999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Building a Trust Model for Secure Data Sharing(TM-SDS)in Edge Computing Using HMAC Techniques

2022-08-23 02:15:02KarthikeyanandMadhavan
Computers Materials&Continua 2022年6期

K.Karthikeyanand P.Madhavan

School of Computing,SRM Institute of Technology,Kattankulathur,Chennai,603203,India

Abstract:With the rapid growth of Internet of Things(IoT)based models,and the lack amount of data makes cloud computing resources insufficient.Hence,edge computing-based techniques are becoming more popular in present research domains that makes data storage, and processing effective at the network edges.There are several advanced features like parallel processing and data perception are available in edge computing.Still, there are some challenges in providing privacy and data security over networks.To solve the security issues in Edge Computing,Hash-based Message Authentication Code(HMAC)algorithm is used to provide solutions for preserving data from various attacks that happens with the distributed network nature.This paper proposed a Trust Model for Secure Data Sharing (TM-SDS) with HMAC algorithm.Here,data security is ensured with local and global trust levels with the centralized processing of cloud and by conserving resources effectively.Further,the proposed model achieved 84.25%of packet delivery ratio which is better compared to existing models in the resulting phase.The data packets are securely transmitted between entities in the proposed model and results showed that proposed TM-SDS model outperforms the existing models in an efficient manner.

Keywords: Secure data sharing; edge computing; global trust levels; parallel processing

1 Introduction

Internet of Things(IoT)is the recent advancement in communication,in which data is the valuable resource,providing several intelligent services to the people[1].However,the IoT data contain private data and can disclose the user identities,if it is not efficiently secured[2].For instance,the malicious user can utilize the user’s private data like date of birth,bank details and so on.The authorized person identification is considered that influences the adverse effects, when there are responsible for user actions.So,an effective privacy preserving models and protocols are necessary in edge computing.In recent times, edge computing is a distributed computation model with many trust models in which the coexistence of multiple operational entities,authentication models require the attribute validation for every unit in single trust model [3,4].Hence, the entities are mutually authenticated each other with varied secure models.For some resource-limited entities, it is unfeasible to store or process big data or to run a highly complex trust model.Edge computing model comprises big data processing,parallel computation aspects,distributed data transmission processing,location-aware,mobility and dynamicity,and so on.The conventional privacy and security models in edge computing are ineffective for securing the massive data processing[5].Specifically,secure data processing and privacy preserving problems are effectively important.Major concerns that are faced in edge computing related to data security and privacy-preserving issues are lightweight and fine-grained, distributed access control,limited resources and efficient privacy preservation.

The above-stated data security and privacy preserving issues of edge computing model are stimulated to develop a security model in edge computing.The edge computing model can solve the problems that are related with the centralized system by approaching data pipeline operations over the edge of models with resource accessibility and application needs[6,7].Moreover,the framework deployment is more advanced in developing model with content providers,network entity,and third party element.Thereby, it is essential to enhance the end-user experience, because of the energy computing strategies[8–10].Nevertheless,edge computing cannot secure the user data privacy,since new set of attacks with multiple attack models are associated with the heterogeneity of element resources, network measurement and user accessibility [11,12].So, a Trust Model for Secure Data Sharing(TM-SDS)with HMAC algorithm is proposed in this research paper.The technology utilizes data blocks that are connected with one another with a cryptographic hash key[13,14].However,the Homomorphic Encryption incorporating in edge computing is a challenging process,because of the resource constraints and the scalability problems.The contributions of the proposed model are listed below,

· Developing enhanced privacy with efficient HMAC Algorithm.

· Local and global trust levels are developed with the centralized processing of cloud and conserving resources effectively.

· For data and communication security,HMAC algorithm is used with hashing concept.

· Providing compatibility with the efficient trust chain process that makes effective decision making without depending on the central admin of each node.

· Interoperability between the trust blocks for efficient data security over communication.

· Evaluation of results based on factors such as processing delay,rate of security,packet delivery ratio,communication overhead and packet drop.

The structure of this paper is organized as follows: Section 2 provides the concepts of security management in edge computing that are applied for data security so far.Section 3 presents the preliminaries that support the proposed idea.Section 4 discussed the working procedure of the proposed Trust Model.The results and evaluations are presented in Section 5 for evidencing the model efficiency.Finally,Section 6 concludes the paper with some motivations for enhancement.

2 Related Works

Each merchant in IoT based communications are used for developing smart entities based on requirements that acts effectively in dynamic platforms [15].In addition, the framed data are to be secured in such a way that no one can access or misuse data.A valuable review work that described the security issues in several computation platforms.Tao et al.[16] developed a new multi-layered cloud architectural framework in which the services are given with the IoT based smart devices.Additionally,an ontology-based knowledge representation model has been presented in this literature.Lee et al.[17]used semantic web rule language for an effective interoperability of heterogeneous devices.

An Intrusion Detection model(IDM)is developed based on SDN framework by Nobakht et al.[18].The developed model is used to solve the issues of host-based attack.In addition,the communicational,and computational overhead is significantly reduced by designing the traffic flow based on the target nodes.In this literature,IoT-IDM involved in monitoring the attack-based network activities,and tried to derive the attributes based on data flow of networks.The machine learning techniques are used for the classification of malicious traffics accurately.Gheisari et al.[19] and Madhavan et al.[20] implemented Support Vector Machine (SVM) technique with homomorphic encryption and friendly algorithm to detect the normal and abnormal node activities.The classification operations are performed based on the selected features of the attacks.Mohammadi et al.[21]and Mamolar et al.[22]has tried to resolve the attacks with defined traffic protocols with proper switching and hubs.

Yu et al.[23] has presented a four image encryption algorithm based on chaos and computer generated hologram and quaternion Fresnel transform technique.The developed algorithm improved the security and weaken the correlation, where the extensive experiment showed the effectiveness of four image encryption algorithm.Esposito et al.[24]developed a novel model to authorize and find the policies by leveraging on the block-chain technology for holding a global view of the security policies with-in the system.Further,Li et al.[25]implemented a new algorithm based on synergetic neural networks.Firstly, the developed algorithm embeds the gray watermark signals into discrete cosine transform components.Additionally,the companion algorithm along with co-operative neural network is used for the extraction of watermark.Lastly,the suspected watermark signal is considered as the input,and the output image is considered as the outcome of recognition mechanism.

Stergiou et al.[26] developed an innovative architecture that operates in a wireless mobile 6G network to manage big data on smart buildings.Al-Qerem et al.[27]developed a new variant optimistic con-currency control protocol that decreases the computation, and communication at the cloud.Hence, the developed protocol supports transactional and scalability of the services.The author analyzed the validation process under three con-currency protocols based on the numerical studies.The validation results represent that the developed protocol is more beneficial for the IoT users.Tewari et al.[28] developed a new ultra-light weighted mutual authentication protocol that utilizes bit-wise operations.This protocol is effective by means of communication cost,and storage.Zheng,et al.[29]implemented a light-weighted authenticated encryption approach on the basis of discrete chaotic s box coupled map lattice that superiorly improves the security in IoT environment.Further,Yu et al.[30]developed a new single bit public key encryption approach on the basis of learning parity with noise for an effective encryption.The extensive experiment showed that the developed approach achieved better plaintext attack security.

Gupta et al.[31] developed an attribute based searchable encryption algorithm that provides better flexibility and usability by means of effective search.The developed attribute based searchable encryption algorithm delivers better performance in medical field by preserving privacy of the health data by keeping the data in an encryption form.Tewari et al.[32]performed a mutual authentication process between server and the IoT devices on the basis of elliptic curve cryptography that provides better solution by means of attack resistance and communication over-head.Further,Alsmirat et al.[33] determines the optimal ratio of the finger-print image compression to improve the recognition accuracy of finger-print identification system.In this study,the experiment was performed on large in house dataset and the obtained results showed that the developed approach accurately determines the compression ratio.

The major drawback noticed in the existing works is that the feature selection has been carried out with the static mode.Then,the malicious activities that are not detected in dynamic process,and also the existing models can secure only the target host and not the complete network.To address these issues,a new model is proposed in this research paper.

3 Preliminaries

This section describes the background research about the trust model.In this paper,the concepts of Homomorphic Encryption technique are incorporated to resolve the security issues and efficient resource utilization in Edge Computing.The basic edge computing model is depicted in Fig.1.

Figure 1:General edge computing framework

The Trust model estimates the security strength and computes the trust esteem value.A trust esteem value comprises of various parameters along with the security of edge computing.The sub parameters and functions also be evaluated in the Trust model[34,35].Fig.2 measure the conceptual view of the trust model with their parameter,sub parameter and functions[36].

In Fig.2,‘A’addresses the Identity Management(IDM),which is the vital components of security frameworks in the cloud, where the cycle analyzed the sign strength with in it.The authentication process represented as ‘B’that increase the end user security access at the time of the login and verification process.The verified end user is determined by the strength of the authentication, and it is processed by the segments of trust models.The authorization process represented as ‘C’, which is measured by authorization strength.The cloud computing provides the authorization services by the various model using Access Control Strength (ACL) and all the activities need authorization permission in this stage.

Figure 2:Conceptual view of trust model

The data protection,confidentiality,communication,isolation and virtualization security process are represented from‘D’to‘I’,where the trust model security covers all aspects of parameters[37].The above boundaries are estimated independently and it is joined to calculate the distributed computing strength and application.

4 Proposed Model

In this section,the novel techniques for privacy preserving and utilization of effective computational resources are presented with the proposed model named Trust Model for Secure Data Sharing(TM-SDS) that includes HMAC algorithm for security in edge computing.The proposed model provides enhanced scalability with the secure and distributed storage mechanism, where the high security is achieved with the homomorphic encryption and HMAC algorithm with the trusted model.This process makes the distributed decision making effective without relying on the central admin,who has the control over each node in the network.Furthermore, the interoperability among the multiple blocks is effectively managed.Additionally,the local and the global trust levels are designed for efficient resource usage,which is graphically presented in Fig.3.

Figure 3:Overall design of the proposed TM-SDS model

In this research paper, the proposed trust model is implemented with the trust service levels called global and local trust levels.The home or the industrial routers are defined as the trust agent.Based on the demands of security platform,trust services are employed in both the local trust levels.Moreover,in this framework,the homomorphic encryption based trust model technology is enabled for communicating with each other without the requirement of central admin in the pattern of peerto-peer model.Additionally,the distributive characteristic of edge computing makes both parallel and serial levels based on the application requirements.For computing the authority,there are several trust ranges are defined based on entities,data trust,and user privacy related trust.

Further, the proposed work comprises of three phases such as, (i) initialization phase, (ii) data encryption with homomorphic encryption,and(iii)secure data processing with HMAC.The functions performed in each phase are clearly depicted in Fig.4, which is executed in bottom-up manner,comprises lower,middle and upper layers.

Figure 4:Layers and function in proposed TM-SDS model

4.1 Initialization Phase

In this phase,initial setups are processed by preparing the networks based on security demands.The system comprises of edge devices and aggregation point(Ap)for receiving the collected data from edge devices.The data are secured before sending toApfor data aggregation.Steps involved in the initialization phase are given as,

· Each host of end device (D) in the edge computing network is provided with an identity asDi∈{1,...,n}.

· Aggregation points are also provided for some device set,which are also given with identities.

· The base station broadcasts a distinctive key-pair for all devices with similarApto produce HMAC for data security.

4.2 Data Encryption with HE

4.2.1 Process of Data Split

Let it be in two months, answered Don Giovanni, for the time was nearly up that the devil had fixed13, and he wanted a whole month to himself to wash off the dirt of the past three years

For enhancing the security process, the data split method is used here and the divided data are switched in pair-wise process.Here, it is taken that theApis connected with multiple devices, which are termed as,Di= {1,...,n}.For specific timestamp, the end devices in edge computing receive dataM={m1,m2,...,mn},respectively.The initial phase,each device‘D’,‘M’splits the acquired data into‘n’number of sections as,Sij(i∈1,2,...,n),(j∈1,2,...,n)considerably,in which‘n’points the number of devices presented in the network.The equation for data split is given as Eq.(1),

Following the data split operation,the sections are interchanged with themselves.The section,‘S11’is protected by the device‘D1’,where the other devices are in effective distribution.Based on the device,D1is transmitting(n-1)sections of data,whereSij(ji)to others.Next to the process of swapping,the encryption process is performed,where the model HE derives fast encryption and decryption.The algorithm works on the basis of probabilistic asymmetric method for securing the scalar parameter of shared data.The process of key generation is demonstrated below.

i.Key Generation Process

1.Two random numbers ‘a(chǎn)’and ‘b’are selected, which are mutually independent and provides that is mathematically indicated in Eq.(2).

It is assumed that the numbers are with equal length.

2.Computen-abandβ=1,which is the parameter constant,for(x-1,y-1).

3.Random integer‘L’is selected,whereL∈

In which,functionFis given as,F(A)=(a-1)/n

5.Here,the public key is derived as,(n,L)

6.And,private key is stated as,(β,?)

ii.Process of Encryption

The obtained dataDi, in which 0 ≤Di≤n, a random number ‘v’is selected, that relies in between(0,n).The encrypted text(ET)is derived as Eq.(4),

iii.Process of Decryption

The‘ET’is decrypted using Eq.(5).

4.2.2 HMAC Operations in the Proposed Model

In this model, HMAC is produced for the ‘ET’, which effectively controls the impacts of node capture attacks and compromised node attacks in edge computing.Here, the HMAC for ET is generated with the identical keys that are used in theAps.The pseudocode for HMAC generation is given below;

Algorithm 1: Process of HMAC Generation for ET 1.Begin 2.Network Setup Initialization//Key Generation:Select p1 and p2 ∈Z*n2,then P=p1,p2//HMAC Generation,Do Derive U ←F(p1)∈Z*n2 V ←G(p2(ID,i)))∈Z*n2 HMACET ←(U.V)+S)∈Z*n2 Call Data-Aggregation()Call homomorphic security()End

4.2.3 Operations in Aggregation Point

The data aggregation process is performed in secure manner and the process is explained below,which is run when the pseudocode calls Data-Aggregation().Moreover,the additive operations are performed as given as follows,

The final results(FD)are derived using Eq.(7),

The private keys are used for device-to-device communications that are to be updated frequently.In addition,the hashing operations are performed for one instant pad with the assumption that the initial private-key is taken as,‘q1’and the set ends with‘qn’for‘n’number of devices.

The resultant data obtained for each device is portrayed in Tab.1 where,di(i∈(1,2,...,n))are the shared data to the edge devicesDi(i∈(1,2,...,n)).The respective encrypted data isdi0(i∈(1,2,...,n)).In this way, the real time data are acquired by end devices from the edge computing, which are by secured data storage and transmission between the servers.The data aggregation converts theHence, the data cannot be disclosed or accessed atApand the real shared data are more secure.

Table 1: Results of secure data aggregation process

When the edge devices share the obtained data,the real data is encrypted with the above operations and the Homomorphic_security()is executed at the upper layer for securing the keys from unknown access.The encrypted datadi0(i∈(1,2,...,n))is concealed with the public key of the cloud server before it is shared,which is given as Eq.(9),

The hash rate is produced by each device with their unique identities(ID),time-stamp and ET.Here,the hash rate is given as,HS(ID‖tp‖ETi),and it helpsApto verify that the shared private data of the users are confidential and not accessed by anywhere between the transmission process.

5 Results and Discussions

The proposed model is simulated utilizing Network Simulator NS2 device.The results and discussions are presented in this section.Furthermore,the proposed model is accessed the evaluation metrics such as rate of model security,packet delivery rate,transmission delay,packet drop,communication overhead.For evidencing the model efficiency,the results are compared with Support Vector Machine for attack detection and IoT-Intrusion Detection Model(IDM).The initial parameter setting for the simulation tool is provided in the Tab.2.

Table 2: Initial simulation settings

The significant factor for determining the performance of the proposed model is the communication complexity.During the process of data accumulation,there are some possibilities for attackers to access the data, and the communication complexity is measured asO(d*y), where, d represents devices and y indicates number of third-party attackers possibly to attack the communication,which is to be less in an efficient model for communication.The evaluation results based on the factor called communication complexity is given in Fig.5.It is obvious from the results that the proposed model produces minimal complexity than other,since the risks of attacks are minimal in the model with the effectively defined trust model.

Figure 5:Communication overhead-comparisons

The Packet Delivery Ratio (PDR) is derived with respect to the simulation time and the results are portrayed in Fig.6.The proposed model achieves 84.25% of PDR in average, which is higher compared to other models such as SVM and IoT-IDM.The data packets are securely transmitted between entities in the proposed model.

Figure 6:Packet delivery ratio vs.simulation time

The transmission delay occurs in a communication model for various reasons and the major issue is the troubles caused by the attackers.In the proposed model,the security of data is effectively handled with the trust model and the homomorphic encryption based security implementations, the overall transmission delay is effectively reduced in the proposed model and the evidences are provided in the graph in Fig.7.Another factor,packer drop also should be minimal in efficient edge computing model.The evaluations are carried out against the simulation time and the results are depicted in Fig.8.It is shown that the proposed model achieves minimal packet drop than the comparative models.

Figure 7:Transmission delay vs.packet size

Figure 8:Packet drop vs.simulation time

As mentioned earlier,the main motivation of the proposed model is to be derived an efficient data security mechanism for shared data between entities in edge computing.Hence, the security rate of the proposed model is evaluated against a particular attack called compromised node attack and the results are given in Fig.9.When the compromised attacks are happened in the proposed work, the model effectively detects the attack and showed that there is the attack possibility with minimal rate of security than others.The evaluations are performed against the simulation time.

Figure 9:Security rate analysis

6 Conclusion and Future Work

This paper presented a secure communication model in edge computing called Trust Model for Secure Data Sharing (TM-SDS) with homomorphic encryption based Techniques.The model used Homomorphic Encryption and the cross verification is implemented with trust model.Moreover,the security of the shared data is provided with local and global trust levels to be considered with the centralized processing of cloud and conserving resources in efficient manner.HMAC is also utilized for enhancing the rate of data security at the aggregator point in the process of data transmission.The outcomes are assessed based on significant factors such as packet drop, model efficiency and PDR.The comparative analysis showed that the proposed model obtained better results and outperforms the results of the existing works with the effective integration of cryptography and trust model.In future,the proposed work is enhanced by deriving novel mechanisms for integrity verification and seamless communication between entities.In addition, the proposed work is also improved by implementing and evaluating in a real-time environment.

Funding Statement:The authors received no specific funding for this study.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 伊人五月丁香综合AⅤ| 亚洲一区二区三区国产精华液| 99久久国产自偷自偷免费一区| 国产色网站| 91精品专区国产盗摄| 欧美翘臀一区二区三区| 色有码无码视频| 亚洲国产成人无码AV在线影院L | 欧美亚洲国产一区| 韩日午夜在线资源一区二区| 亚洲人成影视在线观看| 国内精自视频品线一二区| 欧美va亚洲va香蕉在线| 99精品视频九九精品| 亚洲成肉网| 91色爱欧美精品www| 国产乱子伦精品视频| 综1合AV在线播放| 亚洲国产日韩在线成人蜜芽| 色噜噜在线观看| 国产凹凸视频在线观看| 亚洲大学生视频在线播放| 在线观看国产黄色| 91亚瑟视频| 2020国产精品视频| 亚洲不卡影院| 久青草免费在线视频| 亚洲最猛黑人xxxx黑人猛交| 日本在线免费网站| 看看一级毛片| 国产美女叼嘿视频免费看| 视频二区中文无码| 亚洲视频四区| 综合社区亚洲熟妇p| 粉嫩国产白浆在线观看| 97精品伊人久久大香线蕉| 超级碰免费视频91| 综合网久久| 日韩免费毛片| 中国一级毛片免费观看| 国产欧美日韩va| 秋霞午夜国产精品成人片| 亚洲精品无码日韩国产不卡| 国产精彩视频在线观看| 欧美在线视频a| 亚洲综合中文字幕国产精品欧美| 免费a在线观看播放| 久久综合丝袜长腿丝袜| 免费毛片全部不收费的| 永久毛片在线播| 久久久精品久久久久三级| 亚洲一区二区三区国产精品| 日韩精品亚洲人旧成在线| 波多野结衣在线一区二区| 免费看久久精品99| 成人毛片免费在线观看| 免费人成在线观看成人片 | 韩日无码在线不卡| 青青草一区| 91视频日本| 激情乱人伦| 99久久亚洲精品影院| 国产打屁股免费区网站| 亚洲国产中文精品va在线播放| 亚洲男人天堂久久| 久久a级片| 狠狠色婷婷丁香综合久久韩国| 美臀人妻中出中文字幕在线| 97人妻精品专区久久久久| 久久综合AV免费观看| 欧美日本激情| 国产jizzjizz视频| 国产制服丝袜91在线| 国内老司机精品视频在线播出| 亚洲天堂视频网站| 亚洲免费福利视频| 亚洲高清日韩heyzo| 午夜视频在线观看免费网站| 国产精品美乳| 亚洲第一成网站| 亚洲欧洲日韩综合色天使| 国产精品太粉嫩高中在线观看|