Skip to main content

Advertisement

Log in

A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT)

  • Machine Learning Applications for Self-Organized Wireless Networks
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Internet of underwater things (IoUT) is an emerging technique with widespread applications. In such type of systems, efficient and secure use of network resources remains to be a greater challenge. This is due to the reason that it works on the basis of a network of smart interconnected objects. This creates the necessity for energy-aware and secure communication techniques across IoUT environment. In order to solve this issue, in this paper, a secure cloud-based solution for real-time monitoring and management of IoUT across smart cities is provided. The proposed system mainly focuses on secure data transmission with lesser energy requirements. This makes smart cities to go green and efficient. The major contribution of the proposed system is divided into two parts: First, an energy-aware efficient framework for IoUT system is defined. Next, we define an enhanced attribute-based encryption scheme with effective user attribute management for secure data transmission across IoUT systems. The simulations are performed, and the results state that the proposed approach provides better security and privacy measures than the existing system. In future, this work could be extended to deal with increasing amount of complexity measures with increased user attributes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32

    Article  Google Scholar 

  2. Domingo MC (2012) An overview of the internet of underwater things. J Netw Comput Appl 35(6):1879–1890

    Article  Google Scholar 

  3. Kao C-C, Lin Y-S, Geng-De W, Huang C-J (2017) A comprehensive study on the internet of underwater things: applications, challenges, and channel models. Sensors 17(7):1477

    Article  Google Scholar 

  4. Abdillah AF, Berlian MH, Panduman YYF, Akbar MAW, Afifah MA, Tjahjono A, Sukaridhoto S, Sasaki S (2017) Design and development of low cost coral monitoring system for shallow water based on internet of underwater things. J Telecommun Electron Comput Eng 9(2–5):97–101

    Google Scholar 

  5. Zhou Z, Yao B, Xing R, Shu L, Shengrong B (2015) E-carp: an energy efficient routing protocol for uwsns in the internet of underwater things. IEEE Sens J 16(11):4072–4082

    Article  Google Scholar 

  6. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164

    Article  Google Scholar 

  7. Kao C-C, Lin Y-S, Wu G-D, Huang C-J (2017) A study of applications, challenges, and channel models on the internet of underwater things. In: 2017 international conference on applied system innovation (ICASI). IEEE, pp 1375–1378

  8. Urunov K, Namgung J-I, Park S-H (2015) Security challenges of DTN mechanism for IoUT. Int J Inf Electron Eng 5(5):330

    Google Scholar 

  9. Younis YA, Kifayat K, Merabti M (2014) An access control model for cloud computing. J Inf Secur Appl 19(1):45–60

    Google Scholar 

  10. Cheng Y, Park J, Sandhu R (2016) An access control model for online social networks using user-to-user relationships. IEEE Trans Dependable Secure Comput 13(4):424–436

    Article  Google Scholar 

  11. Dittrich KR, Härtig M, Pfefferle H (1988) Discretionary access control in structurally object-oriented database systems. In: DBSec, pp 105–121

  12. Ahn G-J (2009) Discretionary access control. In: Liu L, Özsu MT (eds) Encyclopedia of database systems. Springer, New York, pp 864–866

    Google Scholar 

  13. Ninghui Li (2011) Discretionary access control. In: Van Tilborg HC, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, New York, pp 353–356

    Google Scholar 

  14. Downs DD, Rub JR, Kung KC, Jordan CS (1985) Issues in discretionary access control. In: IEEE symposium on security and privacy, 1985. IEEE, pp 208–208

  15. Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE Commun Mag 32(9):40–48

    Article  Google Scholar 

  16. Lindqvist H (2006) Mandatory access control. Master’s thesis in computing science, Umea University, Department of Computing Science, SE-901, p 87

  17. La Padula LJ (1990) Formal modeling in a generalized framework for access control. In: Computer security foundations workshop III, 1990. Proceedings. IEEE, pp 100–109

  18. Upadhyaya S (2011) Mandatory access control. In: Encyclopedia of cryptography and security. Springer, Boston, pp 756–758

    Google Scholar 

  19. Thuraisingham B (2009) Mandatory access control. In: Liu L, Özsu MT (eds) Encyclopedia of database systems. Springer, New York, pp 1684–1685

    Google Scholar 

  20. Thompson TJ, James HH II, Durant WR (2013) Hierarchy-aware role-based access control, March 19. US Patent 8,402,514

  21. Zhou L, Varadharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans Inf Forensics Secur 8(12):1947–1960

    Article  Google Scholar 

  22. Uzun E, Atluri V, Vaidya J, Sural S, Ferrara AL, Parlato G, Madhusudan P (2014) Security analysis for temporal role based access control. J Comput Secur 22(6):961–996

    Article  Google Scholar 

  23. Ranise S, Truong A, Armando A (2014) Scalable and precise automated analysis of administrative temporal role-based access control. In: Proceedings of the 19th ACM symposium on access control models and technologies. ACM, pp 103–114

  24. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89–98

  25. Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 195–203

  26. Melissa C (2007) Multi-authority attribute based encryption. In: Theory of cryptography conference. Springer, pp 515–534

  27. Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743–754

    Article  Google Scholar 

  28. Guojun W, Qin L, Jie W, Minyi G (2011) Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput Secur 30(5):320–331

    Article  Google Scholar 

  29. Chase M, Chow SSM (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM conference on Computer and communications security. ACM, pp 21–130

  30. Ahmed E, Yaqoob I, Hashem IAT, Khan I, Ahmed AIA, Imran M, Vasilakos AV (2017) The role of big data analytics in internet of things. Comput Netw 129:459–471

    Article  Google Scholar 

  31. Lin H, Cao Z, Liang X, Shao J (2010) Secure threshold multi authority attribute based encryption without a central authority. Inf Sci 180(13):2618–2632

    Article  MathSciNet  MATH  Google Scholar 

  32. Li J, Huang Q, Chen X, Chow SSM, Wong DS, Xie D (2011) Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM symposium on information, computer and communications security. ACM, pp 386–390

  33. Li M, Shucheng Y, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143

    Article  Google Scholar 

  34. Rouselakis Y, Waters B (2015) Efficient statically-secure large-universe multi-authority attribute-based encryption. In: International conference on financial cryptography and data security. Springer, pp 315–332

  35. Yang K, Jia X (2014) DAC-MACS: effective data access control for multi-authority cloud storage systems. In: Yang K, Jia X (eds) Security for cloud storage systems. Springer, Berlin, pp 59–83

    Chapter  Google Scholar 

  36. Wang C, Luo J (2013) An efficient key-policy attribute-based encryption scheme with constant ciphertext length. Math Probl Eng 2013. https://doi.org/10.1155/2013/810969

  37. Attrapadung N, Libert B, De Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: International workshop on public key cryptography. Springer, Berlin, Heidelberg, pp 90–108

    Google Scholar 

  38. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, 2007. SP’07. IEEE, pp 321–334

  39. Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International workshop on public key cryptography. Springer, pp 53–70

  40. Liang KFL, Susilo W, Wong DS (2013) A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. In: 5th international conference on intelligent networking and collaborative systems (INCoS), 2013. IEEE, pp 552–559

  41. Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput 64(1):126–138

    Article  MathSciNet  MATH  Google Scholar 

  42. Liu L, Lai J, Deng RH, Li Y (2016) Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Secur Commun Netw 9:4897–4913

    Article  Google Scholar 

  43. Jiang Y, Susilo W, Mu Y, Guo F (2017) Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener Comput Syst 78:720–729

    Article  Google Scholar 

  44. Li L, Tianlong G, Chang L, Zhoubo X, Liu Y, Qian J (2017) A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram. IEEE Access 5:1137–1145

    Article  Google Scholar 

  45. Roy S, Chuah M (2009) Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical report, Citeseer

  46. Xu J, Wen Q, Li W, Shen J, He D (2017) Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. Soft Comput 21(18):5265–5279

    Article  MATH  Google Scholar 

  47. Chow SSM (2016) A framework of multi-authority attribute-based encryption with outsourcing and revocation. In: Proceedings of the 21st ACM on symposium on access control models and technologies. ACM, pp 215–226

  48. Zhong H, Zhu W, Xu Y, Cui J (2018) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22(1):243–251

    Article  MATH  Google Scholar 

  49. Yan H, Li J, Li X, Zhao G, Lee S-Y, Shen J (2016) Secure access control of e-health system with attribute-based encryption. Intell Autom Soft Comput 22(3):345–352

    Article  Google Scholar 

  50. Liu Y, Zhang Y, Ling J, Liu Z (2017) Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Future Gener Comput Syst 78:1020–1026

    Article  Google Scholar 

  51. Prathyusha D, Murty MS (2016) Access control mechanism on e-health care cloud data storage. Int J Res 3(4):83–89

    Google Scholar 

  52. Pescosolido L, Berta R, Scalise L, Revel GM, De Gloria A, Orlandi G (2016) An IOT-inspired cloud-based web service architecture for e-health applications. In: 2016 IEEE international smart cities conference (ISC2). IEEE, pp 1–4

  53. Liou E-C, Kao C-C, Chang C-H, Lin Y-S, Huang C-J (2018) Internet of underwater things: challenges and routing protocols. In: 2018 IEEE international conference on applied system invention (ICASI). IEEE, pp 1171–1174

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. P. Gopinath.

Ethics declarations

Conflict of interest

There is no conflict of interest between the authors to publish this manuscript.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gopinath, M.P., Tamizharasi, G.S., Kavisankar, L. et al. A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT). Neural Comput & Applic 31 (Suppl 1), 293–308 (2019). https://doi.org/10.1007/s00521-018-3774-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-018-3774-9

Keywords

Navigation