Advanced Privacy-Preserving Framework for Enhancing Fog Computing to Secure IoT Data Stream

Main Article Content

Aditya Kaushal Ranjan, Prabhat Kumar

Abstract

The proposed privacy-preserving framework based on fog computing for securing IoT data was examined through 10 experiment trials, with each trial dissecting a number of performance related metrics. Specifically, across the trials, latency values varied between 45 and 55 milliseconds, which signified that communication overhead was minute and that data were processed efficiently. Throughput values also varied considerably, yet only between 95 and 110 megabits per second, which signalled that the framework would allow processing data at high speeds. The rates of resource utilization measured in terms of MHR from CPU and Mused in the memory of specific fog nodes, varied between 58% and 76% . Regarding the scalability of the proposed framework, it was assessed based on the data collected and divided into the corresponding categories. From the energy consumption analysis, the values varied between 470 and 530 joules , which was recognized as the change caused by the shifting performance of the proposed IoT solution. Finally, communication overhead values varied from 970 to 1050 bytes, showing the differences in the effects which privacy-preserving frameworks have on data transmission. In conclusion, the results indicate that the proposed complex is immensely efficient in terms of protecting sensitive IoT data, ensuring a high level of security, preserving privacy, maintaining the current performance, and being adjusted to the new threats and security challenges.

Article Details

Section
Articles
Author Biography

Aditya Kaushal Ranjan, Prabhat Kumar

[1]Aditya Kaushal Ranjan

2Prabhat Kumar

 

[1]Research Scholar, Dept. of Computer Science and Engineering, National Institute of Technology, Patna, INDIA.

2Professor, Dept. of Computer Science and Engineering, National Institute of Technology, Patna, INDIA,

*Corresponding Email: aditya.cs18@nitp.ac.in

Emails: aditya.cs18@nitp.ac.in; prabhat@nitp.ac.in

Copyright © JES 2024 on-line : journal.esrgroups.org

References

K. Shirisha Reddy and M. Balaraju, “Comparative Study on Trustee of Third Party Auditor to Provide Integrity and Security in Cloud Computing,” Mater. Today Proc., vol. 5, no. 1, pp. 557–564, 2018, doi: 10.1016/j.matpr.2017.11.118.

I. Priyadarshini et al., “A new enhanced cyber security framework for medical cyber physical systems,” Software-Intensive Cyber-Physical Syst., vol. 35, no. 3–4, pp. 159–183, 2021, doi: 10.1007/s00450-021-00427-3.

N. El Kamel, M. Eddabbah, Y. Lmoumen, and R. Touahni, “A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning,” Secur. Commun. Networks, vol. 2020, 2020, doi: 10.1155/2020/8865474.

K. Kasat, D. L. Rani, B. Khan, A. J, M. K. Kirubakaran, and P. Malathi, “A novel security framework for healthcare data through IOT sensors,” Meas. Sensors, vol. 24, no. October, p. 100535, 2022, doi: 10.1016/j.measen.2022.100535.

W. Shi, A. Haga, and Y. Okada, “Web-Based 3D and 360∘ VR Materials for IoT Security Education and Test Supporting Learning Analytics,” Internet of Things (Netherlands), vol. 15, p. 100424, 2021, doi: 10.1016/j.iot.2021.100424.

W. H. Lee and R. B. Lee, “Multi-sensor authentication to improve smartphone security,” ICISSP 2015 - 1st Int. Conf. Inf. Syst. Secur. Privacy, Proc., pp. 270–280, 2015, doi: 10.5220/0005239802700280.

K. Wan and V. Alagar, “Context-aware security solutions for cyber-physical systems,” Mob. Networks Appl., vol. 19, no. 2, pp. 212–226, 2014, doi: 10.1007/s11036-014-0495-x.

G. M. H. Bashar, M. A. Kashem, and L. C. Paul, “Intrusion Detection for Cyber-Physical Security System Using Long Short-Term Memory Model,” Sci. Program., vol. 2022, 2022, doi: 10.1155/2022/6172362.

P. Nayak and G. Swapna, “Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview,” Internet of Things (Netherlands), vol. 21, no. November 2022, p. 100641, 2023, doi: 10.1016/j.iot.2022.100641.

D. Tripathi, A. Biswas, A. K. Tripathi, L. K. Singh, and A. Chaturvedi, An integrated approach of designing functionality with security for distributed cyber-physical systems, vol. 78, no. 13. Springer US, 2022. doi: 10.1007/s11227-022-04481-9.

M. Shrestha, C. Johansen, J. Noll, and D. Roverso, “A Methodology for Security Classification applied to Smart Grid Infrastructures,” Int. J. Crit. Infrastruct. Prot., vol. 28, p. 100342, 2020, doi: 10.1016/j.ijcip.2020.100342.

B. Wan, C. Xu, R. P. Mahapatra, and P. Selvaraj, “Understanding the Cyber-Physical System in International Stadiums for Security in the Network from Cyber-Attacks and Adversaries using AI,” Wirel. Pers. Commun., vol. 127, no. 2, pp. 1207–1224, 2021, doi: 10.1007/s11277-021-08573-2.

Q. A. Al, G. Mohd, and A. Mohd, “Dynamic Security Assessment for Power System Under Cyber ‑ Attack,” J. Electr. Eng. Technol., vol. 14, no. 2, pp. 549–559, 2019, doi: 10.1007/s42835-019-00084-2.

Y. nan Wang, Z. yun Lin, X. Liang, W. yuan Xu, Q. Yang, and G. feng Yan, “On modeling of electrical cyber-physical systems considering cyber security,” Front. Inf. Technol. Electron. Eng., vol. 17, no. 5, pp. 465–478, 2016, doi: 10.1631/FITEE.1500446.

P. Karthika, R. G. Babu, and A. Nedumaran, “Machine learning security allocation in IoT,” 2019 Int. Conf. Intell. Comput. Control Syst. ICCS 2019, no. Iciccs, pp. 474–478, 2019, doi: 10.1109/ICCS45141.2019.9065886.

D. Gupta, S. Rani, S. Raza, N. M. Faseeh Qureshi, R. F. Mansour, and M. Ragab, “Security paradigm for remote health monitoring edge devices in internet of things,” J. King Saud Univ. - Comput. Inf. Sci., no. xxxx, 2023, doi: 10.1016/j.jksuci.2022.12.020.

M. K. Hasan, A. K. M. A. Habib, S. Islam, N. Safie, S. N. H. S. Abdullah, and B. Pandey, “DDoS: Distributed denial of service attack in communication standard vulnerabilities in smart grid applications and cyber security with recent developments,” Energy Reports, vol. 9, pp. 1318–1326, 2023, doi: 10.1016/j.egyr.2023.05.184.

K. A. Alaghbari, M. H. M. Saad, A. Hussain, and M. R. Alam, “Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendations,” J. Cloud Comput., vol. 11, no. 1, 2022, doi: 10.1186/s13677-022-00338-x.

P. Kumari and A. K. Jain, “Computers & Security A comprehensive study of DDoS attacks over IoT network and their countermeasures,” vol. 127, 2023, doi: 10.1016/j.cose.2023.103096.

P. Milczarski, Z. Stawska, and S. Dowdall, “Security systems with biometry based on partial view facial images using geometrical features,” Proc. 2018 IEEE 4th Int. Symp. Wirel. Syst. within Int. Conf. Intell. Data Acquis. Adv. Comput. Syst. IDAACS-SWS 2018, pp. 204–209, 2018, doi: 10.1109/IDAACS-SWS.2018.8525678.

C. Li, X. Guo, and X. Wang, “An Autonomous Cyber-Physical Anomaly Detection System Based on Unsupervised Disentangled Representation Learning,” Secur. Commun. Networks, vol. 2021, 2021, doi: 10.1155/2021/1626025.

K. Kandasamy, S. Srinivas, K. Achuthan, and V. P. Rangan, “IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process,” Eurasip J. Inf. Secur., vol. 2020, no. 1, 2020, doi: 10.1186/s13635-020-00111-0.

F. S. De Lima Filho, F. A. F. Silveira, A. De Medeiros Brito Junior, G. Vargas-Solar, and L. F. Silveira, “Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning,” Secur. Commun. Networks, vol. 2019, 2019, doi: 10.1155/2019/1574749.