Abstract
Data privacy is becoming more important as the internet of things (IoT) rapidly expands. There are significant consequences for the broad adoption of the internet of things. Homomorphic encryption is one possible solution for protecting sensitive data in the IoT. However, there is a great deal of potential for efficiency gains. In order to get enough privacy and security, it is also crucial. Our homomorphic encryption technique for secure and private optical fibre communication is detailed in this publication. The data owner, fog server, and data consumers’ privacy is the primary focus of the proposed architectural design. The performance of this research shows that our FCHE solution improves data security throughout the data storage operation and reduces encryption length. This research also aims to analyse the factors of optical fiber communication cost, storage cost, and computing cost in the context of FCHE.
Similar content being viewed by others
Data availability
Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
References
Alam, T.: A reliable communication framework and its use in internet of things (IoT). CSEIT1835111| Received. 10: 450–456 (2018)
Alqahtani, A.S., et al.: Investigation of hybrid spectrum slicing-wavelength division multiplexing (SS-WDM) in transparent medium for mode division multiplexing applications. Opt. Quantum. Electron. 55(3), 243 (2023)
Ashik, M.H., Maswood, M.M., Alharbi, A.G.: Designing a fog-cloud architecture using blockchain and analyzing security improvements. In: 2020 International Conference on Electrical, Communication and Computer Engineering (ICECCE). IEEE, (2020)
Brakerski, Z., Gentry, C., Halevi, S.: Packed ciphertexts in LWE-based homomorphic encryption. Public-Key Cryptography–PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings 16. Springer, Berlin (2013)
DaXu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE. Trans. Ind. Inform. 10(4), 2233–2243 (2014)
Gao, Weichao, et al.: Privacy-preserving auction for big data trading using homomorphic encryption. IEEE Trans. Netw. Sci. 7(2), 776–791 (2018)
Guha Roy, D.: Blockedge: a privacy-aware secured edge computing framework using blockchain for industry 4.0. Sensors. 23(5), 2502 (2023)
Han, J.L., et al.: The implemention and application of fully homomorphic encryption scheme. In: 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control. IEEE (2012)
Jiang, H.: Secure storage of computer network data based on cloud computing. Scalable. Comput. Pract. Exp. 24(4), 663–672 (2023)
Kamruzzaman, M.M., et al.: Design of circular photonic crystal fiber for OAM extraction SDM applications. Opt. Quant. Electron. 54(12), 864 (2022)
Kumar, S., Tiwari, P., Zymbler, M.: Internet of things is a revolutionary approach for future technology enhancement: a review. J. Big. Data. 6(1), 1–21 (2019)
Liu, X., Yang, Y., Choo, K.K., Wang, H.: Security and privacy challenges for internet-of-things and fog computing. Wirel. Commun. Mobile. Comput. 2018, 9373961 (2018)
Ma, Y., Wu, Y., Li, J., Ge, J.: “APCN: a scalable architecture for balancing accountability and privacy in large-scale content-based networks. Inf. Sci. 527, 511–532 (2020)
Mahato, G.K., Chakraborty, S.K.: A comparative review on homomorphic encryption for cloud security. IETE J. Res. 69(8), 5124–5133 (2023)
Mohan Das, R., et al.: A novel deep learning-based approach for detecting attacks in social IoT. Soft. Comput. 1–11 (2023)
Nagajayanthi, B.: Decades of internet of things towards twenty-first century: a research-based introspective. Wirel. Pers. Commun. 123(4), 3661–3697 (2022)
Pătraşcu, A., Maimuţ, D., Simion, E.: New directions in cloud computing. A security perspective. In: 2012 9th International Conference on Communications (COMM). IEEE (2012)
Ramesh Kumar, M., Sudhakaran, P.: Comprehensive survey on detecting security attacks of IoT intrusion detection systems. Adv. Sci. Techno. 124, 738–747 (2023)
Ray, P.P.: A survey on internet of things architectures. J. King Saud. Univ. Comput. Inf. Sci. 30(3), 291–319 (2018)
Silva, L.V., et al.: Security and privacy preserving data aggregation in cloud computing. Proceedings of the Symposium on Applied Computing. (2017)
Singh, D., et al.: Security issues in IoT and their countermeasures in smart city applications. Advanced computing and intelligent engineering: Proceedings of ICACIE 2018. Vol 2, pp. 301–313. Springer, Singapore (2020)
Tao, H., Bhuiyan, M.Z., Abdalla, A.N., Hassan, M.M., Zain, J.M., Hayajneh, T.: Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J. 6(1), 410–420 (2018)
Vikas, B.O.: Internet of things (iot): a survey on privacy issues and security. Int. J. Sci. Res. Sci. Eng. Technol. 1(3), 168–173 (2015)
Wang, H., Wang, Z., Domingo-Ferrer, J.: Anonymous and secure aggregation scheme in fog-based public cloud computing. Futur. Gener. Comput. Syst.. Gener. Comput. Syst. 78, 712–719 (2018)
Wang, J., et al.: Flow tracer: An effective flow trajectory detection solution based on probabilistic packet tagging in SDN-enabled networks. IEEE Trans. Netw. Serv. Manag.netw. Serv. Manag. 16(4), 1884–1898 (2019)
Yang, Y., Chen, X., Tan, R., Xiao, Y.: Intelligent IoT for the Digital World: Incorporating 5G Communications and Fog/Edge Computing Technologies. John Wiley & Sons, Hoboken (2021)
Yao, Z., Ge, J., Wu, Y., Jian, L.: A privacy preserved and credible network protocol. J. Parallel. Distrib. Comput. 132, 150–159 (2019)
Acknowledgements
The authors are thankful to the Deanship of Scientific Research-Research Center at King Khalid University in Saudi Arabia for Funding this research (Code Number: RGP 2/15/44).
Funding
Funding were provided by Deanship of Scientific Research, King Khalid University, Grant number: RGP 2/15/44.
Author information
Authors and Affiliations
Contributions
ASA, YT and PE: Conceptualization, methodology, visualization, investigation, data validation and writing—original draft preparation; RK, SL and SS: Data curation, reviewing and editing.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they do not have any competing interest. The authors of this research acknowledge that they are not involved in any financial interest.
Ethics approval and consent to participate
Not applicable.
Informed consent
Not applicable.
Consent for publication
Not applicable. The authors certify that this material or similar material has not been and will not be submitted to or published in any other publication before. Furthermore, the authors certify that they have participated sufficiently in the work to take public responsibility for the content, including participation in the concept, design, analysis, writing, or revision of the manuscript.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Alqahtani, A.S., Trabelsi, Y., Ezhilarasi, P. et al. Homomorphic encryption algorithm providing security and privacy for IoT with optical fiber communication. Opt Quant Electron 56, 487 (2024). https://doi.org/10.1007/s11082-023-06098-5
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11082-023-06098-5