Skip to main content
Log in

Protected Cloud Storage in IoT Using Two Level Learning in Assist with Dual Offbeat Shielding Design

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In IoT environment, any object which is equipped with senor node and other electronic devices can involve in the communication over wireless network which resulted in need for the hefty amount of sensed data to be preprocessed effectively before storing. Subsequently, sensed data in the form of images are to be directed to the cloud storage system over wireless medium, it suffered from image hijacking in which data in the image would be manipulated so this leads to insecure transmission. To mitigate this problem, two levels learning in assist with dual offbeat shielding design have been proposed. In principal level of learning relied on memory retaining which preprocess the sensed image by utilizing past history for extracting optimal features of an input images subsequently preprocessed image would be subjected to dual offbeat shielding includes crypto based steganography using Chen chaotic system combined with PVD. Ultimately, secured image would be tested with the learned optimal features using an improved neural network by this way the proposed system have rendered protected cloud storage in IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. El-Latif, A. A. A., Abd-El-Atty, B., Hossain, M. S., Elmougy, S., & Ghoneim, A. (2018). Secure quantum steganography protocol for fog cloud Internet of Things. IEEE Access, 6, 10332–10340.

    Article  Google Scholar 

  2. Luong, N. C., Hoang, D. T., Wang, P., Niyato, D., Kim, D. I., & Han, Z. (2016). Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey. IEEE Communications Surveys and Tutorials, 18(4), 2546–2590.

    Article  Google Scholar 

  3. Li, P., Chen, Z., Yang, L. T., Zhang, Q., & Deen, M. J. (2018). Deep convolutional computation model for feature learning on big data in internet of things. IEEE Transactions on Industrial Informatics, 14(2), 790–798.

    Article  Google Scholar 

  4. Gao, J., Li, J., Cai, Z., et al. (2015). Composite event coverage in wireless sensor networks with heterogeneous sensors. In Proceedings of 2015 IEEE conference on computer communications (INFOCOM) (pp. 217–225).

  5. Zhang, Q., Zhu, C., Yang, L. T., Chen, Z., Zhao, L., & Li, P. (2017). An incremental CFS algorithm for clustering large data in industrial Internet of Things. IEEE Transactions on Industrial Informatics, 13(3), 1193–1201.

    Article  Google Scholar 

  6. Singh, P., Agarwal, N., & Raman, B. (2016). Don’t see me, just filter me: Towards secure cloud based filtering using Shamir’s secret sharing and pob number system. In Proceedings of the tenth Indian conference on computer vision, graphics and image processing (p. 12). ACM.

  7. Singh, P., Raman, B., & Misra, M. (2017). Just process me, without knowing me: A secure encrypted domain processing based on Shamir secret sharing and pob number system. Multimedia Tools and Applications, 77, 1–25.

    Google Scholar 

  8. Atee, H. A., Ahmad, R., Noor, N. M., Rahma, A. M. S., & Aljeroudi, Y. (2017). Extreme learning machine based optimal embedding location finder for image steganography. PLoS ONE, 12(2), e0170329.

    Article  Google Scholar 

  9. Patel, K., & Utareja, S. (2013). Information hiding using least significant bit steganography and blowfish algorithm. International Journal of Computer Applications (IJCA), 63(13), 24–28.

    Article  Google Scholar 

  10. Sumathi, C. P., Santanam, T., & Umamaheswari, G. (2014). A study of various steganographic techniques used for information hiding. arXiv preprint arXiv:1401.5561.

  11. Fadele, A. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of things Security: A Survey. Journal of Network and Computer Applications, 88, 10–28.

    Article  Google Scholar 

  12. Jung, K.-H. (2018). Authenticable reversible data hiding scheme with less distortion in dual stego-images. Multimedia Tools and Applications, 77(5), 6225–6241.

    Article  Google Scholar 

  13. Jung, K.-H. (2018). Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane. Journal of Real-Time Image Processing, 14(1), 127–136.

    Article  Google Scholar 

  14. LeCun, Y., Bengio, Y., & Hiton, G. (2015). Deep learning. Nature, 521(7553), 436–444.

    Article  Google Scholar 

  15. Liu, M., Shi, J., Li, Z., Li, C., Zhu, J., & Liu, S. (2017). Towards better analysis of deep convolutional neural networks. IEEE Transactions on Visualization and Computer Graphics, 23(1), 91–100.

    Article  Google Scholar 

  16. Wu, X., Zhu, X., Wu, G. Q., & Ding, W. (2014). Data mining with big data. IEEE Transactions on Knowledge and Data Engineering, 26(1), 97–107.

    Article  Google Scholar 

  17. Schmidhuber, J. (2015). Deep learning in neural networks: An overview. Neural Networks, 61, 85–117.

    Article  Google Scholar 

  18. Ngiam, J., Khosla, A., Kim, M., Nam, J., Lee, H., & Ng, A. Y. (2011). Multimodal deep learning. In Proceedings of the 28th international conference on machine learning (pp. 689–696).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. M. Siva Raja.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Siva Raja, P.M., Baburaj, E. Protected Cloud Storage in IoT Using Two Level Learning in Assist with Dual Offbeat Shielding Design. Wireless Pers Commun 108, 437–460 (2019). https://doi.org/10.1007/s11277-019-06410-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06410-1

Keywords

Navigation