Abstract
With the dawn of computing era in the enterprise business, the methodologies for business have changed significantly. The enterprise information in the form of multimedia data is now being created and extensively shared over the internet. On the other side, the rapid and continuous growth of enterprises is causing the computing systems to evolve rapidly and continuously to match the pace of growth. This has led to the evolution of new technologies related to the enterprise environment. The advent of Internet of Things (IoT) and Cloud Computing in the enterprise environment is the result of its rapid and continuous requirement. But, their use has increased the complexity of enterprise computing systems especially in the domain of Enterprises Multimedia Security (EMS). In Cloud-IoT environment, the Enterprise Multimedia Data (EMD) stored at remote Cloud premises and subject to various kinds of vulnerabilities like data leakage, data modification and confidentiality breach. Hence, this paper proposes a distinctive EMS approach using Fog and Cloud to store different types of data and maintains their co-relation to prevent various EMD security breaches. In this paper, a Mobile Fog based Cloud-IoT framework for EMS has been designed in which only encrypted data is stored at the Cloud and its keys are securely stored at the enterprise premises on the Fog layer. It uses Advanced Encryption Standard (AES) for encryption, Message Authentication Code (MAC) for data integrity, Secure Socket Layer (SSL) for safe data transmission, tokenizer, hashing and data pointers for easy data search on Fog and Cloud. It stores the encryption/decryption and MAC keys encrypted with Master Encryption Key (MEK) securely at the enterprise premises on the Fog layer. For assured security of keys, the framework doesn’t store MEK at any place on the network. The experimental result analyses acknowledge the highest level of security, better scalability and storage management as well as searching time efficiency in the proposed framework. The overall results analysis show that the proposed framework is highly secure to protect the multimedia data of an enterprise from the inside and outside threats and access of data is provided to the authorized enterprise users.
Similar content being viewed by others
References
Ahmad R W, Gani A, Hamid S H A, Shiraz M, Yousafzai A, Xia F (2015) A survey on virtual machine migration and server consolidation frameworks for cloud data centers. J Netw Comput Appl 52:11–25
Ahmed M, Liu L, Hardy J, Yuan B, Antonopoulos N (2016) An efficient algorithm for partially matched services in internet of services. Pers Ubiquit Comput 20(3):283–293
Ardagna C A, Conti M, Leone M, Stefa J (2014) An anonymous end-to-end communication protocol for mobile cloud environments. IEEE Trans Serv Comput 7 (3):373–386
Belazi A, El-Latif A A A, Diaconu A V, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50
Belazi A, El-Latif A A A, Rhouma R, Belghith S (2015) Selective image encryption scheme based on dwt, aes s-box and chaotic permutation. In: 2015 International wireless communications and mobile computing conference (IWCMC), pp 606–610. IEEE
Benrhouma O, Hermassi H, El-Latif A A A, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75(14):8695–8718
Bi Z, Da Xu L, Wang C (2014) Internet of things for enterprise systems of modern manufacturing. IEEE Trans Indust Inf 10(2):1537–1546
Chang V (2017) Towards data analysis for weather cloud computing. Knowl-Based Syst 127:29–45
Chang V (2018) Data analytics and visualization for inspecting cancers and genes. Multimed Tools Appl 77(14):17,693–17,707
Chang V (2018) An overview, examples, and impacts offered by emerging services and analytics in cloud computing virtual reality. Neural Comput Appl 29(5):1243–1256
Chang V, Ramachandran M, Yen N N, Walters R, Wills G (2016) The second international workshop on enterprise security. In: Proceedings-IEEE 7th international conference on cloud computing technology and science, CloudCom 2015, pp xvi–xvii
Dastjerdi A V, Buyya R (2016) Fog computing: Helping the internet of things realize its potential. Computer 49(8):112–116
Duncan B, Whittington M, Chang V (2017) Enterprise security and privacy: Why adding iot and big data makes it so much more difficult. In: 2017 international conference on engineering and technology (ICET), pp 1–7. IEEE
EL-Latif A A A, Abd-El-Atty B, Venegas-Andraca S E, Mazurczyk W (2019) Efficient quantum-based security protocols for information sharing and data protection in 5g networks. Futur Gener Comput Syst 100:893–906
Fan C I, Huang S Y (2013) Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Futur Gener Comput Syst 29 (7):1716–1724
for Strategic C, Studies I (2014) Net losses: Estimating the global cost of cybercrime. http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf
Gad R, Talha M, El-Latif A A A, Zorkany M, Ayman E S, Nawal E F, Muhammad G (2018) Iris recognition using multi-algorithmic approaches for cognitive internet of things (ciot) framework. Futur Gener Comput Syst 89:178–191
Giang N K, Blackstock M, Lea R, Leung V C (2015) Developing iot applications in the fog: A distributed dataflow approach. In: 2015 5th international conference on the internet of things (IOT), pp 155–162. IEEE
Hallman R A, Li S, Chang V (2018) 2nd international workshop on multimedia privacy and security. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 2173–2174. ACM
Khalil I, Khreishah A, Azeem M (2014) Consolidated identity management system for secure mobile cloud computing. Comput Netw 65:99–110
Khan A N, Kiah M M, Madani S A, Ali M, Shamshirband S, et al. (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput 68(2):624–651
Kshetri N (2013) Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommun Policy 37(4-5):372–386
Kuo C T, Chi P W, Chang V, Lei C L (2018) Sfaas: Keeping an eye on iot fusion environment with security fusion as a service. Futur Gener Comput Syst 86:1424–1436
Lee J, Hong B, Jung S, Chang V (2018) Clustering learning model of cctv image pattern for producing road hazard meteorological information. Futur Gener Comput Syst 86:1338–1350
Othman M, Ali M, Khan A N, Madani S A, et al. (2014) Pirax: framework for application piracy control in mobile cloud environment. J Supercomput 68(2):753–776
PricewatehouseCoopers: Turnaround and transformation in cybersecurity (2016) http://press.pwc.com/Multimedia/image/turnaround-and-transformation-in-cybersecurity/a/B174C2B4-8B52-4458-A029-0372337D54A3
Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog others: A survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680–698
Samanthula B K, Elmehdwi Y, Howser G, Madria S (2015) A secure data sharing and query processing framework via federation of cloud computing. Inf Syst 48:196–212
Sohal A S, Sandhu R, Sood S K, Chang V (2018) A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput Secur 74:340–354
Sood S K (2012) A combined approach to ensure data security in cloud computing. J Netw Comput Appl 35(6):1831–1838
Sun G, Song L, Liao D, Yu H, Chang V (2019) Towards privacy preservation for “check-in” services in location-based social networks. Inform Sci 481:616–634
Verma P, Sood S K (2018) Cloud-centric iot based disease diagnosis healthcare framework. J Parallel Distr Comput 116:27–38
Wang H, Wu S, Chen M, Wang W (2014) Security protection between users and the mobile media cloud. IEEE Commun Mag 52(3):73–79
Wang J, Kuang Q, Duan S (2015) A new online anomaly learning and detection for large-scale service of internet of thing. Pers Ubiquit Comput 19(7):1021–1031
Waqar A, Raza A, Abbas H, Khan M K (2013) A framework for preservation of cloud users’ data privacy using dynamic reconstruction of metadata. J Netw Comput Appl 36(1):235–248
Yang Y, Zheng X, Guo W, Liu X, Chang V (2019) Privacy-preserving smart iot-based healthcare big data storage and self-adaptive access control system. Inform Sci 479:567–592
Zhang W, Tan S, Xia F, Chen X, Li Z, Lu Q, Yang S (2016) A survey on decision making for task migration in mobile cloud environments. Pers Ubiquit Comput 20(3):295–309
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sood, S.K. Mobile fog based secure cloud-IoT framework for enterprise multimedia security. Multimed Tools Appl 79, 10717–10732 (2020). https://doi.org/10.1007/s11042-019-08573-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08573-2