Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography

被引:40
|
作者
Atiewi, Saleh [1 ]
Al-Rahayfeh, Amer [1 ]
Almiani, Muder [2 ]
Yussof, Salman [3 ]
Alfandi, Omar [4 ]
Abugabah, Ahed [4 ]
Jararweh, Yaser [5 ]
机构
[1] Al Hussein Bin Talal Univ, Dept Comp Sci, Maan 71111, Jordan
[2] Al Hussein Bin Talal Univ, Dept Comp Informat Syst, Maan 71111, Jordan
[3] Tenaga Natl Univ, Dept Syst & Networking, Kajang 43000, Malaysia
[4] Zayed Univ, Coll Technol Innovat, Abu Dhabi, U Arab Emirates
[5] Jordan Univ Sci & Technol, Dept Comp Sci, Irbid 22110, Jordan
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Cloud computing; Internet of Things; Authentication; Encryption; Big Data; Big data; cloud computing; multilevel authentication; lightweight cryptography; CLOUD; FRAMEWORK; INTERNET; ENCRYPTION; AUTHORITY; ACCESS; SCHEME; MODEL;
D O I
10.1109/ACCESS.2020.3002815
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an effective approach to storing and managing the enormous amount of data generated by various devices. However, big data security of these organizations presents a challenge in the IoT-cloud architecture. To overcome security issues, we propose a cloud-enabled IoT environment supported by multifactor authentication and lightweight cryptography encryption schemes to protect big data system. The proposed hybrid cloud environment is aimed at protecting organizations' data in a highly secure manner. The hybrid cloud environment is a combination of private and public cloud. Our IoT devices are divided into sensitive and nonsensitive devices. Sensitive devices generate sensitive data, such as healthcare data; whereas nonsensitive devices generate nonsensitive data, such as home appliance data. IoT devices send their data to the cloud via a gateway device. Herein, sensitive data are split into two parts: one part of the data is encrypted using RC6, and the other part is encrypted using the Fiestel encryption scheme. Nonsensitive data are encrypted using the Advanced Encryption Standard (AES) encryption scheme. Sensitive and nonsensitive data are respectively stored in private and public cloud to ensure high security. The use of multifactor authentication to access the data stored in the cloud is also proposed. During login, data users send their registered credentials to the Trusted Authority (TA). The TA provides three levels of authentication to access the stored data: first-level authentication - read file, second-level authentication - download file, and third-level authentication - download file from the hybrid cloud. We implement the proposed cloud-IoT architecture in the NS3 network simulator. We evaluated the performance of the proposed architecture using metrics such as computational time, security strength, encryption time, and decryption time.
引用
收藏
页码:113498 / 113511
页数:14
相关论文
共 50 条
  • [21] A secure and scalable storage system for aggregate data in IoT
    Jiang, Hai
    Shen, Feng
    Chen, Su
    Li, Kuan-Ching
    Jeong, Young-Sik
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 49 : 133 - 141
  • [22] A Lightweight Scalable and Secure Blockchain Based IoT Using Fuzzy Logic
    Anita, N.
    Vijayalakshmi, M.
    Shalinie, S. Mercy
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 125 (03) : 2129 - 2146
  • [23] A Lightweight Scalable and Secure Blockchain Based IoT Using Fuzzy Logic
    N. Anita
    M. Vijayalakshmi
    S. Mercy Shalinie
    Wireless Personal Communications, 2022, 125 : 2129 - 2146
  • [24] A Blockchain-Based IoT Data Management System for Secure and Scalable Data Sharing
    Wang, Yawei
    Wang, Chenxu
    Luo, Xiapu
    Zhang, Kaixiang
    Li, Huizhong
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 167 - 184
  • [25] Secure Multifactor Remote Access User Authentication Framework for IoT Networks
    Alshahrani, Mohammed Mujib
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (03): : 3235 - 3254
  • [26] A more Multifactor Secure Authentication Scheme based on graphical authentication
    Joshi, Ashish
    Kumar, Sonu
    Goudar, R. H.
    2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC), 2012, : 186 - 189
  • [27] Lightweight Authentication and Secure Communication Suitable for IoT Devices
    Buchovecka, Simona
    Lorencz, Robert
    Bucek, Jiri
    Kodytek, Filip
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 75 - 83
  • [28] A Provable Secure Cybersecurity Mechanism Based on Combination of Lightweight Cryptography and Authentication for Internet of Things
    Ahmed, Adel A. A.
    Malebary, Sharaf J. J.
    Ali, Waleed
    Alzahrani, Ahmed A. A.
    MATHEMATICS, 2023, 11 (01)
  • [29] Scalable Lightweight Blockchain-Based Authentication Mechanism for Secure VoIP Communication
    El Azzaoui, Abir
    Choi, Min Yeong
    Lee, Chang Hoon
    Park, Jong Hyuk
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2022, 12
  • [30] An IoT-Enabled Cloud Computing Model for Authentication and Data Confidentiality using Lightweight Cryptography
    Ali, Salman
    Anwer, Faisal
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2025,