Preservation of Sensitive Data Using Multi-Level Blockchain-based Secured Framework for Edge Network Devices

被引:1
|
作者
Awasthi, Charu [1 ]
Mishra, Prashant Kumar [2 ]
Pal, Pawan Kumar [3 ]
Khan, Surbhi Bhatia [4 ,5 ]
Agarwal, Ambuj Kumar [6 ]
Gadekallu, Thippa Reddy [5 ,7 ,8 ,9 ,10 ]
Malibari, Areej A. [11 ]
机构
[1] JSS Acad Tech Educ, Noida, India
[2] Pranveer Singh Inst Technol, Dept Comp Sci & Engn, Kanpur, India
[3] KIET Grp Inst, Dept Comp Sci, Ghaziabad, India
[4] Univ Salford, Sch Sci Engn & Environm, Dept Data Sci, Salford, England
[5] Lebanese Amer Univ, Dept Elect & Comp Engn, Byblos, Lebanon
[6] Sharda Univ, Sch Engn & Technol, Dept Comp Sci & Engn, Greater Noida, India
[7] Zhongda Grp, Jiaxing 314312, Zhejiang, Peoples R China
[8] Vellore Inst Technol, Sch Informat Technol & Engn, Vellore, India
[9] Jiaxing Univ, Coll Informat Sci & Engn, Jiaxing 314001, Peoples R China
[10] Lovely Profess Univ, Div Res & Dev, Phagwara, India
[11] Princess Nourah Bint Abdulrahman Univ, Coll Engn, Dept Ind & Syst Engn, POB 84428, Riyadh 11671, Saudi Arabia
关键词
Attack; Data protection; Cryptosystem; Encryption; Decryption; Hashing; Resistant; Overheads; Multiple securities; Computation; ETHEREUM; IOT;
D O I
10.1007/s10723-023-09699-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of IoT devices has influenced end users in several aspects. Yottabytes (YB) of information are being produced in the IoT environs because of the ever-increasing utilization capacity of the Internet. Since sensitive information, as well as privacy problems, always seem to be an unsolved problem, even with best-in-class in-formation governance standards, it is difficult to bolster defensive security capabilities. Secure data sharing across disparate systems is made possible by blockchain technology, which operates on a decentralized computing paradigm. In the ever-changing IoT environments, blockchain technology provides irreversibility (immutability) usage across a wide range of services and use cases. Therefore, blockchain technology can be leveraged to securely hold private information, even in the dynamicity context of the IoT. However, as the rate of change in IoT networks accelerates, every potential weak point in the system is exposed, making it more challenging to keep sensitive data se-cure. In this study, we adopted a Multi-level Blockchain-based Secured Framework (M-BSF) to provide multi-level protection for sensitive data in the face of threats to IoT-based networking systems. The envisioned M-BSF framework incorporates edge-level, fog-level, and cloud-level security. At edge- and fog-level security, baby kyber and scaling kyber cryptosystems are applied to ensure data preservation. Kyber is a cryptosystem scheme that adopts public-key encryption and private-key decryption processes. Each block of the blockchain uses the cloud-based Argon-2di hashing method for cloud-level data storage, providing the highest level of confidentiality. Argon-2di is a stable hashing algorithm that uses a hybrid approach to access the memory that relied on dependent and independent memory features. Based on the attack-resistant rate (> 96%), computational cost (in time), and other main metrics, the proposed M-BSF security architecture appears to be an acceptable alternative to the current methodologies.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] A multi-level closing based segmentation framework for dermatoscopic images using ensemble deep network
    Srivastava, Varun
    Gupta, Shilpa
    Singh, Ritik
    Gautam, Vaibhavkumar
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (08) : 3926 - 3939
  • [32] DR-BFT: A consensus algorithm for blockchain-based multi-layer data integrity framework in dynamic edge computing system
    Fan, Yuqi
    Wu, Huanyu
    Paik, Hye-Young
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 124 : 33 - 48
  • [33] An Intrusion Detection Framework Based on Hybrid Multi-Level Data Mining
    Yao, Haipeng
    Wang, Qiyi
    Wang, Luyao
    Zhang, Peiying
    Li, Maozhen
    Liu, Yunjie
    INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2019, 47 (04) : 740 - 758
  • [34] An Intrusion Detection Framework Based on Hybrid Multi-Level Data Mining
    Haipeng Yao
    Qiyi Wang
    Luyao Wang
    Peiying Zhang
    Maozhen Li
    Yunjie Liu
    International Journal of Parallel Programming, 2019, 47 : 740 - 758
  • [35] Multi-level threshold based edge detector using logical operations
    Singh, Kiran Jot
    Kapoor, Divneet Singh
    Sharma, Anshul
    Kohli, Amit Kumar
    JOURNAL OF THE NATIONAL SCIENCE FOUNDATION OF SRI LANKA, 2016, 44 (02): : 145 - 154
  • [36] MuLPP: A multi-level privacy preserving for blockchain-based bilateral P2P energy trading
    Abdella, Juhar
    Tari, Zahir
    Mahmud, Redowan
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 237
  • [37] Unsupervised Multi-level Segmentation Framework for PolSAR Data using H-Alpha features and the Combined Edge-Region based segmentation
    Elenean, M. Abo
    Hafez, A. T.
    Helmy, A. K.
    ElTohamy, Fawzy
    Azouz, Ahmed
    2023 IEEE AEROSPACE CONFERENCE, 2023,
  • [38] BloCkEd: Blockchain-Based Secure Data Processing Framework in Edge Envisioned V2X Environment
    Aujla, Gagangeet Singh
    Singh, Amritpal
    Singh, Maninderpal
    Sharma, Sumit
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 5850 - 5863
  • [39] A multi-level analytic framework for disaster situational awareness using Twitter data
    Wei Zhai
    Computational Urban Science, 2
  • [40] A multi-level analytic framework for disaster situational awareness using Twitter data
    Zhai, Wei
    COMPUTATIONAL URBAN SCIENCE, 2022, 2 (01):