A secure and scalable storage system for aggregate data in IoT

In recent years, with the impressive rapid development of integrated circuit and networking technologies, computers, devices and networking have become highly pervasive, incurring the introduction, development and deployment of the Internet of Things (IoT). The tiny identifying devices and wearables in IoT have transformed daily life in human society, as they generate, process and store the amount of data increasing at exponential rate all over the world. Due to high demand on data mining and analytics activities in IoT, secure and scalable mass storage systems are highly demanded for aggregate data in efficient processing. In this paper, we propose such a secure and scalable IoT storage system based on revised secret sharing scheme with support of scalability, flexibility and reliability at both data and system levels. Shamir's secret sharing scheme is applied to achieve data security without complex key management associated with traditional cryptographic algorithms. The original secret sharing scheme is revised to utilize all coefficients in polynomials for larger data capacity at data level. Flexible data insert and delete operations are supported. Moreover, a distributed IoT storage infrastructure is deployed to provide scalability and reliability at system level. Multiple IoT storage servers are aggregated for large storage capacity whereas individual servers can join and leave freely for flexibility at system level.?Experimental results have demonstrated the feasibility and benefits of the proposed system as well as tangible performance gains. Shamir's secret sharing is revised for multi-coefficient utilization.An internal padding scheme is proposed for flexible data management.Local storage systems are designed with secrecy and reliability at data level.IoT storage systems are deployed with scalability and reliability at system level.Major data operations are supported in distributed IoT storage environments.

[1]  Zhiqian Xu,et al.  HASS: Highly Available, Scalable and Secure Distributed Data Storage Systems , 2009, 2009 International Conference on Computational Science and Engineering.

[2]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Hai Jiang,et al.  Deploying Scalable and Secure Secret Sharing with GPU Many-Core Architecture , 2012, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum.

[5]  Fujita Satoshi,et al.  A Timeline Based Query-Driven Caching Protocol for Hierarchical Peer-to-Peer File Sharing Systems , 2010 .

[6]  Hai Jiang,et al.  A Secure Distributed File System Based on Revised Blakley's Secret Sharing Scheme , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[7]  Ben Y. Zhao,et al.  Awarded Best Student Paper! - Pond: The OceanStore Prototype , 2003 .

[8]  Matei Ripeanu,et al.  A GPU accelerated storage system , 2010, HPDC '10.

[9]  M. Polte,et al.  Comparing performance of solid state devices and mechanical disks , 2008, 2008 3rd Petascale Data Storage Workshop.

[10]  Lihao Xu,et al.  Efficient software implementations of large finite fields GF(2n) for secure storage applications , 2012, TOS.

[11]  Yongdae Kim,et al.  On protecting integrity and confidentiality of cryptographic file system for outsourced storage , 2009, CCSW '09.

[12]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[13]  Hairong Kuang,et al.  The Hadoop Distributed File System , 2010, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST).

[14]  Michael Stonebraker,et al.  Distributed RAID-a new multiple copy algorithm , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.

[15]  Sean Quinlan,et al.  Venti: A New Approach to Archival Storage , 2002, FAST.

[16]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[17]  Matt Blaze,et al.  A cryptographic file system for UNIX , 1993, CCS '93.

[18]  Howard Gobioff,et al.  The Google file system , 2003, SOSP '03.

[19]  Ben Y. Zhao,et al.  Pond: The OceanStore Prototype , 2003, FAST.

[20]  Yogesh Simmhan,et al.  Designing a secure storage repository for sharing scientific datasets using public clouds , 2011, DataCloud-SC '11.

[21]  Charu C. Aggarwal,et al.  The Internet of Things: A Survey from the Data-Centric Perspective , 2013, Managing and Mining Sensor Data.

[22]  Tomasz Haupt,et al.  Architecture for a Secure Distributed Repository , 2006, 2006 7th IEEE/ACM International Conference on Grid Computing.

[23]  Sarah M. Diesburg,et al.  When cryptography meets storage , 2008, StorageSS '08.

[24]  Satoshi Fujita,et al.  A Two-Level Caching Protocol for Hierarchical Peer-to-Peer File Sharing Systems , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications.

[25]  Andrea C. Arpaci-Dusseau,et al.  Deconstructing commodity storage clusters , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).

[26]  Jiwu Shu,et al.  Shield: A stackable secure storage system for file sharing in public storage , 2014, J. Parallel Distributed Comput..

[27]  Robert Ricci,et al.  GPUstore: harnessing GPU computing for storage systems in the OS kernel , 2012, SYSTOR '12.

[28]  Ethan L. Miller,et al.  POTSHARDS: Secure Long-Term Storage Without Encryption , 2007, USENIX Annual Technical Conference.

[29]  Ethan L. Miller,et al.  Long-term threats to secure archives , 2006, StorageSS '06.