Abstract
The proliferation of IoT devices has influenced end users in several aspects. Yottabytes (YB) of information are being produced in the IoT environs because of the ever-increasing utilization capacity of the Internet. Since sensitive information, as well as privacy problems, always seem to be an unsolved problem, even with best-in-class in-formation governance standards, it is difficult to bolster defensive security capabilities. Secure data sharing across disparate systems is made possible by blockchain technology, which operates on a decentralized computing paradigm. In the ever-changing IoT environments, blockchain technology provides irreversibility (immutability) usage across a wide range of services and use cases. Therefore, blockchain technology can be leveraged to securely hold private information, even in the dynamicity context of the IoT. However, as the rate of change in IoT networks accelerates, every potential weak point in the system is exposed, making it more challenging to keep sensitive data se-cure. In this study, we adopted a Multi-level Blockchain-based Secured Framework (M-BSF) to provide multi-level protection for sensitive data in the face of threats to IoT-based networking systems. The envisioned M-BSF framework incorporates edge-level, fog-level, and cloud-level security. At edge- and fog-level security, baby kyber and scaling kyber cryptosystems are applied to ensure data preservation. Kyber is a cryptosystem scheme that adopts public-key encryption and private-key decryption processes. Each block of the blockchain uses the cloud-based Argon-2di hashing method for cloud-level data storage, providing the highest level of confidentiality. Argon-2di is a stable hashing algorithm that uses a hybrid approach to access the memory that relied on dependent and independent memory features. Based on the attack-resistant rate (> 96%), computational cost (in time), and other main metrics, the proposed M-BSF security architecture appears to be an acceptable alternative to the current methodologies.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
Data Availability
Data is available upon request.
Abbreviations
- ARR:
-
Attack Resistant Rate
- CPU:
-
Central Processing Unit
- DBT:
-
Data Breaches and Theft
- DDoS:
-
Distributed Denial of Service
- DNS:
-
Domain Name System
- DNS:
-
Domain Name System
- DoS:
-
Denial-of-Service
- DPI:
-
Data Preservation Index
- GHz:
-
Gigahertz
- ID:
-
Identification
- IIoT:
-
Industrial Internet of Things
- IoT:
-
Internet of Things
- KB :
-
Kilobytes
- KDF:
-
Key Derivation Function
- LAN:
-
Local Area Network
- LWE:
-
Learning With Errors
- MB:
-
Megabytes
- M-BSF:
-
Multi-level Blockchain-based Secured Framework
- MM:
-
Man-in-the-Middle
- NAB:
-
Numenta Anomaly Benchmark
- ODN:
-
OriginTrail Decentralized Network
- PII:
-
Personal Identifiable Information
- RFID:
-
Radio Frequency Identification
- SHA:
-
Secure Hash Algorithm
- SQL:
-
Structured Query Language
- UTC:
-
Universal Time Coordinated
- VM:
-
Virtual Machine
- VMH:
-
Virtual Machine Hopping
- YAML:
-
Yet Another Markup Language
- YB:
-
Yottabytes
References
Kaushal, R. K., Bhardwaj, R., Kumar, N., Aljohani, A. A., Gupta, S. K., Singh, P., Purohit, N.: Using mobile computing to provide a smart and secure internet of things (IoT) framework for medical applications. Wirel. Commun. Mob. Comput. 1–13 (2022). https://doi.org/10.1155/2022/8741357
Cheng, B., Zhu, D., Zhao, S., Chen, J.: Situation-aware IoT service coordination using the event-driven SOA paradigm. IEEE Trans. Netw. Serv. Manage. 13(2), 349–361 (2016). https://doi.org/10.1109/TNSM.2016.2541171
Shetty, P., Kumar, M. R., Vyas, T., M, A., Gehlot, A., Pant, K.: Application of cryptographic methods to blockchain technology to increase data reliability. 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART) (2022). https://doi.org/10.1109/smart55829.2022.10047207
Lian, Z., Zeng, Q., Wang, W., Gadekallu, T. R., Su, C.: Blockchain-Based Two-Stage Federated Learning With Non-IID Data in IoMT System. IEEE Transactions on Computational Social Systems (2022). https://doi.org/10.1109/TCSS.2022.3216802
Alam, T., Gupta, R.: Federated learning and its role in the privacy preservation of IoT devices. Future Internet 14(9), 246 (2022). https://doi.org/10.3390/fi14090246
BigQuery public datasets. (n.d.). Google Cloud. https://cloud.google.com/bigquery/public-data
Saab, S., Jr., Phoha, S., Zhu, M., Ray, A.: An adaptive polyak heavy-ball method. Mach. Learn. 111(9), 3245–3277 (2022)
Saab, S., Jr., Fu, Y., Ray, A., Hauser, M.: A dynamically stabilized recurrent neural network. Neural Process. Lett. 54(2), 1195–1209 (2022)
Kumar, L. R., Babu, A. S.: Genuine and forged offline signature verification using back propagation neural networks. Int. J. Comput. Sci. Inf. Technol. 2(4). https://www.academia.edu/77622578/Genuine_and_Forged_Offline_Signature_Verification_Using_Back_Propagation_Neural_Networks
Kumar, P. M., Rawal, B., Gao, J.: Blockchain-enabled Privacy Preserving of IoT Data for Sustainable Smart Cities using Machine Learning. 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS). https://doi.org/10.1109/comsnets53615.2022.9668530
Rakic, B., Levak, T., Drev, Z., Savic, S., Veljkovic, A.: First purpose built protocol for supply chains based on blockchain (2017). https://origintrail.io/storage/documents/OriginTrail-White-Paper.pdf
Karthick Raghunath, K. M., Koti, M. S., Sivakami, R., Vinoth Kumar, V., NagaJyothi, G., Muthukumaran, V.: Utilization of IoT-assisted computational strategies in wireless sensor networks for smart infrastructure management. Int. J. Syst. Assur. Eng. Manag. (2022) https://doi.org/10.1007/s13198-021-01585-y
Pustišek, M., Kos, A.: Approaches to Front-End IoT Application Development for the Ethereum Blockchain. Procedia Comput Sci 129, 410–419 (2018). https://doi.org/10.1016/j.procs.2018.03.017
Rani, S., Babbar, H., Srivastava, G., Gadekallu, T. R., Dhiman, G.: Security Framework for Internet of Things based Software Defined Networks using Blockchain. IEEE Internet Things J. (2022)
Hong, W., Cai, Y., Yu, Z., & Yu, X.: An Agri-product traceability system based on IoT and blockchain technology. 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN) (2018). https://doi.org/10.1109/hoticn.2018.8605963
Lv, Z., Qiao, L., Hossain, M.S., Choi, B.J.: Analysis of using blockchain to protect the privacy of drone big data. IEEE Network 35(1), 44–49 (2021). https://doi.org/10.1109/MNET.011.2000154
Shetty, P., Kumar, M. R., Vyas, T., M, A., Gehlot, A., Pant, K.: Application of cryptographic methods to blockchain technology to increase data reliability. 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART) (2022). https://doi.org/10.1109/smart55829.2022.10047207
Chen, P., Liu, H., Xin, R., Carval, T., Zhao, J., Xia, Y., ... Zhao, Z.: Effectively detecting operational anomalies in large-scale IoT data infrastructures by using a GAN-based predictive model. Comput. J. 65(11), 2909-2925 (2022). https://doi.org/10.1093/comjnl/bxac085
Digital twin asset management with IoT, AI, Blockchain for Automation: Digital Twin Asset Management with IoT, AI, Blockchain for Automation (n.d.). https://www.netobjex.com/
Durga Indira N, Venu Gopala Rao M.: Red deer optimization for automatic modulation classification using hybrid extreme learning machine with bagging classifier. Int. J. Model Simul Sci Comput. 13(06) (2022a). https://doi.org/10.1142/s1793962322500635
Lee, S., Bae, M., Kim, H.: Future of IoT networks: a survey. Applied Sciences 7(10), 1072 (2017). https://doi.org/10.3390/app7101072
Rajasekaran, A.S., Azees, M., Al-Turjman, F.: A comprehensive survey on blockchain technology. Sustain Energy Technol Assess 52, 102039 (2022). https://doi.org/10.1016/j.seta.2022.102039
Ozyilmaz, K.R., Yurdakul, A.: Designing a Blockchain-Based IoT with Ethereum, Swarm, and LoRa: The Software Solution to Create High Availability With Minimal Security Risks. IEEE Consum Electron Mag 8(2), 28–34 (2019). https://doi.org/10.1109/mce.2018.2880806
Numenta Anomaly Benchmark (NAB). (n.d.). http://www.kaggle.com. Retrieved March 14, 2023, from https://www.kaggle.com/datasets/boltzmannbrain/nab
Qu, Z., Zhang, Z., Liu, B., Tiwari, P., Ning, X., ... Muhammad, K.: Quantum detectable Byzantine agreement for distributed data trust management in blockchain. Inf. Sci. 637, 118909 (2023). https://doi.org/10.1016/j.ins.2023.03.134
Cebe M, Kaplan B, Akkaya K (2018) A Network Coding Based Information Spreading Approach for Permissioned Blockchain in IoT Settings. Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. https://doi.org/10.1145/3286978.3286984
Durga Indira, N., VenuGopalaRao, M.: Deep learning CNN-based hybrid extreme learning machine with bagging classifier for automatic modulation classification. Int. J. Intell. Syst. Appl. Eng. 10(2s), 134–141 (2022). (ISSN: 2147-6799)
Moeco documentation | Moeco Documentation. (n.d.). Docs.moeco.io. Retrieved March 24, 2023, from https://docs.moeco.io/
Cao, B., Wang, X., Zhang, W., Song, H., Lv, Z.: A many-objective optimization model of industrial internet of things based on private blockchain. IEEE Network 34(5), 78–83 (2020). https://doi.org/10.1109/MNET.011.1900536
Judith, A. M., Priya, S. B., Mahendran, R. K., Gadekallu, T. R., Ambati, L. S. Two-phase classification: ANN and A-SVM classifiers on motor imagery BCI. Asian J. Control. (2022). https://www.researchgate.net/publication/366400731_Two-phase_classification_ANN_and_A-SVM_classifiers_on_motor_imagery_BCI
Waltonchain, EN.: Waltonchain Whitepaper 2.0 Official Release Announcement. Medium (2018). https://waltonchain-en.medium.com/waltonchain-whitepaper-2-0-official-release-announcement-1c819aeb0314
Wang, S., Sheng, H., Zhang, Y., Yang, D., Shen, J., ... Chen, R. Blockchain-empowered distributed multi-camera multi-target tracking in edge computing. IEEE Trans. Industr. Inf. (2023). https://doi.org/10.1109/TII.2023.3261890
Yaïci, W., Krishnamurthy, K., Entchev, E., Longo, M.: Recent advances in Internet of Things (IoT) infrastructures for building energy systems: a review. Sensors 21(6), 2152 (2021). https://doi.org/10.3390/s21062152
Yohan, A., Lo, N.-W. An over-the-blockchain firmware update framework for IoT devices. 2018 IEEE Conference on Dependable and Secure Computing (DSC) (2018). https://doi.org/10.1109/desec.2018.8625164.
Acknowledgements
This research is supported by Princess Nourah bint Abdulrahman University, Researchers Supporting Project Number (PNURSP2023R151), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Author information
Authors and Affiliations
Contributions
All the authors contributed equally in the paper.
Corresponding author
Ethics declarations
This work is original and not have been published elsewhere in any form.
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Awasthi, C., Mishra, P.K., Pal, P.K. et al. Preservation of Sensitive Data Using Multi-Level Blockchain-based Secured Framework for Edge Network Devices. J Grid Computing 21, 69 (2023). https://doi.org/10.1007/s10723-023-09699-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10723-023-09699-2