SECURITY AND PRIVACY PRESERVING OF SENSOR DATA LOCALIZATION BASED ON INTERNET OF THINGS

The internet of thing which is a prominent network for the transmission of valuable information over the internet, by tracking, computing and refining handles large scale of information as it being engaged in a wide range of application, ranging from the home to industries and government concerns. It provides with the capability of the transmitting information’s over internet without the interference of the humans. Despite its potentials, the internet of the things suffer from limited storage facilities and seek the services of the cloud to assist with the storage provisions for the data that are being sensed. Though cloud is facilitated with the enormous resources of storage, the placing of the sensed data into the cloud would be energy consuming and prone to the security threats causing illegal access. So the paper proposes the multi-objective optimization technique based on the NDSGA-II to present with the optimal solutions for the energy and the security issues involved in the locating of the data into the cloud. The proposed method is validated using the network simulator-II to detail its efficiency, in terms of energy consumption, security, network longevity, and resource utilization.

[1]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[2]  Hao Wang,et al.  A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things , 2019, Future Gener. Comput. Syst..

[3]  Zhe Xia,et al.  Privacy-preserving raw data collection without a trusted authority for IoT , 2019, Comput. Networks.

[4]  Nenghai Yu,et al.  Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data , 2019, IEEE Internet of Things Journal.

[5]  Jian Yu,et al.  A Brief Survey on IoT Privacy: Taxonomy, Issues and Future Trends , 2018, ICSOC Workshops.

[6]  Giancarlo Succi,et al.  Authentication in cloud-driven IoT-based big data environment: Survey and outlook , 2019, J. Syst. Archit..

[7]  Laurence T. Yang,et al.  A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion , 2019, Inf. Fusion.

[8]  Hao Wang,et al.  A source location privacy protection scheme based on ring-loop routing for the IoT , 2019, Comput. Networks.

[9]  Silvia Giordano,et al.  VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the Internet of Things , 2018, Pervasive Mob. Comput..

[10]  Xiaolei Dong,et al.  BDK: Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks , 2013, BODYNETS.

[11]  Jian Shen,et al.  Secure data uploading scheme for a smart home system , 2018, Inf. Sci..

[12]  Ali Dehghantanha,et al.  Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..