Charu Awasthi, Prashant Kumar Mishra, Pawan Kumar Pal, Surbhi Bhatia Khan, Ambuj Kumar Agarwal, Thippa Reddy Gadekallu, Areej A. Malibari
{"title":"Preservation of Sensitive Data Using Multi-Level Blockchain-based Secured Framework for Edge Network Devices","authors":"Charu Awasthi, Prashant Kumar Mishra, Pawan Kumar Pal, Surbhi Bhatia Khan, Ambuj Kumar Agarwal, Thippa Reddy Gadekallu, Areej A. Malibari","doi":"10.1007/s10723-023-09699-2","DOIUrl":"https://doi.org/10.1007/s10723-023-09699-2","url":null,"abstract":"<p>The proliferation of IoT devices has influenced end users in several aspects. Yottabytes (YB) of information are being produced in the IoT environs because of the ever-increasing utilization capacity of the Internet. Since sensitive information, as well as privacy problems, always seem to be an unsolved problem, even with best-in-class in-formation governance standards, it is difficult to bolster defensive security capabilities. Secure data sharing across disparate systems is made possible by blockchain technology, which operates on a decentralized computing paradigm. In the ever-changing IoT environments, blockchain technology provides irreversibility (immutability) usage across a wide range of services and use cases. Therefore, blockchain technology can be leveraged to securely hold private information, even in the dynamicity context of the IoT. However, as the rate of change in IoT networks accelerates, every potential weak point in the system is exposed, making it more challenging to keep sensitive data se-cure. In this study, we adopted a Multi-level Blockchain-based Secured Framework (M-BSF) to provide multi-level protection for sensitive data in the face of threats to IoT-based networking systems. The envisioned M-BSF framework incorporates edge-level, fog-level, and cloud-level security. At edge- and fog-level security, baby kyber and scaling kyber cryptosystems are applied to ensure data preservation. Kyber is a cryptosystem scheme that adopts public-key encryption and private-key decryption processes. Each block of the blockchain uses the cloud-based Argon-2di hashing method for cloud-level data storage, providing the highest level of confidentiality. Argon-2di is a stable hashing algorithm that uses a hybrid approach to access the memory that relied on dependent and independent memory features. Based on the attack-resistant rate (> 96%), computational cost (in time), and other main metrics, the proposed M-BSF security architecture appears to be an acceptable alternative to the current methodologies.</p>","PeriodicalId":54817,"journal":{"name":"Journal of Grid Computing","volume":"30 1","pages":""},"PeriodicalIF":5.5,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138536985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel Edge Computing-Based Privacy-Preserving Approach for Smart Healthcare Systems in the Internet of Medical Things","authors":"Lingbin Meng, Daofeng Li","doi":"10.1007/s10723-023-09695-6","DOIUrl":"https://doi.org/10.1007/s10723-023-09695-6","url":null,"abstract":"","PeriodicalId":54817,"journal":{"name":"Journal of Grid Computing","volume":"104 35","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135138440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Mobin Akhtar, Abdallah Saleh Ali Shatat, Mukhtar Al-Hashimi, Abu Sarwar Zamani, Mohammed Rizwanullah, Sara Saadeldeen Ibrahim Mohamed, Rashid Ayub
{"title":"MapReduce with Deep Learning Framework for Student Health Monitoring System using IoT Technology for Big Data","authors":"Md. Mobin Akhtar, Abdallah Saleh Ali Shatat, Mukhtar Al-Hashimi, Abu Sarwar Zamani, Mohammed Rizwanullah, Sara Saadeldeen Ibrahim Mohamed, Rashid Ayub","doi":"10.1007/s10723-023-09690-x","DOIUrl":"https://doi.org/10.1007/s10723-023-09690-x","url":null,"abstract":"","PeriodicalId":54817,"journal":{"name":"Journal of Grid Computing","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Distributed and Configurable Hierarchical Blockchain over SDN and Fog-Based Networks for Large-Scale Internet of Things","authors":"Salman Azeez Syed, Deepak Kumar Sharma, Gautam Srivastava","doi":"10.1007/s10723-023-09698-3","DOIUrl":"https://doi.org/10.1007/s10723-023-09698-3","url":null,"abstract":"","PeriodicalId":54817,"journal":{"name":"Journal of Grid Computing","volume":"12 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135821472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computing Resources Scalability Performance Analysis in Cloud Computing Data Center","authors":"Oumaima Ghandour, Said El Kafhali, Mohamed Hanini","doi":"10.1007/s10723-023-09696-5","DOIUrl":"https://doi.org/10.1007/s10723-023-09696-5","url":null,"abstract":"","PeriodicalId":54817,"journal":{"name":"Journal of Grid Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135808667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiazhong Lu, Jin Lan, Yuanyuan Huang, Maojia Song, Xiaolei Liu
{"title":"Anti-Attack Intrusion Detection Model Based on MPNN and Traffic Spatiotemporal Characteristics","authors":"Jiazhong Lu, Jin Lan, Yuanyuan Huang, Maojia Song, Xiaolei Liu","doi":"10.1007/s10723-023-09703-9","DOIUrl":"https://doi.org/10.1007/s10723-023-09703-9","url":null,"abstract":"","PeriodicalId":54817,"journal":{"name":"Journal of Grid Computing","volume":"48 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136160460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}