A Novel Blockchain-Based Lightweight Encryption Technique in Fog Based IoT for Personal Healthcare Data Application

Authors

  • Janardhana Naidu J. N. S. S. Department of Computer Science and Engineering, Vels Institute of Science Technology and Advanced Studies, Chennai, Tamil Nadu 60011, India.
  • Ganesh E. N. Department of Computer Science and Engineering, Vels Institute of Science Technology and Advanced Studies, Chennai, Tamil Nadu 60011, India.

Keywords:

blockchain technology, fog computing, encryption technique, tiny lightweight symmetric encryption, fog-Bus and aquila optimization algorithm.

Abstract

Different sensors, digital devices, and objects may all sense their surroundings thanks to the Internet of Things (IoT) concept, which also links them to the worldwide Internet for data exchange. Integrating Edge, Fog, and Cloud infrastructure is becoming more necessary to enable Internet of Things (IoT) applications that are both latency-sensitive and computationally heavy. Security in the IoT, particularly for healthcare applications, is a big issue. In this research, a unique, lightweight encryption method for Internet of Things (IoT) based on fog is developed. For the execution and interaction of IoT applications and compute instances, Fog Bus provides a platform-independent interface. It lets service providers manage their resources as well as customers run numerous apps simultaneously and developers create applications. In order to safeguard activities on sensitive data, Fog Bus also uses Blockchain, authentication, and encryption mechanisms. For enhancing security, the blockchain with Tiny Lightweight Symmetric Encryption (TLSE) is introduced. The TLSE chooses the best key by taking the Aquila Optimization Algorithm into account (AOA). The UCI machine library is used to gather health care data in order to verify the proposed approach. The suggested method is put into practice using Python, and it is contrasted with more established methods like Rivest-Shamir-Adleman (RSA) and elliptical curve cryptography (ECC), respectively.

Downloads

Download data is not yet available.

References

Kalaria, Rudri, A. S. M. Kayes, Wenny Rahayu, and Eric Pardede. "A Secure Mutual authentication approach to fog computing environment." Computers & Security 111 (2021): 102483.

Alwakeel, Ahmed M. "An overview of fog computing and edge computing security and privacy issues." Sensors 21, no. 24 (2021): 8226.

Singh, Sunakshi, and Vijay Kumar Chaurasiya. "Mutual authentication scheme of IoT devices in fog computing environment." Cluster Computing 24, no. 3 (2021): 1643-1657.

Yang, Xiaodong, Wanting Xi, Aijia Chen, and Caifen Wang. "An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing." PloS one 16, no. 9 (2021): e0258062.

Amanlou, Sanaz, Mohammad Kamrul Hasan, and Khairul Azmi Abu Bakar. "Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model." Computer Networks 199 (2021): 108465.

Liu, Yanhui, Jianbiao Zhang, and Jing Zhan. "Privacy protection for fog computing and the internet of things data based on blockchain." Cluster Computing 24, no. 2 (2021): 1331-1345.

Meng, Fei, Leixiao Cheng, and Mingqiang Wang. "ABDKS: attribute-based encryption with dynamic keyword search in fog computing." Frontiers of Computer Science 15, no. 5 (2021): 1-9.

Shynu, P. G., Varun G. Menon, R. Lakshmana Kumar, Seifedine Kadry, and Yunyoung Nam. "Blockchain-based secure healthcare application for diabetic-cardio disease prediction in fog computing." IEEE Access 9 (2021): 45706-45720.

Ngabo, Desire, Dong Wang, Celestine Iwendi, Joseph Henry Anajemba, Lukman Adewale Ajao, and Cresantus Biamba. "Blockchain-based security mechanism for the medical data at fog computing architecture of internet of things." Electronics 10, no. 17 (2021): 2110.

Kumar, Prabhat, Randhir Kumar, Govind P. Gupta, and Rakesh Tripathi. "A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing." Transactions on Emerging Telecommunications Technologies 32, no. 6 (2021): e4112.

Liu, Yanhui, Jianbiao Zhang, and Jing Zhan. "Privacy protection for fog computing and the internet of things data based on blockchain." Cluster Computing 24, no. 2 (2021): 1331-1345.

Dewanta, Favian, and Masahiro Mambo. "Bpt scheme: establishing trusted vehicular fog computing service for rural area based on blockchain approach." IEEE Transactions on Vehicular Technology 70, no. 2 (2021): 1752-1769.

Alzoubi, Yehia Ibrahim, Ahmad Al-Ahmad, and Hasan Kahtan. "Blockchain technology as a Fog computing security and privacy solution: An overview." Computer Communications 182 (2022): 129-152.

Eddine, Merzougui Salah, Mohamed Amine Ferrag, Othmane Friha, and Leandros Maglaras. "EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles." Journal of Information Security and Applications 59 (2021): 102802.

Kong, Ming, Junhui Zhao, Xiaoke Sun, and Yiwen Nie. "Secure and efficient computing resource management in blockchain-based vehicular fog computing." China Communications 18, no. 4 (2021): 115-125.

Singh, Parminder, Anand Nayyar, Avinash Kaur, and Uttam Ghosh. "Blockchain and fog based architecture for internet of everything in smart cities." Future Internet 12, no. 4 (2020): 61.

Shukla, Saurabh, Subhasis Thakur, Shahid Hussain, John G. Breslin, and Syed Muslim Jameel. "Identification and authentication in healthcare internet-of-things using integrated fog computing based blockchain model." Internet of Things 15 (2021): 100422.

Amanlou, Sanaz, Mohammad Kamrul Hasan, and Khairul Azmi Abu Bakar. "Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model." Computer Networks 199 (2021): 108465.

Gupta, Sejal, Ritu Garg, Nitin Gupta, Waleed S. Alnumay, Uttam Ghosh, and Pradip Kumar Sharma. "Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks." Journal of Information Security and Applications 58 (2021): 102768.

Whaiduzzaman, Md, Md Julkar Nayeen Mahi, Alistair Barros, Md Ibrahim Khalil, Colin Fidge, and Rajkumar Buyya. "BFIM: Performance measurement of a blockchain based hierarchical tree layered fog-IoT microservice architecture." IEEE Access 9 (2021): 106655-106674.

Alzoubi, Yehia Ibrahim, Ahmad Al-Ahmad, and Hasan Kahtan. "Blockchain technology as a Fog computing security and privacy solution: An overview." Computer Communications 182 (2022): 129-152.

Alam, Tanweer. "IoT-Fog: A communication framework using blockchain in the internet of things." arXiv preprint arXiv:1904.00226 (2019).

Rajesh, Sreeja, Varghese Paul, Varun G. Menon, and Mohammad R. Khosravi. "A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices." Symmetry 11, no. 2 (2019): 293.

Abualigah, Laith, Dalia Yousri, Mohamed Abd Elaziz, Ahmed A. Ewees, Mohammed AA Al-Qaness, and Amir H. Gandomi. "Aquila optimizer: a novel meta-heuristic optimization algorithm." Computers & Industrial Engineering 157 (2021): 107250.

Zhang, Yu-Jun, Yu-Xin Yan, Juan Zhao, and Zheng-Ming Gao. "AOAAO: The hybrid algorithm of arithmetic optimization algorithm with aquila optimizer." IEEE Access 10 (2022): 10907-10933.Mahajan, Shubham, Laith Abualigah, Amit Kant Pandit, and Maryam Altalhi. "Hybrid Aquila optimizer with arithmetic optimization algorithm for global optimization tasks." Soft Computing 26, no. 10 (2022): 4863-4881. https://archive.ics.uci. edu/ml/index.php

Fog architecture

Downloads

Published

08.02.2023

How to Cite

J. N. S. S., J. N. ., & E. N., G. . (2023). A Novel Blockchain-Based Lightweight Encryption Technique in Fog Based IoT for Personal Healthcare Data Application. International Journal of Intelligent Systems and Applications in Engineering, 11(3s), 119 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2549

Issue

Section

Research Article