Skip to main content
Log in

Mobile fog based secure cloud-IoT framework for enterprise multimedia security

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the dawn of computing era in the enterprise business, the methodologies for business have changed significantly. The enterprise information in the form of multimedia data is now being created and extensively shared over the internet. On the other side, the rapid and continuous growth of enterprises is causing the computing systems to evolve rapidly and continuously to match the pace of growth. This has led to the evolution of new technologies related to the enterprise environment. The advent of Internet of Things (IoT) and Cloud Computing in the enterprise environment is the result of its rapid and continuous requirement. But, their use has increased the complexity of enterprise computing systems especially in the domain of Enterprises Multimedia Security (EMS). In Cloud-IoT environment, the Enterprise Multimedia Data (EMD) stored at remote Cloud premises and subject to various kinds of vulnerabilities like data leakage, data modification and confidentiality breach. Hence, this paper proposes a distinctive EMS approach using Fog and Cloud to store different types of data and maintains their co-relation to prevent various EMD security breaches. In this paper, a Mobile Fog based Cloud-IoT framework for EMS has been designed in which only encrypted data is stored at the Cloud and its keys are securely stored at the enterprise premises on the Fog layer. It uses Advanced Encryption Standard (AES) for encryption, Message Authentication Code (MAC) for data integrity, Secure Socket Layer (SSL) for safe data transmission, tokenizer, hashing and data pointers for easy data search on Fog and Cloud. It stores the encryption/decryption and MAC keys encrypted with Master Encryption Key (MEK) securely at the enterprise premises on the Fog layer. For assured security of keys, the framework doesn’t store MEK at any place on the network. The experimental result analyses acknowledge the highest level of security, better scalability and storage management as well as searching time efficiency in the proposed framework. The overall results analysis show that the proposed framework is highly secure to protect the multimedia data of an enterprise from the inside and outside threats and access of data is provided to the authorized enterprise users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Ahmad R W, Gani A, Hamid S H A, Shiraz M, Yousafzai A, Xia F (2015) A survey on virtual machine migration and server consolidation frameworks for cloud data centers. J Netw Comput Appl 52:11–25

    Article  Google Scholar 

  2. Ahmed M, Liu L, Hardy J, Yuan B, Antonopoulos N (2016) An efficient algorithm for partially matched services in internet of services. Pers Ubiquit Comput 20(3):283–293

    Article  Google Scholar 

  3. Ardagna C A, Conti M, Leone M, Stefa J (2014) An anonymous end-to-end communication protocol for mobile cloud environments. IEEE Trans Serv Comput 7 (3):373–386

    Article  Google Scholar 

  4. Belazi A, El-Latif A A A, Diaconu A V, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50

    Article  Google Scholar 

  5. Belazi A, El-Latif A A A, Rhouma R, Belghith S (2015) Selective image encryption scheme based on dwt, aes s-box and chaotic permutation. In: 2015 International wireless communications and mobile computing conference (IWCMC), pp 606–610. IEEE

  6. Benrhouma O, Hermassi H, El-Latif A A A, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75(14):8695–8718

    Article  Google Scholar 

  7. Bi Z, Da Xu L, Wang C (2014) Internet of things for enterprise systems of modern manufacturing. IEEE Trans Indust Inf 10(2):1537–1546

    Article  Google Scholar 

  8. Chang V (2017) Towards data analysis for weather cloud computing. Knowl-Based Syst 127:29–45

    Article  Google Scholar 

  9. Chang V (2018) Data analytics and visualization for inspecting cancers and genes. Multimed Tools Appl 77(14):17,693–17,707

    Article  Google Scholar 

  10. Chang V (2018) An overview, examples, and impacts offered by emerging services and analytics in cloud computing virtual reality. Neural Comput Appl 29(5):1243–1256

    Article  Google Scholar 

  11. Chang V, Ramachandran M, Yen N N, Walters R, Wills G (2016) The second international workshop on enterprise security. In: Proceedings-IEEE 7th international conference on cloud computing technology and science, CloudCom 2015, pp xvi–xvii

  12. Dastjerdi A V, Buyya R (2016) Fog computing: Helping the internet of things realize its potential. Computer 49(8):112–116

    Article  Google Scholar 

  13. Duncan B, Whittington M, Chang V (2017) Enterprise security and privacy: Why adding iot and big data makes it so much more difficult. In: 2017 international conference on engineering and technology (ICET), pp 1–7. IEEE

  14. EL-Latif A A A, Abd-El-Atty B, Venegas-Andraca S E, Mazurczyk W (2019) Efficient quantum-based security protocols for information sharing and data protection in 5g networks. Futur Gener Comput Syst 100:893–906

    Article  Google Scholar 

  15. Fan C I, Huang S Y (2013) Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Futur Gener Comput Syst 29 (7):1716–1724

    Article  Google Scholar 

  16. for Strategic C, Studies I (2014) Net losses: Estimating the global cost of cybercrime. http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf

  17. Gad R, Talha M, El-Latif A A A, Zorkany M, Ayman E S, Nawal E F, Muhammad G (2018) Iris recognition using multi-algorithmic approaches for cognitive internet of things (ciot) framework. Futur Gener Comput Syst 89:178–191

    Article  Google Scholar 

  18. Giang N K, Blackstock M, Lea R, Leung V C (2015) Developing iot applications in the fog: A distributed dataflow approach. In: 2015 5th international conference on the internet of things (IOT), pp 155–162. IEEE

  19. Hallman R A, Li S, Chang V (2018) 2nd international workshop on multimedia privacy and security. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 2173–2174. ACM

  20. Khalil I, Khreishah A, Azeem M (2014) Consolidated identity management system for secure mobile cloud computing. Comput Netw 65:99–110

    Article  Google Scholar 

  21. Khan A N, Kiah M M, Madani S A, Ali M, Shamshirband S, et al. (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput 68(2):624–651

    Article  Google Scholar 

  22. Kshetri N (2013) Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommun Policy 37(4-5):372–386

    Article  Google Scholar 

  23. Kuo C T, Chi P W, Chang V, Lei C L (2018) Sfaas: Keeping an eye on iot fusion environment with security fusion as a service. Futur Gener Comput Syst 86:1424–1436

    Article  Google Scholar 

  24. Lee J, Hong B, Jung S, Chang V (2018) Clustering learning model of cctv image pattern for producing road hazard meteorological information. Futur Gener Comput Syst 86:1338–1350

    Article  Google Scholar 

  25. Othman M, Ali M, Khan A N, Madani S A, et al. (2014) Pirax: framework for application piracy control in mobile cloud environment. J Supercomput 68(2):753–776

    Article  Google Scholar 

  26. PricewatehouseCoopers: Turnaround and transformation in cybersecurity (2016) http://press.pwc.com/Multimedia/image/turnaround-and-transformation-in-cybersecurity/a/B174C2B4-8B52-4458-A029-0372337D54A3

  27. Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog others: A survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680–698

    Article  Google Scholar 

  28. Samanthula B K, Elmehdwi Y, Howser G, Madria S (2015) A secure data sharing and query processing framework via federation of cloud computing. Inf Syst 48:196–212

    Article  Google Scholar 

  29. Sohal A S, Sandhu R, Sood S K, Chang V (2018) A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput Secur 74:340–354

    Article  Google Scholar 

  30. Sood S K (2012) A combined approach to ensure data security in cloud computing. J Netw Comput Appl 35(6):1831–1838

    Article  Google Scholar 

  31. Sun G, Song L, Liao D, Yu H, Chang V (2019) Towards privacy preservation for “check-in” services in location-based social networks. Inform Sci 481:616–634

    Article  Google Scholar 

  32. Verma P, Sood S K (2018) Cloud-centric iot based disease diagnosis healthcare framework. J Parallel Distr Comput 116:27–38

    Article  Google Scholar 

  33. Wang H, Wu S, Chen M, Wang W (2014) Security protection between users and the mobile media cloud. IEEE Commun Mag 52(3):73–79

    Article  Google Scholar 

  34. Wang J, Kuang Q, Duan S (2015) A new online anomaly learning and detection for large-scale service of internet of thing. Pers Ubiquit Comput 19(7):1021–1031

    Article  Google Scholar 

  35. Waqar A, Raza A, Abbas H, Khan M K (2013) A framework for preservation of cloud users’ data privacy using dynamic reconstruction of metadata. J Netw Comput Appl 36(1):235–248

    Article  Google Scholar 

  36. Yang Y, Zheng X, Guo W, Liu X, Chang V (2019) Privacy-preserving smart iot-based healthcare big data storage and self-adaptive access control system. Inform Sci 479:567–592

    Article  Google Scholar 

  37. Zhang W, Tan S, Xia F, Chen X, Li Z, Lu Q, Yang S (2016) A survey on decision making for task migration in mobile cloud environments. Pers Ubiquit Comput 20(3):295–309

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sandeep Kumar Sood.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sood, S.K. Mobile fog based secure cloud-IoT framework for enterprise multimedia security. Multimed Tools Appl 79, 10717–10732 (2020). https://doi.org/10.1007/s11042-019-08573-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08573-2

Keywords

Navigation