Skip to main content
Log in

Internet of Things Big Data Security in Cloud via Stream Cipher and Clustering Model

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Big Data in IoT and Cloud Computing are two important developments over the years, enabling companies to provide efficient and effective IT services. To ensure the security of the information being processed, the information is usually stored within a year in a secure database. However, Encrypted Data Cloud introduces new duplication problems, which are important for storing large data. The proposed methodology consists of three segments that are Mapreduce framework, security, and authentication. Initially, the input dataset is mapped into multiple groups to minimize the volume of big data to maintain a strategic distance from scalability issues. To enhance the performance of SCA, the key values are optimally selected with the help of orthogonal learning particle swarm optimization (OLPSO) algorithm is utilized. After encryption process, the data are stored in cloud. In authentication phase, attribute-based access control mechanism is utilized. The proposed methodology performance is analyzed in terms of different metrics and performance is compared with different algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Availability of data and material

I have no availability statement.

References

  1. Li, X., Wang, Q., Lan, X., Chen, X., Zhang, N., & Chen, D. (2019). Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach. IEEE Access, 7, 9368–9383.

    Article  Google Scholar 

  2. Reddy, Y. (2018). Big Data Security in Cloud Environment. In 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS).

  3. Khare, S., & Totaro, M. (2019). Big Data in IoT. In 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

  4. Chandu, Y., Kumar, K.S.R., Prabhukhanolkar, N.V, Anish, A.N., & Rawal, S. (2017). Design and implementation of hybrid encryption for security of IOT data. In 2017 International Conference on Smart Technologies for Smart Nation (SmartTechCon).

  5. Chaudhari, N., & Srivastava, S. (2016). Big data security issues and challenges. In 2016 International Conference on Computing, Communication and Automation (ICCCA).

  6. Malik, V., & Singh, S. (2019). Cloud, Big Data and IoT: Risk Management. In 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon).

  7. Kagita, M.K. (2019). Security and Privacy Issues for Business Intelligence in IoT. Advances in Biochemical Engineering/Biotechnology, 1038–1049.

  8. Bera, A., Kundu, A., De Sarkar, N.R., & De Mou. (2016). Experimental Analysis on Big Data in IOT-Based Architecture. Advances in Intelligent Systems and Computing, 1–9.

  9. Ari, A.A.A., Ngangmo, O.K., Titouna, C., Thiare, O., Kolyang, Mohamadou, A., &Gueroui, A.M. (2019). Enabling Privacy and Security in Cloud of Things: architecture, applications, security & privacy challenges. Applied Computing and Informatics.

  10. HaddadPajouh, H., & Parizi, R. (2019). A survey on internet of things security: Requirements, challenges, and solutions. Internet of Things, 14, 100129.

    Article  Google Scholar 

  11. Bittencourt, L., Immich, R., Sakellariou, R., Fonseca, N., Madeira, E., Curado, M., & Rana, O. (2018). The internet of things, fog and cloud continuum: Integration and challenges. Internet of Things, 3, 137–155.

    Google Scholar 

  12. Khattak, H. A., Shah, M. A., Khan, S., Ali, I., & Imran, M. (2019). Perception layer security in internet of things. Future Generation Computer Systems., 100, 144–164.

    Article  Google Scholar 

  13. Shadroo, S., & Rahmani, A. M. (2018). Systematic survey of big data and data mining in internet of things. Computer Networks, 139, 19–47.

    Article  Google Scholar 

  14. Banerjee, M., Lee, J., & Choo, K.-K.R. (2018). A blockchain future for internet of things security: A position paper. Digital Communications and Networks, 4(3), 149–160.

    Article  Google Scholar 

  15. Lalitha, V. P., Sagar, M. Y., Sharanappa, S., Hanji, S., &Swarup, R. (2017). Data security in cloud. In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).

  16. Su, C. (2019). Big Data Security and Privacy Protection. In 2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS).

  17. Damayanti, F.R., Elmizan, K.A., Alfredo, Y.F., Aaam, Z.N., & Wibowo, A. (2018). Big Data Security Approach in Cloud: Review. In 2018 International Conference on Information Management and Technology (ICIMTech).

  18. Kong, F., Zhou, Y., Xia, B., Pan, L., & Zhu, L. (2019). A security reputation model for IoT health data using S-AlexNet and dynamic game theory in cloud computing environment. IEEE Access, 7, 161822–161830.

    Article  Google Scholar 

  19. Amanullah, M. A., Habeeb, R. A. A., Nasaruddin, F. H., Gani, A., Ahmed, E., Nainar, A. S. M., & Imran, M. (2020). Deep learning and big data technologies for IoT security. Computer Communications, 151, 495–517.

    Article  Google Scholar 

  20. Stergiou, C., Psannis, K. E., Gupta, B. B., & Ishibashi, Y. (2018). Security, privacy & efficiency of sustainable cloud computing for big data & IoT. Sustainable Computing: Informatics and Systems, 19, 174–184.

    Google Scholar 

  21. Sollins, K. R. (2019). IoT big data security and privacy vs innovation. IEEE Internet of Things Journal, 6(2), 1628–1635.

    Article  Google Scholar 

  22. Cui, H. (2016). Research on the model of big data serve security in cloud environment. In 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI).

  23. Gao, F. (2017). Research on Cloud Security Control Mechanism Based on Big Data. In 2017 International Conference on Smart Grid and Electrical Automation (ICSGEA).

  24. Ahmed, E., Yaqoob, I., Hashem, I. A. T., Khan, I., Ahmed, A. I. A., Imran, M., & Vasilakos, A. V. (2017). The role of big data analytics in internet of things. Computer Networks, 129, 459–471.

    Article  Google Scholar 

  25. Ge, M., Bangui, H., & Buhnova, B. (2018). Big data for internet of things: A survey. Future Generation Computer Systems, 87, 601–614.

    Article  Google Scholar 

Download references

Funding

I have no funding.

Author information

Authors and Affiliations

Authors

Contributions

I have no author contribution.

Corresponding author

Correspondence to K. S. Saraswathy.

Ethics declarations

Conflict of interest

I have no declaration of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saraswathy, K.S., Sujatha, S.S. Internet of Things Big Data Security in Cloud via Stream Cipher and Clustering Model. Wireless Pers Commun 123, 3483–3496 (2022). https://doi.org/10.1007/s11277-021-09299-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09299-x

Keywords

Navigation