Neural Computing and Applications

, Volume 31, Supplement 1, pp 293–308 | Cite as

A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT)

  • M. P. GopinathEmail author
  • G. S. Tamizharasi
  • L. Kavisankar
  • R. Sathyaraj
  • S. Karthi
  • S. L. Aarthy
  • B. Balamurugan
Machine Learning Applications for Self-Organized Wireless Networks


Internet of underwater things (IoUT) is an emerging technique with widespread applications. In such type of systems, efficient and secure use of network resources remains to be a greater challenge. This is due to the reason that it works on the basis of a network of smart interconnected objects. This creates the necessity for energy-aware and secure communication techniques across IoUT environment. In order to solve this issue, in this paper, a secure cloud-based solution for real-time monitoring and management of IoUT across smart cities is provided. The proposed system mainly focuses on secure data transmission with lesser energy requirements. This makes smart cities to go green and efficient. The major contribution of the proposed system is divided into two parts: First, an energy-aware efficient framework for IoUT system is defined. Next, we define an enhanced attribute-based encryption scheme with effective user attribute management for secure data transmission across IoUT systems. The simulations are performed, and the results state that the proposed approach provides better security and privacy measures than the existing system. In future, this work could be extended to deal with increasing amount of complexity measures with increased user attributes.


Internet of underwater things (IoUT) Attribute-based encryption (ABE) Underwater sensor networks (UWSNs) 


Compliance with ethical standards

Conflict of interest

There is no conflict of interest between the authors to publish this manuscript.


  1. 1.
    Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32CrossRefGoogle Scholar
  2. 2.
    Domingo MC (2012) An overview of the internet of underwater things. J Netw Comput Appl 35(6):1879–1890CrossRefGoogle Scholar
  3. 3.
    Kao C-C, Lin Y-S, Geng-De W, Huang C-J (2017) A comprehensive study on the internet of underwater things: applications, challenges, and channel models. Sensors 17(7):1477CrossRefGoogle Scholar
  4. 4.
    Abdillah AF, Berlian MH, Panduman YYF, Akbar MAW, Afifah MA, Tjahjono A, Sukaridhoto S, Sasaki S (2017) Design and development of low cost coral monitoring system for shallow water based on internet of underwater things. J Telecommun Electron Comput Eng 9(2–5):97–101Google Scholar
  5. 5.
    Zhou Z, Yao B, Xing R, Shu L, Shengrong B (2015) E-carp: an energy efficient routing protocol for uwsns in the internet of underwater things. IEEE Sens J 16(11):4072–4082CrossRefGoogle Scholar
  6. 6.
    Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164CrossRefGoogle Scholar
  7. 7.
    Kao C-C, Lin Y-S, Wu G-D, Huang C-J (2017) A study of applications, challenges, and channel models on the internet of underwater things. In: 2017 international conference on applied system innovation (ICASI). IEEE, pp 1375–1378Google Scholar
  8. 8.
    Urunov K, Namgung J-I, Park S-H (2015) Security challenges of DTN mechanism for IoUT. Int J Inf Electron Eng 5(5):330Google Scholar
  9. 9.
    Younis YA, Kifayat K, Merabti M (2014) An access control model for cloud computing. J Inf Secur Appl 19(1):45–60Google Scholar
  10. 10.
    Cheng Y, Park J, Sandhu R (2016) An access control model for online social networks using user-to-user relationships. IEEE Trans Dependable Secure Comput 13(4):424–436CrossRefGoogle Scholar
  11. 11.
    Dittrich KR, Härtig M, Pfefferle H (1988) Discretionary access control in structurally object-oriented database systems. In: DBSec, pp 105–121Google Scholar
  12. 12.
    Ahn G-J (2009) Discretionary access control. In: Liu L, Özsu MT (eds) Encyclopedia of database systems. Springer, New York, pp 864–866Google Scholar
  13. 13.
    Ninghui Li (2011) Discretionary access control. In: Van Tilborg HC, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, New York, pp 353–356Google Scholar
  14. 14.
    Downs DD, Rub JR, Kung KC, Jordan CS (1985) Issues in discretionary access control. In: IEEE symposium on security and privacy, 1985. IEEE, pp 208–208Google Scholar
  15. 15.
    Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE Commun Mag 32(9):40–48CrossRefGoogle Scholar
  16. 16.
    Lindqvist H (2006) Mandatory access control. Master’s thesis in computing science, Umea University, Department of Computing Science, SE-901, p 87Google Scholar
  17. 17.
    La Padula LJ (1990) Formal modeling in a generalized framework for access control. In: Computer security foundations workshop III, 1990. Proceedings. IEEE, pp 100–109Google Scholar
  18. 18.
    Upadhyaya S (2011) Mandatory access control. In: Encyclopedia of cryptography and security. Springer, Boston, pp 756–758Google Scholar
  19. 19.
    Thuraisingham B (2009) Mandatory access control. In: Liu L, Özsu MT (eds) Encyclopedia of database systems. Springer, New York, pp 1684–1685Google Scholar
  20. 20.
    Thompson TJ, James HH II, Durant WR (2013) Hierarchy-aware role-based access control, March 19. US Patent 8,402,514Google Scholar
  21. 21.
    Zhou L, Varadharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans Inf Forensics Secur 8(12):1947–1960CrossRefGoogle Scholar
  22. 22.
    Uzun E, Atluri V, Vaidya J, Sural S, Ferrara AL, Parlato G, Madhusudan P (2014) Security analysis for temporal role based access control. J Comput Secur 22(6):961–996CrossRefGoogle Scholar
  23. 23.
    Ranise S, Truong A, Armando A (2014) Scalable and precise automated analysis of administrative temporal role-based access control. In: Proceedings of the 19th ACM symposium on access control models and technologies. ACM, pp 103–114Google Scholar
  24. 24.
    Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89–98Google Scholar
  25. 25.
    Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 195–203Google Scholar
  26. 26.
    Melissa C (2007) Multi-authority attribute based encryption. In: Theory of cryptography conference. Springer, pp 515–534Google Scholar
  27. 27.
    Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743–754CrossRefGoogle Scholar
  28. 28.
    Guojun W, Qin L, Jie W, Minyi G (2011) Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput Secur 30(5):320–331CrossRefGoogle Scholar
  29. 29.
    Chase M, Chow SSM (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM conference on Computer and communications security. ACM, pp 21–130Google Scholar
  30. 30.
    Ahmed E, Yaqoob I, Hashem IAT, Khan I, Ahmed AIA, Imran M, Vasilakos AV (2017) The role of big data analytics in internet of things. Comput Netw 129:459–471CrossRefGoogle Scholar
  31. 31.
    Lin H, Cao Z, Liang X, Shao J (2010) Secure threshold multi authority attribute based encryption without a central authority. Inf Sci 180(13):2618–2632MathSciNetCrossRefzbMATHGoogle Scholar
  32. 32.
    Li J, Huang Q, Chen X, Chow SSM, Wong DS, Xie D (2011) Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM symposium on information, computer and communications security. ACM, pp 386–390Google Scholar
  33. 33.
    Li M, Shucheng Y, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143CrossRefGoogle Scholar
  34. 34.
    Rouselakis Y, Waters B (2015) Efficient statically-secure large-universe multi-authority attribute-based encryption. In: International conference on financial cryptography and data security. Springer, pp 315–332Google Scholar
  35. 35.
    Yang K, Jia X (2014) DAC-MACS: effective data access control for multi-authority cloud storage systems. In: Yang K, Jia X (eds) Security for cloud storage systems. Springer, Berlin, pp 59–83CrossRefGoogle Scholar
  36. 36.
    Wang C, Luo J (2013) An efficient key-policy attribute-based encryption scheme with constant ciphertext length. Math Probl Eng 2013.
  37. 37.
    Attrapadung N, Libert B, De Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: International workshop on public key cryptography. Springer, Berlin, Heidelberg, pp 90–108Google Scholar
  38. 38.
    Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, 2007. SP’07. IEEE, pp 321–334Google Scholar
  39. 39.
    Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International workshop on public key cryptography. Springer, pp 53–70Google Scholar
  40. 40.
    Liang KFL, Susilo W, Wong DS (2013) A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. In: 5th international conference on intelligent networking and collaborative systems (INCoS), 2013. IEEE, pp 552–559Google Scholar
  41. 41.
    Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput 64(1):126–138MathSciNetCrossRefzbMATHGoogle Scholar
  42. 42.
    Liu L, Lai J, Deng RH, Li Y (2016) Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Secur Commun Netw 9:4897–4913CrossRefGoogle Scholar
  43. 43.
    Jiang Y, Susilo W, Mu Y, Guo F (2017) Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener Comput Syst 78:720–729CrossRefGoogle Scholar
  44. 44.
    Li L, Tianlong G, Chang L, Zhoubo X, Liu Y, Qian J (2017) A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram. IEEE Access 5:1137–1145CrossRefGoogle Scholar
  45. 45.
    Roy S, Chuah M (2009) Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical report, CiteseerGoogle Scholar
  46. 46.
    Xu J, Wen Q, Li W, Shen J, He D (2017) Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. Soft Comput 21(18):5265–5279CrossRefzbMATHGoogle Scholar
  47. 47.
    Chow SSM (2016) A framework of multi-authority attribute-based encryption with outsourcing and revocation. In: Proceedings of the 21st ACM on symposium on access control models and technologies. ACM, pp 215–226Google Scholar
  48. 48.
    Zhong H, Zhu W, Xu Y, Cui J (2018) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22(1):243–251CrossRefzbMATHGoogle Scholar
  49. 49.
    Yan H, Li J, Li X, Zhao G, Lee S-Y, Shen J (2016) Secure access control of e-health system with attribute-based encryption. Intell Autom Soft Comput 22(3):345–352CrossRefGoogle Scholar
  50. 50.
    Liu Y, Zhang Y, Ling J, Liu Z (2017) Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Future Gener Comput Syst 78:1020–1026CrossRefGoogle Scholar
  51. 51.
    Prathyusha D, Murty MS (2016) Access control mechanism on e-health care cloud data storage. Int J Res 3(4):83–89Google Scholar
  52. 52.
    Pescosolido L, Berta R, Scalise L, Revel GM, De Gloria A, Orlandi G (2016) An IOT-inspired cloud-based web service architecture for e-health applications. In: 2016 IEEE international smart cities conference (ISC2). IEEE, pp 1–4Google Scholar
  53. 53.
    Liou E-C, Kao C-C, Chang C-H, Lin Y-S, Huang C-J (2018) Internet of underwater things: challenges and routing protocols. In: 2018 IEEE international conference on applied system invention (ICASI). IEEE, pp 1171–1174Google Scholar

Copyright information

© The Natural Computing Applications Forum 2018

Authors and Affiliations

  • M. P. Gopinath
    • 1
    Email author
  • G. S. Tamizharasi
    • 1
  • L. Kavisankar
    • 2
  • R. Sathyaraj
    • 1
  • S. Karthi
    • 1
  • S. L. Aarthy
    • 3
  • B. Balamurugan
    • 4
  1. 1.School of Computer Science and EngineeringVITVelloreIndia
  2. 2.Department of Computer Science and EngineeringHindustan Institute of Technology and ScienceChennaiIndia
  3. 3.School of Information Technology and EngineeringVITVelloreIndia
  4. 4.School of Computer Science and EngineeringGalgotias UniversityGreater NoidaIndia

Personalised recommendations