Data storage security for the Internet of Things

  • 27 Accesses


In the present era, secure data storage for any Internet of Things (IoT) platform is plagued by poor performance of secure read and write operations, which limits the use of data storage security on any IoT platform. Therefore, in this paper, a data storage security method based on double secret key encryption and Hadoop suitable for any IoT platform is proposed. First, the Hadoop deep learning architecture and implementation process are analyzed, and the process of client Kerberos identity authentication in the Hadoop framework is discussed. From this, the current shortcomings of data storage security based on the Hadoop framework are analyzed. The elements of data storage security are also determined. Furthermore, a novel double secret key encryption method for data storage security and to improve the security of stored data itself is introduced. Simultaneously, hash computing is used to improve the read and write performance of data after secure storage. Experimental results clearly show that our proposed method can effectively improve read and write performance of data, and that the performance of data security operations is improved from current standard implementations.

This is a preview of subscription content, log in to check access.

Access options

Buy single article

Instant unlimited access to the full article PDF.

US$ 39.95

Price includes VAT for USA

Subscribe to journal

Immediate online access to all issues from 2019. Subscription will auto renew annually.

US$ 199

This is the net price. Taxes to be calculated in checkout.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9


  1. 1.

    Liu S, Liu G, Zhou H (2019) A robust parallel object tracking method for illumination variations. Mob Netw Appl 24(1):5–17

  2. 2.

    Liu JK, Liang K, Susilo W, Liu J, Xiang Y (2015) Two-factor data security protection mechanism for cloud storage system. IEEE Trans Comput 65(6):1992–2004

  3. 3.

    Suthar K, Patel J (2017) Encryscation: an secure approach for data security using encryption and obfuscation techniques for iaas and daas services in cloud environment. Astrophys J 663(2):799–807

  4. 4.

    Shin Y, Koo D, Hur J (2017) A survey of secure data deduplication schemes for cloud storage systems. ACM Comput Surv 49(4):74.

  5. 5.

    Liu C, Ranjan R, Yang C, Zhang X, Wang L, Chen J (2014) MuR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans Comput 64(9):2609–2622

  6. 6.

    Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115

  7. 7.

    Cui B, Liu Z, Wang L (2016) Key-aggregate searchable encryption (kase) for group data sharing via cloud storage. IEEE Trans Comput 65(8):2374–2385.

  8. 8.

    Zhang L, Fong X, Chang CH, Kong ZH, Roy K (2015) Optimizating emerging nonvolatile memories for dual-mode applications: data storage and key generator. IEEE Trans Comput Aided Design Integr Circuits Syst 34(7):1176–1187

  9. 9.

    Huang X, Liu JK, Tang S, Xiang Y, Liang K, Xu L, Zhou J (2014) Cost-effective authentic and anonymous data sharing with forward security. IEEE Trans Comput 64(4):971–983

  10. 10.

    Pan Z, Liu S, Sangaiah AK, Muhammad K (2018) Visual attention feature (VAF): a novel strategy for visual tracking based on cloud platform in intelligent surveillance systems. J Parallel Distrib Comput 120:182–194

  11. 11.

    Zhang LM (2015) Low cost safety data storage and processing framework under cloud environment. Telecommun Sci 31(2):46–51.

  12. 12.

    Lu X, Liu Y (2016) Cloud storage backup and recovery strategy based on erasure codes. Comput Eng Appl 52(4):56–60.

  13. 13.

    Guo C, Shen QN, Wu ZH (2016) Cloud storage data distribution optimization model preventing data leakage. J Univ Electr Sci Technol China 45(1):118–122.

  14. 14.

    Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the Internet of Things. Future Gener Comput Syst 1(49):104–12

  15. 15.

    Qiao R, Zhu S, Wang Q, Qin J (2018) Optimization of dynamic data traceability mechanism in Internet of Things based on consortium blockchain. Int J Distrib Sensor Netw 14(12):1550147718819072

  16. 16.

    Bhatia T, Verma AK (2017) Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues. J Supercomput 73(6):1–74.

  17. 17.

    Gopikrishnan S, Priakanth P (2015) Hsda: hybrid communication for secure data aggregation in wireless sensor network. Wirel Netw 22(3):1–18.

  18. 18.

    Zhang A, Chen J, Hu RQ, Qian Y (2015) SeDS: Secure data sharing strategy for D2D communication in LTE-advanced networks. IEEE Trans Veh Technol 65(4):2659–2672

  19. 19.

    Dwivedi AD, Srivastava G, Dhar S, Singh R (2019) A decentralized privacy-preserving healthcare blockchain for iot. Sensors 19(2):326

  20. 20.

    Dwivedi AD, Morawiecki P, Srivastava G (2019) Differential cryptanalysis of round-reduced speck suitable for internet of things devices. IEEE Access 7:16476–16486

  21. 21.

    Dwivedi AD, Malina L, Dzurenda P, & Srivastava G (2019) Optimized blockchain model for internet of things based healthcare applications. arXiv preprint arXiv:1906.06517

  22. 22.

    Lukas M, Gautam S, Petr D, Jan H, Radek F (2019) A secure publish/subscribe protocol for Internet of Things, Cryptology ePrint Archive, Report 2019/740

  23. 23.

    Ryan PY (2008) Prâtà voter with Paillier encryption. Math Comput Modell 48(9–10):1646–1662

  24. 24.

    Srivastava G, Fisher A, Bryce R, Crichigno J (2019) Green Communication Protocol with Geolocation. In: IEEE 89th Vehicular Technology Conference (VTC2019-Spring). Kuala Lumpur, Malaysia, 2019, pp 1–6.

Download references


The authors would like to thank Logan Praznik for his efforts proofreading and editing this manuscript.


The APC was funded by Yuntao Duan.

Author information

Gautam Srivastava and Jyh-Haw Yeh contributed to conceptualization; Gautam Srivastava and Jyh-Haw Yeh contributed to methodology; Jiangdai Li contributed to software; Yuntao Duan and Jiangdai Li contributed to validation; Yuntao Duan and Jiangdai Li contributed to writing—original draft preparation; Gautam Srivastava and Jyh-Haw YehJerry Chun-Wei Lin contributed to writing—review and editing.

Correspondence to Gautam Srivastava.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Duan, Y., Li, J., Srivastava, G. et al. Data storage security for the Internet of Things. J Supercomput (2020).

Download citation


  • Big data
  • Database design
  • Double secret key
  • Hadoop
  • Deep learning
  • Internet of Things
  • Encryption
  • Data storage security