Abstract
In IoT environment, any object which is equipped with senor node and other electronic devices can involve in the communication over wireless network which resulted in need for the hefty amount of sensed data to be preprocessed effectively before storing. Subsequently, sensed data in the form of images are to be directed to the cloud storage system over wireless medium, it suffered from image hijacking in which data in the image would be manipulated so this leads to insecure transmission. To mitigate this problem, two levels learning in assist with dual offbeat shielding design have been proposed. In principal level of learning relied on memory retaining which preprocess the sensed image by utilizing past history for extracting optimal features of an input images subsequently preprocessed image would be subjected to dual offbeat shielding includes crypto based steganography using Chen chaotic system combined with PVD. Ultimately, secured image would be tested with the learned optimal features using an improved neural network by this way the proposed system have rendered protected cloud storage in IoT.
Similar content being viewed by others
References
El-Latif, A. A. A., Abd-El-Atty, B., Hossain, M. S., Elmougy, S., & Ghoneim, A. (2018). Secure quantum steganography protocol for fog cloud Internet of Things. IEEE Access, 6, 10332–10340.
Luong, N. C., Hoang, D. T., Wang, P., Niyato, D., Kim, D. I., & Han, Z. (2016). Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey. IEEE Communications Surveys and Tutorials, 18(4), 2546–2590.
Li, P., Chen, Z., Yang, L. T., Zhang, Q., & Deen, M. J. (2018). Deep convolutional computation model for feature learning on big data in internet of things. IEEE Transactions on Industrial Informatics, 14(2), 790–798.
Gao, J., Li, J., Cai, Z., et al. (2015). Composite event coverage in wireless sensor networks with heterogeneous sensors. In Proceedings of 2015 IEEE conference on computer communications (INFOCOM) (pp. 217–225).
Zhang, Q., Zhu, C., Yang, L. T., Chen, Z., Zhao, L., & Li, P. (2017). An incremental CFS algorithm for clustering large data in industrial Internet of Things. IEEE Transactions on Industrial Informatics, 13(3), 1193–1201.
Singh, P., Agarwal, N., & Raman, B. (2016). Don’t see me, just filter me: Towards secure cloud based filtering using Shamir’s secret sharing and pob number system. In Proceedings of the tenth Indian conference on computer vision, graphics and image processing (p. 12). ACM.
Singh, P., Raman, B., & Misra, M. (2017). Just process me, without knowing me: A secure encrypted domain processing based on Shamir secret sharing and pob number system. Multimedia Tools and Applications, 77, 1–25.
Atee, H. A., Ahmad, R., Noor, N. M., Rahma, A. M. S., & Aljeroudi, Y. (2017). Extreme learning machine based optimal embedding location finder for image steganography. PLoS ONE, 12(2), e0170329.
Patel, K., & Utareja, S. (2013). Information hiding using least significant bit steganography and blowfish algorithm. International Journal of Computer Applications (IJCA), 63(13), 24–28.
Sumathi, C. P., Santanam, T., & Umamaheswari, G. (2014). A study of various steganographic techniques used for information hiding. arXiv preprint arXiv:1401.5561.
Fadele, A. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of things Security: A Survey. Journal of Network and Computer Applications, 88, 10–28.
Jung, K.-H. (2018). Authenticable reversible data hiding scheme with less distortion in dual stego-images. Multimedia Tools and Applications, 77(5), 6225–6241.
Jung, K.-H. (2018). Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane. Journal of Real-Time Image Processing, 14(1), 127–136.
LeCun, Y., Bengio, Y., & Hiton, G. (2015). Deep learning. Nature, 521(7553), 436–444.
Liu, M., Shi, J., Li, Z., Li, C., Zhu, J., & Liu, S. (2017). Towards better analysis of deep convolutional neural networks. IEEE Transactions on Visualization and Computer Graphics, 23(1), 91–100.
Wu, X., Zhu, X., Wu, G. Q., & Ding, W. (2014). Data mining with big data. IEEE Transactions on Knowledge and Data Engineering, 26(1), 97–107.
Schmidhuber, J. (2015). Deep learning in neural networks: An overview. Neural Networks, 61, 85–117.
Ngiam, J., Khosla, A., Kim, M., Nam, J., Lee, H., & Ng, A. Y. (2011). Multimodal deep learning. In Proceedings of the 28th international conference on machine learning (pp. 689–696).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Siva Raja, P.M., Baburaj, E. Protected Cloud Storage in IoT Using Two Level Learning in Assist with Dual Offbeat Shielding Design. Wireless Pers Commun 108, 437–460 (2019). https://doi.org/10.1007/s11277-019-06410-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06410-1