A semi-outsourcing secure data privacy scheme for IoT data transmission

Deploying trusted (private) cloud computing to exchange, store and analyse data from IoT networks has become mainstream. In this paper, we describe a data privacy transmission scheme for IoT data collection, which supports one-way identity authentication and a dual data integrity validation for low resource devices called the Lo-A&DI (Low-resource for IoT 1-way Authentication and Dual Integrity) scheme. Unlike other schemes that use trusted clouds, the Lo-A&DI can be applied to untrusted public clouds while protecting data security and privacy. Unlike other untrusted cloud security schemes, the Lo-A&DI scheme can be used to support end-to-end data security and privacy from low-resource ICT IoT devices. An experimental validation shows that the performance of the Lo-A&DI is much more adaptable for use in resource-constrained IoT devices when compared to a baseline trusted cloud scheme such as one based upon an interactive (2-way) certificate authentication scheme for IoT data exchange.

[1]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[2]  Flora Malamateniou,et al.  Enabling data protection through PKI encryption in IoT m-Health devices , 2012, 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE).

[3]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[4]  T. Sudha,et al.  Oruta: Privacy- Preserving Public Auditing for Shared Data in the Cloud , 2018 .

[5]  Sudip Misra,et al.  Cloud Computing Applications for Smart Grid: A Survey , 2015, IEEE Transactions on Parallel and Distributed Systems.

[6]  Tongrang Fan,et al.  A scheme of data management in the Internet of Things , 2010, 2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content.

[7]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[8]  Jianliang Xu,et al.  Processing private queries over untrusted data cloud through privacy homomorphism , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[9]  Stefan Poslad,et al.  Adaptive security and privacy management for the internet of things (ASPI 2013) , 2013, UbiComp.

[10]  Paul Thomas,et al.  Low Throughput Networks for the IoT: Lessons learned from industrial implementations , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[11]  Stefan Poslad,et al.  AN INTEGRATED APPROACH TO USER-CENTERED PRIVACY FOR MOBILE INFORMATION SERVICES , 2006, Appl. Artif. Intell..

[12]  Stefan Poslad,et al.  Using a Smart City IoT to Incentivise and Target Shifts in Mobility Behaviour—Is It a Piece of Pie? , 2015, Sensors.

[13]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[14]  Fei Tao,et al.  IoT-Based Intelligent Perception and Access of Manufacturing Resource Toward Cloud Manufacturing , 2014, IEEE Transactions on Industrial Informatics.

[15]  Stefan Poslad,et al.  An Evaluation Framework for Adaptive Security for the IoT in eHealth , 2014 .