Advertisement

Accessing Sensor Data via Hybrid Virtual Private Network Using Multiple Layer Encryption Method in Big Data

  • Harleen KaurEmail author
  • Ritu Chauhan
  • M. Afshar Alam
  • Naweed Ahmad Razaqi
  • Victor Chang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1040)

Abstract

Enormous data generation takes place with the increase in the number of systems and enhanced technology. This data generation occurs exponentially with time. Sensor networks are one of the main generators of big data. The data/information received from the sensor network is transferred to the other end user/s via hybrid virtual private network (HVPN) using multiple layer encryption through Internet of things (IoT). The communication between sensors and end user/s takes place through the server with the help of inter-networking procedure called Internet of things (IoT). With the help of IoT, the objects can be traced and controlled from large distances over the network for a nonstop assimilation of the world into computer-based systems resulting in superior efficiency, accuracy, and reduced human intervention. The HVPN using multiple layer encryption strategy will permit the association between the initiator and responder to remain unidentifiable. We have used multiple layer encryption technique to scramble the information to secure IoT. Furthermore, we experimented the contrast of the speed for information transmission and multiple layer encryption and without multiple layer encryption with IoT.

Keywords

Hybrid virtual private network (HVPN) Internet of things (IoT) Virtual private network (VPN) Multilayer encryption 

References

  1. 1.
    Sherwood, R., Bhatacharjee, B., Srinivasan, A.: P5: a protocol for scalable anonymous communication. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 58–70. 12–15 May 2002Google Scholar
  2. 2.
    Chauhan, R., Kaur, H., Lechman, E., Marszk, A.: Big data analytics for ICT monitoring and development. In: Kaur, H., et al. (eds.) Catalyzing Development Through ICT Adoption: The Developing World Experience, pp. 25–36. Springer, New York (2017)CrossRefGoogle Scholar
  3. 3.
    Kaur, H., Tao, X.: ICT and Millennium Development Goals: A United Nations Perspective, p. 271. Springer, New York (2014)CrossRefGoogle Scholar
  4. 4.
    Diffie, W., Oorschot, P.C.V., Wiener, M.J.: Authentication and authenticated key exchanges. Des. Codes Cryptogr. 2, 107–125 (1992)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Goldschlag, D., Reed, M., Syverson, P.: Hiding routing information. In: Proceedings of the 1st International Workshop on Information Hiding, 30 May–01 June, pp. 137–150. Springer (1996)Google Scholar
  6. 6.
    Gandomi, A., Haider, M.: Beyond the hype: big data concepts, methods, and analytics. Int. J. Inf. Manag. 35(2), 137–144 (2015)CrossRefGoogle Scholar
  7. 7.
    Claessens, J., Diaz, C., Goemans, C., Preneel, B., Vandewalle, J.: Revocable anonymous access to the internet? Internet Res. 13, 242–258 (2003)CrossRefGoogle Scholar
  8. 8.
    Fielding, R.T., Taylor, R.N.: Principled design of the modern web architecture. ACM Trans. Internet Technol. (TOIT) 2(2), 115–150 (2002)CrossRefGoogle Scholar
  9. 9.
    Hoang, N.P.: Anonymous communication and its importance in social networking. In: Proceedings of the 16th International Conference on Advanced Communication Technology, 16–19 Feb, pp. 34–39. IEEE Xplore Press (2014)Google Scholar
  10. 10.
    Kristol, D.M.: HTTP cookies: Standards, privacy and politics. ACM Trans. Internet Technol. 1, 151–198 (2001)CrossRefGoogle Scholar
  11. 11.
    Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Proxies for anonymous routing. In: Proceedings of the 12th Annual Computer Security Applications Conference, 9–13 Dec, pp. 95–104. IEEE Xplore Press (1996)Google Scholar
  12. 12.
    Rubin, M.K., Reiter, A.D.: Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1, 66–92 (1998)CrossRefGoogle Scholar
  13. 13.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edn. Wiley, New York (1996)zbMATHGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Harleen Kaur
    • 1
    Email author
  • Ritu Chauhan
    • 2
  • M. Afshar Alam
    • 1
  • Naweed Ahmad Razaqi
    • 1
  • Victor Chang
    • 3
  1. 1.School of Engineering Sciences and TechnologyJamia HamdardNew DelhiIndia
  2. 2.Centre for Computational Biology and BioinformaticsAmity UniversityNoidaIndia
  3. 3.School of Computing, Engineering and Digital TechnologiesTeesside UniversityMiddlesbroughUK

Personalised recommendations