Abstract
Cloud integrated Internet of Things (Cloud-IoT) has gained huge attention over this decade. As millions of devices are connected over the internet, security becomes a more challenging issue in the Cloud-IoT environment. Many research works have contributed to ensuring security in Cloud-IoT. But none of the works has proven its security strength and efficiency. In particular, centralized authentication and complex encryption schemes increase the overhead even for low-level security. This paper proposes a novel Decentralized Blockchain-based Security (DeBlock-Sec) scheme, which is most suitable for resource-constrained IoT environment to abridge the security issue. The overall system works upon three significant phases, (1) authentication phase, (2) data encryption phase, and (3) data retrieval phase. For authentication, we propose a novel Decentralized Blockchain-based Authentication (DBA) protocol. The DBA protocol uses multiple factors to authenticate users and devices. In the next phase, data encryption is carried on the IoT devices. As the amount of data to be encrypted is large in size, the encryption is performed in the spark environment since the confidentiality of data is vital. The data retrieval phase allows users to access the data stored in the Cloud. Dendrimer Fractal Tree Indexing is followed to minimize the searching time and the Revised Diffie-Hellman algorithm is presented for key exchange. The extensive experiments performed in Spark environment show that the proposed work achieves better performance in terms of time consumption (encryption, decryption and search), storage space, and throughput. Our proposed technique is a promising research direction for real IIoT security.
Similar content being viewed by others
References
Al-Ghamdi M, Al-Ghamdi M, Gutub A (2019) Security enhancement of shares generation process for multimedia counting- based secret-sharing technique. Multimedia Tools Appl 78(12):16283–16310. https://doi.org/10.1007/s11042-018-6977-2
Alaba FAA et al (2017) Internet of Things security: a survey. J Netw Comput Appl 88(April):10–28. https://doi.org/10.1016/j.jnca.2017.04.002
Alassaf N, Alkazemi B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in IOT systems. J Res Eng Appl Sci 2(2):50–58. https://doi.org/10.46565/jreas.2017.v02i02.002
Alassaf N, Gutub A (2019) Simulating light weight cryptography implementation for IoT healthcare data security applications. Int J E-Health Med Commun 10(4):1–15. https://doi.org/10.4018/IJEHMC.2019100101
AlKhodaidi T, Gutub A (2020) Trustworthy target key alteration helping counting-based secret sharing applicability. Arab J Sci Eng 45(4):3403–3423. https://doi.org/10.22266/ijies2019.1031.07
Almazrooie M et al (2020) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J King Saud Univ Comput Inf Sci 32(1):24–34. https://doi.org/10.1016/j.jksuci.2018.02.006
Alotaibi M et al (2019) Secure mobile computing authentication utilizing hash, cryptography and steganography combination. J Inf Secur Cybercrim Res 10(26735/16587790):001
An X et al (2016) Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage. Comput Electr Eng 56:871–883. https://doi.org/10.1016/j.compeleceng.2016.05.012
Banerjee S et al (2019) A provably-secure and lightweight anonymous user authenticated session key exchange scheme for internet of things deployment. IEEE Internet Things J 6(5):8739–8752. https://doi.org/10.1109/JIOT.2019.2923373
Beimel A (2011) Secret-sharing schemes: a survey, pp 11–46. https://doi.org/10.1007/978-3-642-20901-7_2
Blakley GR (1979) Safeguarding cryptographic keys, pp 313–317. https://doi.org/10.1109/AFIPS.1979.98. http://www.computerhistory.org
Cui H et al (2018) Achieving scalable access control over encrypted data for edge computing networks. IEEE Access 6:30049–30059. https://doi.org/10.1109/ACCESS.2018.2844373
El-Hajj M et al (2017) Analysis of authentication techniques in Internet of Things (IoT), vol 2017, pp 1–3. https://doi.org/10.1109/CSNET.2017.8242006
Elhoseny M et al (2018) A hybrid model of internet of things and cloud computing to manage big data in health services applications. In: Future generation computer systems. https://doi.org/10.1016/j.future.2018.03.005. ISSN: 0167-739X
Farooqi N, Gutub A, Khozium MO (2019) Smart community challenges: enabling IoT/M2M technology case study. Life Sci J 16(7):11–17. https://doi.org/10.7537/marslsj160719.03
Fu JS et al (2018) Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans Ind Inf 14(10):4519–4528. https://doi.org/10.1109/TII.2018.2793350
Guan Z et al (2017) Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J 4(6):1934–1944. https://doi.org/10.1109/JIOT.2017.2690522
Gupta S, Goyal A, Bharat B (2012) Information hiding using least significant bit steganography and cryptography. Int J Mod Educ Comput Sci 4(6):27–34. https://doi.org/10.5815/ijmecs.2012.06.04
Gutub A, Al-Ghamdi M (2020) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimedia Tools Appl 79(11–12):7951–7985. https://doi.org/10.1007/s11042-019-08427-x
Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. Multimedia Tools Appl 78(5):5591–5619. https://doi.org/10.1007/s11042-017-5293-6
Gutub A, Al-Shaarani F (2020) Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arab J Sci Eng 45(4):2631–2644. https://doi.org/10.1007/s13369-020-04413-w
Hao J et al (2019) Fine-grained data access control with attribute- hiding policy for cloud-based IoT. Comput Netw 153:1–10. https://doi.org/10.1016/j.comnet.2019.02.008
Hassan WH, binti Mohamad Noor M (2019) Current research on Internet of Things (IoT) security: a survey. Comput Netw 148:283–294. https://doi.org/10.1016/j.comnet.2018.11.025
Ito M et al (1989) Secret sharing scheme realizing general access structure. Electron Commun Jpn 72(9):56–64. https://doi.org/10.1002/ecjc.4430720906
Jerker D (2017) Local cloud internet of things automation: technology and business model features of distributed internet of things automation solutions. IEEE Ind Electron Mag 11(4):8–21. https://doi.org/10.1109/MIE.2017.2759342
Kshetri N (2017) Can blockchain strengthen the internet of things? IEEE IT Profess 19(4):68–72. https://doi.org/10.1109/MITP.2017.3051335
Leloglu E (2017) A review of security concerns in internet of things. J Comput Commun 05(01):121–136. https://doi.org/10.4236/jcc.2017.51010
Li J et al (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12. https://doi.org/10.1016/j.cose.2017.08.007
Lin C et al (2018) BSeIn: a blockchain-based secure mutual authentication with fi ne-grained access control system for industry 4.0. J Netw Comput Appl 116(March):42–52. https://doi.org/10.1016/j.jnca.2018.05.005
Long J et al (2019) Lightweight distributed attribute based keyword search system for internet of things, vol 11637. Springer, Berlin, pp 253–264. https://doi.org/10.1007/978-3-030-24900-7. ISBN: 9783030249007
Maitra T et al (2019) ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications. IET Netw 8(5):289–298. https://doi.org/10.1049/iet-net.2019.0004
Manogaran G, Thota C, Lopez D (2017) Big data security intelligence for healthcare industry 4.0. Cybersecurity for Industry 4.0. Springer, Berlin, pp 103–126. https://doi.org/10.1007/978-3-319-50660-9. ISBN: 9783319506609
Meshram C et al (2019) An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing en- vironment. Soft Comput 23(24):13127–13138. https://doi.org/10.1007/s00500-019-03855-1
Narayanan U, Varghese P, Shelbi J (2017) Different analytical techniques for big data analysis: a review, pp 372–382. ISBN: 9781538618875
Narayanan U, Varghese P, Shelbi J (2020a) A light weight encryption over big data in information stockpiling on cloud. Indones J Electr Eng Comput Sci 17(1):389–397 https://doi.org/10.11591/ijeecs.v17.i1.pp389-397
Narayanan U, Varghese P, Shelbi J (2020b) A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. J King Saud Univ Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2020.05.005
Narayanan U et al (2017) A survey on various supervised classification algorithms, pp 2118–2124. ISBN: 9781538618875
Ray PP (2018) A survey on Internet of Things architectures. J King Saud Univ Comput Inf Sci 30(3):291–319. https://doi.org/10.1016/j.jksuci.2016.10.003
Reyna A et al (2018) On blockchain and its integration with IoT. Challenges and opportunities. Future Gen Comput Syst 88:173–190. https://doi.org/10.1016/j.future.2018.05.046
Ronen E et al (2017) IoT goes nuclear: creating a zigbee chain reaction, pp 195–212. https://doi.org/10.1109/SP.2017.14
Sahu AK, Swain G (2019) Dual stego-imaging based reversible data hiding using improved LSB matching. Int J Intell Eng Syst 12(5):63–73 https://doi.org/10.22266/ijies2019.1031.07
Sethi P, Sarangi SR (2017) Internet of Things: architectures, protocols, and applications. J Electr Comput Eng 2017:1–26. https://doi.org/10.1155/2017/9324035
Shamir A (1979) How to share a secret. In: Communication of ACM, pp 612–613. https://doi.org/10.1145/359168.359176
Sharma G, Kalra S (2018) A lightweight multi-factor secure smart card based re- mote user authentication scheme for cloud-IoT applications. J Inf Secur Appl 42:95–106. https://doi.org/10.1016/j.jisa.2018.08.003
Shen M, Ma B, Zhu L (2019) Secure phrase search for intelligent processing of encrypted data in cloud-based IoT. IEEE Internet Things J 6(2):1998–2008
Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115. https://doi.org/10.1016/j.jnca.2016.11.027
Stoyanova V, Tasheva Z (2015) Research of the characteristics of a steganography algorithm based on lsb method of embedding information in images, pp 56–59. ISBN: 5794718862. https://www.researchgate.net/publication/297758970
Tawalbeh LA, Tawalbeh H (2017) Lightweight crypto and security. In: Security and privacy in cyber-physical systems, pp 243– 261. https://doi.org/10.1002/9781119226079.ch12
Unnikrishnan A, Uma N, Shelbi J (2017) Performance analysis of various supervised algorithms on big data, pp 2293–2298. ISBN: 9781538618875
Varghese B (2018) Next generation cloud computing: new trends and research directions. Future Gen Comput Syst 79(February):849–861
Wang F et al (2018) LAMANCO: a lightweight anonymous mutual authentication scheme for n-times computing offloading in IoT. In: IEEE Internet of Things Journal PP(c), 1. 10.1109/JIOT.2018.2888636
Wang W, Peng X, Yang LT (2018) Secure data collection, storage, and access in cloud-assisted Iot. IEEE Cloud Comput 5(4):77–88. https://doi.org/10.1109/MCC.2018.111122026
Yang C et al (2017) Big Data and cloud computing: innovation opportunities and challenges. Int J Digital Earth 10(1):13–53. https://doi.org/10.1080/17538947.2016.1239771
Zhou L et al (2019) Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gen Comput Syst. https://doi.org/10.1016/j.future.2018.08.038
Zhu H et al (2018) Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data. IEEE Trans Cloud Comput 6(1):1–11. https://doi.org/10.1109/TCC.2018.2866405
Zhu H et al (2019) A secure and efficient data integrity verification scheme for cloud-IoT based on short signature. IEEE Access 7:90036–90044. https://doi.org/10.1109/ACCESS.2019.2924486
Acknowledgements
I respect and thank Prof. Dr. Varghese Paul, for providing me an opportunity to do the project work in CUSAT and giving me all support and guidance which made me complete the project. I am extremely thankful for providing such nice support and guidance, although he had a busy schedule.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Narayanan, U., Paul, V. & Joseph, S. Decentralized blockchain based authentication for secure data sharing in Cloud-IoT. J Ambient Intell Human Comput 13, 769–787 (2022). https://doi.org/10.1007/s12652-021-02929-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-021-02929-z