Abstract
Internet of underwater things (IoUT) is an emerging technique with widespread applications. In such type of systems, efficient and secure use of network resources remains to be a greater challenge. This is due to the reason that it works on the basis of a network of smart interconnected objects. This creates the necessity for energy-aware and secure communication techniques across IoUT environment. In order to solve this issue, in this paper, a secure cloud-based solution for real-time monitoring and management of IoUT across smart cities is provided. The proposed system mainly focuses on secure data transmission with lesser energy requirements. This makes smart cities to go green and efficient. The major contribution of the proposed system is divided into two parts: First, an energy-aware efficient framework for IoUT system is defined. Next, we define an enhanced attribute-based encryption scheme with effective user attribute management for secure data transmission across IoUT systems. The simulations are performed, and the results state that the proposed approach provides better security and privacy measures than the existing system. In future, this work could be extended to deal with increasing amount of complexity measures with increased user attributes.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32
Domingo MC (2012) An overview of the internet of underwater things. J Netw Comput Appl 35(6):1879–1890
Kao C-C, Lin Y-S, Geng-De W, Huang C-J (2017) A comprehensive study on the internet of underwater things: applications, challenges, and channel models. Sensors 17(7):1477
Abdillah AF, Berlian MH, Panduman YYF, Akbar MAW, Afifah MA, Tjahjono A, Sukaridhoto S, Sasaki S (2017) Design and development of low cost coral monitoring system for shallow water based on internet of underwater things. J Telecommun Electron Comput Eng 9(2–5):97–101
Zhou Z, Yao B, Xing R, Shu L, Shengrong B (2015) E-carp: an energy efficient routing protocol for uwsns in the internet of underwater things. IEEE Sens J 16(11):4072–4082
Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164
Kao C-C, Lin Y-S, Wu G-D, Huang C-J (2017) A study of applications, challenges, and channel models on the internet of underwater things. In: 2017 international conference on applied system innovation (ICASI). IEEE, pp 1375–1378
Urunov K, Namgung J-I, Park S-H (2015) Security challenges of DTN mechanism for IoUT. Int J Inf Electron Eng 5(5):330
Younis YA, Kifayat K, Merabti M (2014) An access control model for cloud computing. J Inf Secur Appl 19(1):45–60
Cheng Y, Park J, Sandhu R (2016) An access control model for online social networks using user-to-user relationships. IEEE Trans Dependable Secure Comput 13(4):424–436
Dittrich KR, Härtig M, Pfefferle H (1988) Discretionary access control in structurally object-oriented database systems. In: DBSec, pp 105–121
Ahn G-J (2009) Discretionary access control. In: Liu L, Özsu MT (eds) Encyclopedia of database systems. Springer, New York, pp 864–866
Ninghui Li (2011) Discretionary access control. In: Van Tilborg HC, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, New York, pp 353–356
Downs DD, Rub JR, Kung KC, Jordan CS (1985) Issues in discretionary access control. In: IEEE symposium on security and privacy, 1985. IEEE, pp 208–208
Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE Commun Mag 32(9):40–48
Lindqvist H (2006) Mandatory access control. Master’s thesis in computing science, Umea University, Department of Computing Science, SE-901, p 87
La Padula LJ (1990) Formal modeling in a generalized framework for access control. In: Computer security foundations workshop III, 1990. Proceedings. IEEE, pp 100–109
Upadhyaya S (2011) Mandatory access control. In: Encyclopedia of cryptography and security. Springer, Boston, pp 756–758
Thuraisingham B (2009) Mandatory access control. In: Liu L, Özsu MT (eds) Encyclopedia of database systems. Springer, New York, pp 1684–1685
Thompson TJ, James HH II, Durant WR (2013) Hierarchy-aware role-based access control, March 19. US Patent 8,402,514
Zhou L, Varadharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans Inf Forensics Secur 8(12):1947–1960
Uzun E, Atluri V, Vaidya J, Sural S, Ferrara AL, Parlato G, Madhusudan P (2014) Security analysis for temporal role based access control. J Comput Secur 22(6):961–996
Ranise S, Truong A, Armando A (2014) Scalable and precise automated analysis of administrative temporal role-based access control. In: Proceedings of the 19th ACM symposium on access control models and technologies. ACM, pp 103–114
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89–98
Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 195–203
Melissa C (2007) Multi-authority attribute based encryption. In: Theory of cryptography conference. Springer, pp 515–534
Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743–754
Guojun W, Qin L, Jie W, Minyi G (2011) Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput Secur 30(5):320–331
Chase M, Chow SSM (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM conference on Computer and communications security. ACM, pp 21–130
Ahmed E, Yaqoob I, Hashem IAT, Khan I, Ahmed AIA, Imran M, Vasilakos AV (2017) The role of big data analytics in internet of things. Comput Netw 129:459–471
Lin H, Cao Z, Liang X, Shao J (2010) Secure threshold multi authority attribute based encryption without a central authority. Inf Sci 180(13):2618–2632
Li J, Huang Q, Chen X, Chow SSM, Wong DS, Xie D (2011) Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM symposium on information, computer and communications security. ACM, pp 386–390
Li M, Shucheng Y, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143
Rouselakis Y, Waters B (2015) Efficient statically-secure large-universe multi-authority attribute-based encryption. In: International conference on financial cryptography and data security. Springer, pp 315–332
Yang K, Jia X (2014) DAC-MACS: effective data access control for multi-authority cloud storage systems. In: Yang K, Jia X (eds) Security for cloud storage systems. Springer, Berlin, pp 59–83
Wang C, Luo J (2013) An efficient key-policy attribute-based encryption scheme with constant ciphertext length. Math Probl Eng 2013. https://doi.org/10.1155/2013/810969
Attrapadung N, Libert B, De Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: International workshop on public key cryptography. Springer, Berlin, Heidelberg, pp 90–108
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, 2007. SP’07. IEEE, pp 321–334
Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International workshop on public key cryptography. Springer, pp 53–70
Liang KFL, Susilo W, Wong DS (2013) A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. In: 5th international conference on intelligent networking and collaborative systems (INCoS), 2013. IEEE, pp 552–559
Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput 64(1):126–138
Liu L, Lai J, Deng RH, Li Y (2016) Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Secur Commun Netw 9:4897–4913
Jiang Y, Susilo W, Mu Y, Guo F (2017) Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener Comput Syst 78:720–729
Li L, Tianlong G, Chang L, Zhoubo X, Liu Y, Qian J (2017) A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram. IEEE Access 5:1137–1145
Roy S, Chuah M (2009) Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical report, Citeseer
Xu J, Wen Q, Li W, Shen J, He D (2017) Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. Soft Comput 21(18):5265–5279
Chow SSM (2016) A framework of multi-authority attribute-based encryption with outsourcing and revocation. In: Proceedings of the 21st ACM on symposium on access control models and technologies. ACM, pp 215–226
Zhong H, Zhu W, Xu Y, Cui J (2018) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22(1):243–251
Yan H, Li J, Li X, Zhao G, Lee S-Y, Shen J (2016) Secure access control of e-health system with attribute-based encryption. Intell Autom Soft Comput 22(3):345–352
Liu Y, Zhang Y, Ling J, Liu Z (2017) Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Future Gener Comput Syst 78:1020–1026
Prathyusha D, Murty MS (2016) Access control mechanism on e-health care cloud data storage. Int J Res 3(4):83–89
Pescosolido L, Berta R, Scalise L, Revel GM, De Gloria A, Orlandi G (2016) An IOT-inspired cloud-based web service architecture for e-health applications. In: 2016 IEEE international smart cities conference (ISC2). IEEE, pp 1–4
Liou E-C, Kao C-C, Chang C-H, Lin Y-S, Huang C-J (2018) Internet of underwater things: challenges and routing protocols. In: 2018 IEEE international conference on applied system invention (ICASI). IEEE, pp 1171–1174
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
There is no conflict of interest between the authors to publish this manuscript.
Rights and permissions
About this article
Cite this article
Gopinath, M.P., Tamizharasi, G.S., Kavisankar, L. et al. A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT). Neural Comput & Applic 31 (Suppl 1), 293–308 (2019). https://doi.org/10.1007/s00521-018-3774-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-018-3774-9