Abstract
IoT entities amass a massive quantity of sensing data and transmit it to the cloud for processing as well as reasoning. Such disparate networks raise numerous research questions, say processing, storage, and management of massive data. Though numerous prevailing methodologies are presented, it brings about restricted memory, battery-centered processes, privacy, safety, low processing ability, along with compatibility that directed them to be exposed to disparate attacks, particularly during the data transmission process. To surmount such disadvantages, ‘two’ methods are proposed aimed at IoT data distribution to the cloud utilizing IANFIS in addition to secure transmission of those distributed data utilizing MECC. Initially, the IoT device is authenticated by means of performing registration, login, as well as verification for preventing the device as of unauthorized utilization. Subsequently, the device is accessed to sense the information as of associated objects by utilizing smart sensors; in addition, the communication of disparate IoT sensors is performed by employing the MQTT protocol. Utilizing the IANFIS, this sensed information as of diverse IoT devices is distributed to the specific cloud server. Then by employing the MECC, the data is sent securely to the user. Lastly, the LC is executed by means of HFPGA. To corroborate the proposed system’s effectiveness and correctness, it is compared with existing methodologies and evaluated against relevant metrics.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Adat V, Gupta BB (2018) Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67(3):423–441. https://doi.org/10.1007/s11235-017-0345-9
Al-Fuqaha A, MGuizani, M Mohammadi, M Aledhari, M Ayyash, (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor. 17(4):2347–2376. https://doi.org/10.1109/COMST.2015.2444095
Ammar M, Russello G, Crispo B (2018) Internet of things: A survey on the security of IoT frameworks. J Inf Secur Appl 38:8–27. https://doi.org/10.1016/j.jisa.2017.11.002
Areekijseree K, Tang Y, Chen J, Wang S, Iyengar A, Palanisamy B (2018) Secure and efficient multi-party directory publication for privacy-preserving data sharing. In: International Conference on security and privacy in communication systems. pp. 71–94. https://doi.org/10.1007/978-3-030-01701-9_5.
Ari AAA, Ngangmo OK, Titouna C, Thiare O, Mohamadou A, Gueroui AM (2019) Enabling privacy and security in cloud of things: architecture, applications, security & privacy challenges. Appl Comput Inf. https://doi.org/10.1016/j.aci.2019.11.005
Bogdanov D, Niitsoo M, Toft T, Willemson J (2012) High-performance secure multi-party computation for data mining applications. Int J Inf Secur 11(6):403–418. https://doi.org/10.1007/s10207-012-0177-2
Botta A, De Donato W, Persico V, Pescapé A (2016) Integration of cloud computing and internet of things: a survey. Future Gener Comput Syst 56:684–700. https://doi.org/10.1016/j.future.2015.09.021
Cheng S, Li Y, Tian Z, Cheng W, Cheng X (2019) A model for integrating heterogeneous sensory data in IoT systems. Comput Netw 150:1–14. https://doi.org/10.1016/j.comnet.2018.11.032
Chenthara S, Ahmed K, Wang H, Whittaker F (2019) Security and privacy-preserving challenges of e-Health solutions in cloud computing. IEEE Access 7:74361–74382. https://doi.org/10.1109/ACCESS.2019.2919982
Cheruvu S, Kumar A, Smith N, Wheeler DM (2020) Connectivity technologies for IoT. In: Demystifying Internet of Things Security. Apress. Berkeley. CA. pp. 347–411. https://doi.org/10.1007/978-1-4842-2896-8.
Dande A, Pathan SK (2015) Generic communication framework for internet of things. Int J Sci Res (IJSR) 5(6):1645–1649. https://doi.org/10.21275/v5i6.NOV1645641645
Ejaz W, Anpalagan A (2019) Communication technologies and protocols for internet of things. In: Internet of Things for Smart Cities. pp. 17–30. https://doi.org/10.1007/978-3-319-95037-2_2
Gardiyawasam Pussewalage HS, Ranaweera PS (2013) Secure multi-party based cloud computing framework for statistical data analysis of encrypted data. Master's thesis. Universitetet i Agder/University of Agder.
Glaroudis D, Iossifides A, Chatzimisios P (2019) Survey, comparison and research challenges of IoT application protocols for smart farming. Comput Netw 168:107037. https://doi.org/10.1016/j.comnet.2019.107037
Gochhayat SP, Lal C, Sharma L, Sharma DP, Gupta D, Marmolejo Saucedo JA, Kose U (2019d) Reliable and secure data transfer in IoT networks. Wirel Netw. 1:14. https://doi.org/10.1007/s11276-019-02036-0
Huang Q, Wang L, Yang Y (2018) DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices. World Wide Web 21(1):151–167. https://doi.org/10.1007/s11280-017-0462-0
Joseph Choi I, Butler KRB (2019) Secure multiparty computation and trusted hardware: examining adoption challenges and opportunities. Secur Commun Netw. https://doi.org/10.1155/2019/1368905
Kumar S, Tiwari P, Zymbler M (2019) Internet of Things is a revolutionary approach for future technology enhancement: a review. Journal of Big Data 6(1):111. https://doi.org/10.1186/s40537-019-0268-2
Li HW, Yu XY, Qian C (2017) An IoT data communication framework for authenticity and integrity. In IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE. pp. 159–170. https://doi.org/10.1145/3054977.3054982.
Liu Z, Seo H (2018) IoT-NUMS: evaluating NUMS elliptic curve cryptography or IoT platforms. IEEE Trans Inf For Secur. 14(3):720–729. https://doi.org/10.1109/TIFS.2018.2856123
Lohachab A (2019) ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. J Inf Secur Appl 46:1–12. https://doi.org/10.1016/j.jisa.2019.02.005
Meroni G, Baresi L, Montali M, Plebani P (2018) Multi-party business process compliance monitoring through IoT-enabled artifacts. Inf Syst 73:61–78. https://doi.org/10.1016/j.is.2017.12.009
Ostad-Sharif A, Arshad H, Nikooghadam M, Abbasinezhad-Mood D (2019) Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Future Gener Comput Syst 100:882–892. https://doi.org/10.1016/j.future.2019.04.019
Santamaria AF, De Rango F, Seriannind A, Raimondo P (2018) A real IoT device deployment for e-Health applications under lightweight communication protocols. activity classifier and edge data filtering. Comput Commun 128:60–73. https://doi.org/10.1016/j.comcom.2018.06.010
Seliem M, Elgazzar K, Khalil K (2018) Towards privacy preserving iot environments: a survey. Wirel Commun Mob Comput. https://doi.org/10.1155/2018/1032761
Sethi P, Sarangi SR (2017) Internet of things: architectures protocols and applications. J Electric Comput Eng. https://doi.org/10.1155/2017/9324035
Siddiqui F, Beley J, Zeadally S, Braught G (2019) Secure and lightweight communication in heterogeneous IoT environments. Internet Things 5(4):100093. https://doi.org/10.1007/s11432-014-5209-2
Silva JC, Rodrigues JJPC, Al-Muhtadi J, Rabêlo RAL, Furtado V (2019) Management platforms and protocols for Internet of Things: a survey. Sensors 19(3):676. https://doi.org/10.3390/s19030676
Sundari S, Ananthi M (2015) Secure multi-party computation in differential private data with data integrity protection. In: International Conference on computing and communications technologies (ICCCT). pp 180–184. https://doi.org/10.1109/ICCCT2.2015.7292742.
Tso R, Alelaiwi A, Rahman SMdM, Wu M-E, Hossain MS (2017) Privacy-preserving data communication through secure multi-party computation in healthcare sensor cloud. J Signal Process Syst 89(1):51–59. https://doi.org/10.1155/2017/6097253
Vu D-H, Luong T-D, Ho T-B (2019) An efficient approach for secure multi-party computation without authenticated channel. Inf Sci. https://doi.org/10.1016/j.ins.2019.07.031
Wang W, Xu P, Yang LT (2018) Secure data collection, storage and access in cloud-assisted IoT. IEEE Cloud Comput 5(4):77–88. https://doi.org/10.1109/MCC.2018.111122026
Wang MC, Zhou J, Li P (2019) Data communication mechanism for greenhouse environment monitoring and control: an agent-based IoT system. Inf Process Agric. https://doi.org/10.1016/j.inpa.2019.11.002
Yang Y, Zheng X, Tang C (2017) Lightweight distributed secure data management system for health internet of things. J Netw Comput Appl 89:26–37. https://doi.org/10.1016/j.jnca.2016.11.017
Zhang X, Wuwong N, Li H, Zhang X (2010) Information security risk management framework for the cloud computing environments. In 10th IEEE International Conference on computer and information technology. pp. 1328–1334. https://doi.org/10.1109/CIT.2010.501
Zhaos C, Zhao S, Zhao M, Chen Z, Gao C-Z, Li H, Tan Y-A (2019) Secure multi-party computation: theory. Practice and applications. Inf Sci 476:357–372
Zhu Y, Song X, Yang S, Qin Y, Zhou Q (2018) Secure smart contract system built on smpc over blockchain. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber. Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). pp. 1539–1544. https://doi.org/10.1109/Cybermatics_2018.2018.00259.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Pampapathi, B.M., Nageswara Guptha, M. & Hema, M.S. Data distribution and secure data transmission using IANFIS and MECC in IoT. J Ambient Intell Human Comput 13, 1471–1484 (2022). https://doi.org/10.1007/s12652-020-02792-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02792-4