Things, Solid State Technology, Volume: 63 Issue: 4, 2020, pp. 1-7.
  12. 12.
    Jeethu Mathew, Dr. R. Jemima Priyadarsini, A Review on DoS Attacks in IoT, Solid State Technology Volume: 63 Issue: 4, 2020, pp. 1-10.
  13. 13.
    S. Alexander Suresh SDB, Dr. R. Jemima Priyadarsini, ETSET: Enhanced Tiny Symmetric Encryption Techniques to Secure Data Transmission among IoT Devices, Turkish Journal of Computer and Mathematics Education, Vol.12 No.10, 2021, pp. 1094- 1099.
  14. 14.
    Ding Li, Wang Zhongsheng, Wang Xiaodong, Wu Dong, Security information transmission algorithms for IoT based on cloud computing, Computer Communications, Elsevier, Vol. 155, 2020, pp.32-39.
  15. 15.
    Shancang Li, Chapter 2 - Security Architecture in the Internet of Things, Editor(s): Shancang Li, Li Da Xu, Securing the Internet of Things, Syngress, 2017, pp. 27-48.
  16. 16.
    Muhammad Sheraz Mehmood, Muhammad Rehman Shahid, Abid Jamil, Rehan Ashraf, Toqeer Mahmood, Aatif Mehmood, A Comprehensive Literature Review of Data Encryption Techniques in Cloud Computing and IoT Environment, IEEE, 2019, pp. 54-59.
  17. 17.
    Roderick Hodgson, Solving the security challenges of IoT with public-key cryptography, Elsevier Network Security, Vol. 2019, Issue 1, 2019, pp. 17-19.
  18. 18.
    Chandrasegar Thirumalai, Senthilkumar Mohan, Gautam Srivastava, An efficient public key secure scheme for cloud and IoT security, Elsevier Computer Communications, Volume 150, 2020, pp. 634-643.
  19. 19.
    Shancang Li, Chapter 4 - IoT Node Authentication, Editor(s): Shancang Li, Li Da Xu, Securing the Internet of Things, Syngress, 2017, pp. 69-95.
  20. 20.
    Symmetric vs Asymmetric Encryption – What are the differences? Accessed on 04 Nov 2021, https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences.
  21. 21.
    Susha Surendran, Amira Nassef, Babak D. Beheshti, A Survey of Cryptographic Algorithms for IoT Devices, IEEE, 2018, pp. 1-8.
  22. 22.
    Kejun Chen, Shuai Zhang, Zhikun Li, Yi Zhang, Qingxu Deng, Sandip Ray and Yier Jin, Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges and Practice, Springer Journal of Hardware and Systems Security, Vol. 2, 2018, pp. 97-110.
  23. 23.
    Hossein Ahmadi, Goli Arji, Leila Shahmoradi, Reza Safdari, Mehrbakhsh Nilashi and Mojtaba Alizadeh, The application of Internet of things in health-care: a systematic literature review and classification, Springer Universal Access in the Information Society, 2018, pp. 1-33.
  24. 24.
    Debabrata samanta , Ahmed h. Alahmadi, Karthikeyan m. P., Mohammad Zubair khan, Amit Banerjee, Gautam Kumar Ganapa, and Seeram Ramakrishna, Cipher Block Chaining Support Vector Machine for Secured Decentralized Cloud-Enabled Intelligent IoT Architecture, IEEE Access, Vol. 9, 2021, pp. 98013- 98025.
  25. 25.
    Neha Kashyap, Ajay Rana, Vineet Kansal, Himdweep Walia, Improve Cloud-Based IoT Architecture Layer Security - A Literature Review, IEEE International Conference on Computing, Communication, and Intelligent Systems, 2021, pp. 772-777.
  26. 26.
    Mohd. Tajammul, Rafat Parveen, Auto encryption algorithm for uploading data on cloud storage, International Journal of Information Technology, Springer, Vol. 12, Issue 3, 2020, pp. 831–837.
  27. 27.
    N. Jayapandian, A. M. J. M. Z. Rahman, S. Radhikadevi and M. Koushikaa, "Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption," 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), Coimbatore, 2016, pp. 1-4.doi: 10.1109/STARTUP.2016.7583904
  28. 28.
    Jayant D. Bokefodea, Avdhut S. Bhiseb, Prajakta A. Satarkara and Dattatray G. Modanic, Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role-Based Encryption, Twelfth International Multi-Conference on Information Processing-2016 Procedia Computer Science 89 ( 2016 ) 43 – 50
  29. 29.
    A.Vithya Vijayalakshmi and Dr L. Arockiam, Enhancing The Security Of Iot Data Using Multilevel Encryption, International Journal of Advanced Research in Computer Science, Vol. 8, Issue 9, Nov–Dec 2017, pp. 841-845.
  30. 30.
    Canteaut, A., Carpov, S., Fontaine, C., Jacques, Fournier, Lac, B., Naya-Plasencia, M., Sirdey, R., & Tria, A. (2017). End-to-end data security for IoT: from a cloud of encryptions to encryption in the cloud. In Proc. IEEE Conf. (Cesar), Nov. 2017, pp. 1–21.
  31. 31.
    K. Saini, V. Agarwal, A. Varshney and A. Gupta, "E2EE For Data Security For Hybrid Cloud Services: A Novel Approach," 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida (UP), India, 2018, pp. 340-347. doi: 10.1109/ICACCCN.2018.8748782
  32. 32.
    N. L. Kodumru and M. Supriya, "Secure Data Storage in Cloud Using Cryptographic Algorithms," 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India, 2018, pp. 1-6.doi: 10.1109/ICCUBEA.2018.8697550.
  33. 33.
    Anuj Kumar, Vinod Jain and Anupam Yadav, "A New Approach for Security in Cloud Data Storage for IoT Applications Using Hybrid Cryptography Technique", IEEE, 2020, pp.514-517.
  34. 34.
    Zejun Ren, Xiangang Liu, Runguo Ye, Tao Zhang, Security and Privacy on Internet of Things, IEEE, 2017, pp. 140-144.
  35. 35.
    Haiyun Ma and Zhonglin Zhang, A New Private Information Encryption Method in the Internet of Things under Cloud Computing Environment, Wireless Communications and Mobile Computing, 2020, pp. 1-9.
  36. 36.
    Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen, Leyou Zhang, Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT, IEEE Transactions on Cloud Computing, 2021, pp. 1-12.
SCOPUS
SCImago Journal & Country Rank