An Effective Block-Chain Based Authentication Technique for Cloud Based IoT

Nowadays, cloud computing services and applications have created plenty of storage space to meet the demand and the utility for human life. However, these cloud services face serious security challenges against various attacks. Cloud computing services rely primarily on confidential data generated by devices connected to cloud account-specific personal information. These devices typically use security in an ID-based encryption scheme. The Identity-Encryption Technique (IDET) technique is an essential public cryptosystem that uses a user’s identity information email or IP address. IDET uses signature authentication used in public-key encryption or public key infrastructure (PKI) instead of digital keys. The PKI uses a password for public key infrastructure (PKI) authentication. In contrast, the proposed model, an ID-based Block-chain Authority (IDBA) no need to maintain hash for authentication. Getting rid of Key management issues and avoiding a secure channel at the key exchange point is a functional problem.

[1]  Markus Kraft,et al.  Blockchain technology in the chemical industry: Machine-to-machine electricity market , 2017 .

[2]  OthmanMazliza,et al.  Internet of Things security , 2017 .

[3]  Anthony Skjellum,et al.  A brief survey of Cryptocurrency systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[4]  Yier Jin,et al.  Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.

[5]  David Schwartz,et al.  The Ripple Protocol Consensus Algorithm , 2014 .

[6]  Matthias Mettler,et al.  Blockchain technology in healthcare: The revolution starts here , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).

[7]  Bayu Adhi Tama,et al.  Tree-based classifier ensembles for early detection method of diabetes: an exploratory study , 2019, Artificial Intelligence Review.

[8]  Prakash Veeraraghavan,et al.  Elliptic Curve Based Cybersecurity Schemes for Publish-Subscribe Internet of Things , 2016, QSHINE.

[9]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011 .

[10]  Jiangtao Wen,et al.  The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.

[11]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[12]  Andrew P. Martin,et al.  Threat-Based Security Analysis for the Internet of Things , 2014, 2014 International Workshop on Secure Internet of Things.

[13]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[14]  Ching-Hsien Hsu,et al.  Efficient identity authentication and encryption technique for high throughput RFID system , 2016, Secur. Commun. Networks.

[15]  Leïla Azouz Saïdane,et al.  A Secure and Privacy-Preserving Solution for IoT over NDN Applied to E-health , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[16]  Morteza Nikooghadam,et al.  Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems , 2014, Journal of Medical Systems.

[17]  Andrew S. Tanenbaum,et al.  Distributed systems - principles and paradigms, 2nd Edition , 2007 .

[18]  Naveen K. Chilamkurti,et al.  Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.

[19]  Sherali Zeadally,et al.  Impact of denial of service solutions on network quality of service , 2011, Secur. Commun. Networks.

[20]  Antonio Pescapè,et al.  On the Integration of Cloud Computing and Internet of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[21]  BottaAlessio,et al.  Integration of Cloud computing and Internet of Things , 2016 .

[22]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[23]  Qi Xia,et al.  BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments , 2017, Inf..

[24]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[25]  Kem Z. K. Zhang,et al.  Blockchain-based sharing services: What blockchain technology can contribute to smart cities , 2016, Financial Innovation.

[26]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[27]  22nd International Symposium on Intensive Care and Emergency Medicine, Brussels, Belgium, 19–22 March 2002 , 2002, Critical care.

[28]  Kevin Fu,et al.  Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..

[29]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[30]  Andrew Lippman,et al.  MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).

[31]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[32]  Cheng-Chi Lee,et al.  Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.

[33]  Harry Chen,et al.  SOUPA: standard ontology for ubiquitous and pervasive applications , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[34]  Yu Zhang,et al.  An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.

[35]  Jaydip Sen,et al.  Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .

[36]  Jong Hyuk Park,et al.  An efficient collusion resistant security mechanism for heterogeneous sensor networks , 2009, Internet Res..