A Multiple Layer Sercurity Architecture for Internet of Things into MVC Design

Secure Layered architecture(SLA) has been become a widely used Architecture model. Each layer represents a kind of function. In the current process of software development, the most SLA is based on MVC: Model, View and Controller. Model is the layer that is used to communicate with database and provides the data for controller. Controller is the logical layer, it is responsible for handling the data provided from model and serve the layer of view. And the View is used to display the data. The Three tier architecture(TTA) is practical in most development. But In some project, whose business is more complex and the number of requests is bigger, the TTA has a little bad performance. For better development and better performance, The more secure multiple layer architecture(MMLA) is put forward. Besides the MVC, The MMLA splits the layer of model and controller. Based on the business logic and the service request, they are split into multiple layers for different business and different layer is put into the different server. This kind of layers can not only reducing coupling with modules and also improve the extensibility of the system. The way that the Different layer is in the different server can greatly improved the data security. Experiments show that The performance, the expansibility and the security can be greatly improved but also obtaining the satisfactory service with our proposed MMLA.

[1]  Yuan Mei The Research and Application of MVC Software Architecture Based on J2EE , 2003 .

[2]  Andre Charland,et al.  Mobile application development , 2011, Commun. ACM.

[3]  Meikang Qiu,et al.  Security-aware optimization for ubiquitous computing systems with SEAT graph approach , 2013, J. Comput. Syst. Sci..

[4]  Ahmad Afsahi,et al.  An Efficient MPI Message Queue Mechanism for Large-scale Jobs , 2012, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.

[5]  Meikang Qiu,et al.  Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.

[6]  Tommi Mikkonen,et al.  A Taxonomy of IoT Client Architectures , 2018, IEEE Software.

[7]  Andy Zaidman,et al.  Web API growing pains: Stories from client developers and their code , 2014, 2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE).

[8]  P. Kundur,et al.  Power system stability and control , 1994 .

[9]  Hong Linh Truong,et al.  MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[10]  Jerry R. Hobbs,et al.  DAML-S: Web Service Description for the Semantic Web , 2002, SEMWEB.

[11]  Daniel J. Bernstein,et al.  Cache-timing attacks on AES , 2005 .