Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography

Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an effective approach to storing and managing the enormous amount of data generated by various devices. However, big data security of these organizations presents a challenge in the IoT–cloud architecture. To overcome security issues, we propose a cloud-enabled IoT environment supported by multifactor authentication and lightweight cryptography encryption schemes to protect big data system. The proposed hybrid cloud environment is aimed at protecting organizations’ data in a highly secure manner. The hybrid cloud environment is a combination of private and public cloud. Our IoT devices are divided into sensitive and nonsensitive devices. Sensitive devices generate sensitive data, such as healthcare data; whereas nonsensitive devices generate nonsensitive data, such as home appliance data. IoT devices send their data to the cloud via a gateway device. Herein, sensitive data are split into two parts: one part of the data is encrypted using RC6, and the other part is encrypted using the Fiestel encryption scheme. Nonsensitive data are encrypted using the Advanced Encryption Standard (AES) encryption scheme. Sensitive and nonsensitive data are respectively stored in private and public cloud to ensure high security. The use of multifactor authentication to access the data stored in the cloud is also proposed. During login, data users send their registered credentials to the Trusted Authority (TA). The TA provides three levels of authentication to access the stored data: first-level authentication - read file, second-level authentication - download file, and third-level authentication - download file from the hybrid cloud. We implement the proposed cloud–IoT architecture in the NS3 network simulator. We evaluated the performance of the proposed architecture using metrics such as computational time, security strength, encryption time, and decryption time.

[1]  Geeta Sharma,et al.  A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications , 2018, J. Inf. Secur. Appl..

[2]  Byung Wook Jin,et al.  A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud Environment , 2019, Wirel. Pers. Commun..

[3]  Jiankun Hu,et al.  New secure healthcare system using cloud of things , 2017, Cluster Computing.

[4]  Yixian Yang,et al.  DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices , 2017, World Wide Web.

[5]  Hsing-Chung Chen,et al.  Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application , 2018, Mobile Networks and Applications.

[6]  Francesco Palmieri,et al.  Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes , 2018, Future Gener. Comput. Syst..

[7]  Yaser Jararweh,et al.  Hardware Performance Evaluation of SHA-3 Candidate Algorithms , 2012, J. Information Security.

[8]  Seungmin Rho,et al.  A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services , 2017, Cluster Computing.

[9]  Xiaojiang Du,et al.  Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid , 2017, IEEE Internet of Things Journal.

[10]  Thar Baker,et al.  A Profitable and Energy-Efficient Cooperative Fog Solution for IoT Services , 2020, IEEE Transactions on Industrial Informatics.

[11]  Lu Zhou,et al.  Lightweight IoT-based authentication scheme in cloud computing circumstance , 2019, Future Gener. Comput. Syst..

[12]  Wen-Hsiang Lai,et al.  Fuzzy AHP analysis of Internet of Things (IoT) in enterprises , 2018, Technological Forecasting and Social Change.

[13]  Sheetal Kalra,et al.  Advanced lightweight multi-factor remote user authentication scheme for cloud-IoT applications , 2019, J. Ambient Intell. Humaniz. Comput..

[14]  Shiuh-Jeng Wang,et al.  File changes with security proof stored in cloud service systems , 2018, Personal and Ubiquitous Computing.

[15]  Yaser Jararweh,et al.  A Mobility Management Architecture for Seamless Delivery of 5G-IoT Services , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[16]  M. Laurent-Maknavicius,et al.  PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT , 2018, Comput. Networks.

[17]  Zhe Xia,et al.  Privacy-preserving raw data collection without a trusted authority for IoT , 2019, Comput. Networks.

[18]  Mauro Conti,et al.  LISA: Lightweight context-aware IoT service architecture , 2019, Journal of Cleaner Production.

[19]  Hai Jin,et al.  Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT , 2017, IEEE Access.

[20]  Thar Baker,et al.  Cloud-Based Multi-Agent Cooperation for IoT Devices Using Workflow-Nets , 2019, Journal of Grid Computing.

[21]  Antonio F. Gómez-Skarmeta,et al.  Architecture of security association establishment based on bootstrapping technologies for enabling secure IoT infrastructures , 2019, Future Gener. Comput. Syst..

[22]  Hong Rong,et al.  Fine-grained data access control with attribute-hiding policy for cloud-based IoT , 2019, Comput. Networks.

[23]  Xiang Li,et al.  SCCAF: A Secure and Compliant Continuous Assessment Framework in Cloud-Based IoT Context , 2018, Wirel. Commun. Mob. Comput..

[24]  Fadi Al-Turjman,et al.  Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks , 2017, IEEE Access.

[25]  Sheetal Kalra,et al.  A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services , 2018, Iranian Journal of Science and Technology, Transactions of Electrical Engineering.

[26]  Thar Baker,et al.  Providing secure and reliable communication for next generation networks in smart cities , 2020, Sustainable Cities and Society.

[27]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[28]  Ing-Ray Chen,et al.  Trust-Based IoT Cloud Participatory Sensing of Air Quality , 2019, Wirel. Pers. Commun..

[29]  Panagiotis Papadimitratos,et al.  SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things , 2017, Future Gener. Comput. Syst..

[30]  Lu Liu,et al.  A Framework for Orchestrating Secure and Dynamic Access of IoT Services in Multi-Cloud Environments , 2018, IEEE Access.

[31]  Sheetal Kalra,et al.  Multi-factor user authentication scheme for IoT-based healthcare services , 2018, Journal of Reliable Intelligent Environments.

[32]  Athanasios V. Vasilakos,et al.  Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things , 2017, IEEE Cloud Computing.

[33]  Gandikota Ramu,et al.  A secure cloud framework to share EHRs using modified CP-ABE and the attribute bloom filter , 2018, Education and Information Technologies.