Skip to main content
Log in

Trust management for internet of things using cloud computing and security in smart cities

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Many consumers participate in the smart city via smart portable gadgets such as wearables, personal gadgets, mobile devices, or sensor systems. In the edge computation systems of IoT in the smart city, the fundamental difficulty of the sensor is to pick reliable participants. Since not all smart IoT gadgets are dedicated, certain intelligent IoT gadgets might destroy the networks or services deliberately and degrade the customer experience. A trust-based internet of things (TM-IoT) cloud computing method is proposed in this research. The problem is solved by choosing trustworthy partners to enhance the quality services of the IoT edging network in the Smart architectures. A smart device choice recommendation method based on the changing networks was developed. It applied the evolutionary concept of games to examine the reliability and durability of the technique of trust management presented in this article. The reliability and durability of the trustworthiness-managing system, the Lyapunov concept was applied.A real scenario for personal-health-control systems and air-qualitymonitoring and assessment in a smart city setting confirmed the efficiency of the confidence-management mechanism. Experiments have demonstrated that the methodology for trust administration suggested in this research plays a major part in promoting multi-intelligent gadget collaboration in the IoT edge computer system with an efficiency of 97%. It resists harmful threads against service suppliers more consistently and is ideal for the smart world's massive IoT edge computer system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Nguyen, N.T., Liu, B.H., Pham, V.T., Luo, Y.S.: On maximizing the lifetime for data aggregation in wireless sensor networks using virtual data aggregation trees. Comput. Netw. 105, 99–110 (2016)

    Article  Google Scholar 

  2. Shakeel, P.M., Baskar, S., Fouad, H., Manogaran, G., Saravanan, V., Xin, Q.: Creating collision-free communication in IoT with 6G using multiple machine access learning collision avoidance protocol. Mobile Netw. Appl. 26, 1–12 (2020)

    Google Scholar 

  3. Gao, J., Wang, H., Shen, H.: Task failure prediction in cloud data centers using deep learning. IEEE Trans. Serv. Comput. (2020). https://doi.org/10.1109/TSC.2020.2993728

    Article  Google Scholar 

  4. Hu, L., Nguyen, N.T., Tao, W., Leu, M.C., Liu, X.F., Shahriar, M.R., Al Sunny, S.N.: Modeling of cloud-based digital twins for smart manufacturing with MT connect. Procedia Manuf. 26, 1193–1203 (2018)

    Article  Google Scholar 

  5. Billah, M. F. R. M., Saoda, N., Gao, J., & Campbell, B. (2021). BLE can see: a reinforcement learning approach for RF-based indoor occupancy detection. In: Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021) (pp. 132–147)

  6. Jegadeesan, S., Azees, M., Kumar, P.M., Manogaran, G., Chilamkurti, N., Varatharajan, R., Hsu, C.H.: An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications. Sustain. Cities Soc. 49, 101522 (2019)

    Article  Google Scholar 

  7. Manogaran, G., Baabdullah, T., Rawat, D.B., Shakeel, P.M.: AI assisted service virtualization and flow management framework for 6G-enabled cloud-software-defined network based IoT. IEEE Internet Things J (2021). https://doi.org/10.1109/JIOT.2021.3077895

    Article  Google Scholar 

  8. Namasudra, S., Chakraborty, R., Kadry, S., Manogaran, G., Rawal, B.S.: FAST: fast accessing scheme for data transmission in cloud computing. Peer-to-Peer Netw. Appl. 14, 1–13 (2020)

    Google Scholar 

  9. Kurdi, H., Alfaries, A., Al-Anazi, A., Alkharji, S., Addegaither, M., Altoaimy, L., Ahmed, S.H.: A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments. J. Supercomput. 75(7), 3534–3554 (2019)

    Article  Google Scholar 

  10. Elhoseny, M., Abdelaziz, A., Salama, A.S., Riad, A.M., Muhammad, K., Sangaiah, A.K.: A hybrid model of Internet of things and cloud computing to manage big data in health services applications. Future Gener. Comput. Syst. 86, 1383–1394 (2018)

    Article  Google Scholar 

  11. Manogaran, G., Srivastava, G., Muthu, B.A., Baskar, S., Shakeel, P.M., Hsu, C.H., Kumar, P.M.: A response-aware traffic offloading scheme using regression machine learning for user-centric large-scale internet of things. IEEE Internet Things J. 8, 3360 (2020)

    Article  Google Scholar 

  12. Gomathi, P., Baskar, S., Shakeel, P.M.: Concurrent service access and management framework for user-centric future internet of things in smart cities. Complex Intell. Syst. (2020). https://doi.org/10.1007/s40747-020-00160-5

    Article  Google Scholar 

  13. Braun, T., Fung, B.C., Iqbal, F., Shah, B.: Security and privacy challenges in smart cities. Sustain. Cities Soc. 39, 499–507 (2018)

    Article  Google Scholar 

  14. Xie, Q., Hwang, L.: Security enhancement of an anonymous roaming authentication scheme with two-factor security in a smart city. Neurocomputing 347, 131–138 (2019)

    Article  Google Scholar 

  15. Parasol, M.: China’s 2016 cyber security law on foreign technology firms and China’s big data and smart city dreams. Comput. Law Secur. Rev. 34(1), 67–98 (2018)

    Article  Google Scholar 

  16. Zhu, N., Zhao, H.: IoT applications in the ecological industry chain from information security and smart city perspectives. Comput. Electr. Eng. 65, 34–43 (2018)

    Article  Google Scholar 

  17. Xu, B., Huang, D., Mi, B.: Smart city-based e-commerce security technology with the improvement of SET network protocol. Comput. Commun. 154, 66–74 (2020)

    Article  Google Scholar 

  18. Yu, H., Yang, Z., Sinnott, R.O.: Decentralized big data auditing for smart city environments leveraging blockchain technology. IEEE Access 7, 6288–6296 (2018)

    Article  Google Scholar 

  19. Gope, P., Amin, R., Islam, S.H., Kumar, N., Bhalla, V.K.: Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for the smart city environment. Future Gener. Comput. Syst. 83, 629–637 (2018)

    Article  Google Scholar 

  20. Peneti, S., Kumar, M.S., Kallam, S., Patan, R., Bhaskar, V., Ramachandran, M.: BDN-GWMNN: internet of things (IoT) enabled secure smart city applications. Wirel. Personal Commun. 2021, 1–17 (2021)

    Google Scholar 

  21. Chen, J., Ramanathan, L., Alazab, M.: Holistic, big data integrated artificial intelligent modeling to improve privacy and security in data management of smart cities. Microprocess. Microsyst. 81, 103722 (2021)

    Article  Google Scholar 

  22. Kitchin, R., Dodge, M.: The (in) security of smart cities: Vulnerabilities, risks, mitigation, and prevention. J. Urban Technol. 26(2), 47–65 (2019)

    Article  Google Scholar 

  23. Ullah, F., Qayyum, S., Thaheem, M.J., Al-Turjman, F., Sepasgozar, S.M.: Risk management in sustainable smart cities governance: a TOE framework. Technol. Forecast. Soc. Change 167, 120743 (2021)

    Article  Google Scholar 

  24. Strielkowski, W., Veinbender, T., Tvaronavičienė, M., Lace, N.: Economic efficiency and energy security of smart cities. Econ. Res. EkonomskIstraživanja 33(1), 788–803 (2020)

    Google Scholar 

  25. Fang, L., Zhang, H., Li, M., Ge, C., Liu, L., Liu, Z.: A secure and fine-grained scheme for data security in industrial IoT platforms for smart city. IEEE Internet Things J. 7(9), 7982–7990 (2020)

    Article  Google Scholar 

  26. Manogaran, G., Rawal, B.S., Saravanan, V., Kumar, P.M., Martínez, O.S., Crespo, R.G., et al.: Blockchain based integrated security measure for reliable service delegation in 6G communication environment. Comput. Commun. 161, 248–256 (2020)

    Article  Google Scholar 

  27. Manogaran, G., Alazab, M., Saravanan, V., Rawal, B.S., Shakeel, P.M., Sundarasekar, R., et al.: Machine learning assisted information management scheme in service concentrated Iot. IEEE Trans. Ind. inform. 17(4), 2871–2879 (2020)

    Article  Google Scholar 

  28. Shakeel, P.M., Baskar, S., Fouad, H., Manogaran, G., Saravanan, V., Montenegro-Marin, C.E.: Internet of things forensic data analysis using machine learning to identify roots of data scavenging. Fut. Gener. Comput. Syst. 115, 756–768 (2021)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

Conception and design of study: MA. Acquisition of data: GM. Analysis and/or interpretation of data: CEMM.

Corresponding author

Correspondence to Gunasekaran Manogaran.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Research involving human and animal participants

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alazab, M., Manogaran, G. & Montenegro-Marin, C.E. Trust management for internet of things using cloud computing and security in smart cities. Cluster Comput 25, 1765–1777 (2022). https://doi.org/10.1007/s10586-021-03427-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-021-03427-9

Keywords

Navigation