An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Document Type : Original Article

Authors

1 School of Mathematics and Computer Science, Damghan University, Damghan, Iran

2 School of Engineering, Damghan University, Damghan, Iran

Abstract

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in IoTs by the use of -threshold secret sharing scheme in the cloud storage. In this method, original data is divided into blocks that each block is considered as a share. The edge server does not send these shares (blocks) directly (through the secure channel) to cloud service providers ( s). Rather, the edge server hides the shares (blocks) with XORing two secret values and publishes the result. Indeed, with this method, none of s has an amount of block information.This scheme is also verifiable, i.e., in the verification phase, each  can verify its quasi-share. Moreover, before data retrieval, the edge server checks the correctness of provided quasi-share from s of an authorized group. Also, the proposed scheme is scalable, since new data can be inserted or part of the original data can be deleted, without changing shares. It is worth noting that the proposed scheme is more efficient compared with the other scheme since heavy and complex computation is not required.

Keywords


 
1. Ashton, K., "That ‘internet of things’ thing", RFID Journal,  Vol.
22, No. 7, (2009), 97-114. 
2. Belkeziz, R. and Jarir, Z., "A survey on internet of things
coordination", in International Conference on Systems of
Collaboration., (2016), 1-6. 
3. Darshan, K. and Anandakumar, K., "A comprehensive review on
usage of internet of things (iot) in healthcare system", in 2015
International Conference on Emerging Research in Electronics,
Computer Science and Technology (ICERECT), IEEE., (2015),
132-136. 
4. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H. and Zhao, W., "A
survey on internet of things: Architecture, enabling technologies,
security and privacy, and applications", IEEE Internet of Things
Journal,  Vol. 4, No. 5, (2017), 1125-1142. 
5. Miraz, M.H., Ali, M., Excell, P.S. and Picking, R., "A review on
internet of things (iot), internet of everything (ioe) and internet of
nano things (iont)", in 2015 Internet Technologies and
Applications (ITA), IEEE., (2015), 219-224. 
6. Samuel, S.S.I., "A review of connectivity challenges in iot-smart
home", in 2016 3rd MEC International conference on big data and
smart city (ICBDSC), IEEE. Vol., No. Issue, (2016), 1-4. 
7. Suresh, P., Daniel, J.V., Parthasarathy, V. and Aswathy, R., "A
state of the art review on the internet of things (iot) history,
technology and fields of deployment", in 2014 International
conference on science engineering and management research
(ICSEMR), IEEE., (2014), 1-8. 
8. Tayeb, S., Latifi, S. and Kim, Y., "A survey on iot communication
and computation frameworks: An industrial perspective", in 2017  
IEEE 7th Annual Computing and Communication Workshop
and Conference (CCWC), IEEE., (2017), 1-6. 
9. Andrea, I., Chrysostomou, C. and Hadjichristofi, G., "Internet of
things: Security vulnerabilities and challenges", in 2015 IEEE
Symposium on Computers and Communication (ISCC), IEEE.,
(2015), 180-187. 
10. Botta, A., De Donato, W., Persico, V. and Pescapé, A., "On the
integration of cloud computing and internet of things", in 2014
International Conference on Future Internet of Things and Cloud,
IEEE., (2014), 23-30. 
11. Wei, W., Yang, A.T. and Shi, W., "Security in internet of things:
Opportunities and challenges", in 2016 International Conference
on Identification, Information and Knowledge in the Internet of
Things (IIKI), IEEE., (2016), 512-518. 
12. Roman, R., Zhou, J. and Lopez, J., "On the features and
challenges of security and privacy in distributed internet of
things", Computer Networks,  Vol. 57, No. 10, (2013), 22662279.
13. Mollah, M.B., Azad, M.A.K. and Vasilakos, A., "Secure data
sharing and searching at the edge of cloud-assisted internet of
things", IEEE Cloud Computing,  Vol. 4, No. 1, (2017), 34-42. 
14. Jiang, H., Shen, F., Chen, S., Li, K.-C. and Jeong, Y.-S., "A secure
and scalable storage system for aggregate data in iot", Future
Generation Computer Systems,  Vol. 49, (2015), 133-141. 
15. Blakley, G.R., "Safeguarding cryptographic keys", in
Proceedings of the national computer conference. Vol. 48, (1979),
313-317. 
16. Shamir, A., "How to share a secret", Communications of the
ACM,  Vol. 22, No. 11, (1979), 612-613. 
17. Asadi, F. and Hamidi, H., "An architecture for security and
protection of big data", International Journal of Engineering, 
Vol. 30, No. 10, (2017), 1479-1486. 
18. Chen, S., Chen, Y., Jiang, H., Yang, L.T. and Li, K.-C., "A secure
distributed file system based on revised blakley's secret sharing
scheme", in 2012 IEEE 11th International Conference on Trust,
Security and Privacy in Computing and Communications, IEEE.,
(2012), 310-317. 
19. Shen, F., Jiang, H. and Xu, Z., "On post-generation data
operations in secure distributed storage systems with internal
padding", in 2010 10th IEEE International Conference on
Computer and Information Technology, IEEE., (2010), 26982705.