Security Architecture for Low Resource Devices in Smart City using Cloud

Muneer Ahmad Dar - National Institute of Electronics and Information Technology (NIELIT), SIDCO Electronics Complex Rangreth, Srinagar J&K , 191132, India


Citation Format:



DOI: http://dx.doi.org/10.30630/joiv.4.3.407

Abstract


The world is moving towards modernization with the help of smart devices used in smart cities to make the whole lot intelligent and smart. These smart devices are extensively used in smart city and are capable of doing everything which one can do with the normal desktop computer. These smart devices like Smartphone have computational limitations are not able to store a large data to be used and collected in a smart city. In this paper, we propose a novel security architecture which first uses the Elliptic Curve Diffie Helman Key Exchange Algorithms to exchange the keys between the two low power devices (Smartphone). The keys are used to encrypt the large data (images and videos etc). The data is encrypted using the private keys of a device and then send to the cloud for safe storage. The data can be only accessed by the communicating device with the same key. The proposed security architecture enables these smart devices to store the huge data collected from the smart city to store on the cloud. If another device requests the same set of data, the keys can be shared secretly and the communicating device can be allowed to download the data directly from the cloud. This architecture relieves the Smartphone from the storage limitation and also enables it to communicate with faster speed and securely.   

Keywords


smartphone; elliptic curve; smart city; cloud

Full Text:

PDF

References


Y. Li, W. Dai, Z. Ming and M. Qiu, "Privacy Protection for Preventing Data Over-Collection in Smart City," in IEEE Transactions on Computers, vol. 65, no. 5, pp. 1339-1350, 1 May 2016, doi: 10.1109/TC.2015.2470247.

Dar, Muneer & Khan, Ummer & Bukhari, Syed. (2019). Lightweight Session Key Establishment for Android Platform Using ECC. 10.1007/978-981-13-3122-0_33.

M. A. Dar and J. Parvez, “Security Enhancement in Android using Ellipic Curve Cryptography,†Int. J. Secur. its Appl., vol. 11, no. 6, pp. 27–34, 2017.

H. Zhu, R. Lu, C. Huang, L. Chen and H. Li, "An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud," in IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 7729-7739, Sept. 2016, doi: 10.1109/TVT.2015.2499791.

M. Qiu, W. Gao, M. Chen, J.-W. Niu, and L. Zhang, “Energy efficient security algorithm for power grid wide area monitoring system,†IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 715–723, Dec. 2011.

J. Blom, D. Viswanathan, M. Spasojevic, J. Go, K. Acharya, and R. Ahonius, “Fear and the city: Role of mobile services in harnessing safety and security in urban use contexts,†in Proc. SIGCHI Conf. Human Factors Comput. Syst., 2010, pp. 1841–1850.

A. Paverd, A. Martin, and I. Brown, “Security and privacy in smart grid demand response systems,†in Proc. 2nd Int. Workshop Smart Grid Security, 2014, pp. 1–15.

D. Damopoulos, G. Kambourakis,M. Anagnostopoulos, S. Gritzalis, and J. Park, “User privacy and modern mobile services: Are they on the same path?†Personal Ubiquitous Comput., vol. 17, no. 7, pp. 1437–1448, 2013.

M. A. Dar, S. Nisar Bukhari and U. I. Khan, "Evaluation of Security and Privacy of Smartphone Users," 2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Chennai, 2018, pp. 1-4, doi: 10.1109/AEEICB.2018.8480914.

M. A. Dar and J. Parvez, "Smartphone operating systems: Evaluation & enhancements," 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kanyakumari, 2014, pp. 734-738, doi: 10.1109/ICCICCT.2014.6993056.

M. A. Dar and J. Parvez, "Enhancing security of Android & IOS by implementing need-based security (NBS)," 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kanyakumari, 2014, pp. 728-733, doi: 10.1109/ICCICCT.2014.6993055.

U. Iqbal, M. A. Dar and S. Nisar Bukhari, "Intelligent Hospitals based on IOT," 2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Chennai, 2018, pp. 1-3, doi: 10.1109/AEEICB.2018.8480947.

M. A. Dar, "A novel approach to restrict the access of malicious applications in android," 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 2017, pp. 1-4, doi: 10.1109/ICIIECS.2017.8275927.

V. Dattana, K. Gupta and A. Kush, "A Probability based Model for Big Data Security in Smart City," 2019 4th MEC International Conference on Big Data and Smart City (ICBDSC), Muscat, Oman, 2019, pp. 1-6, doi: 10.1109/ICBDSC.2019.8645607.

R. Srinivasan, A. Mohan and P. Srinivasan, "Privacy conscious architecture for improving emergency response in smart cities," 2016 Smart City Security and Privacy Workshop (SCSP-W), Vienna, 2016, pp. 1-5, doi: 10.1109/SCSPW.2016.7509559.

S. Ghosh, "Smart homes: Architectural and engineering design imperatives for smart city building codes," 2018 Technologies for Smart-City Energy Security and Power (ICSESP), Bhubaneswar, 2018, pp. 1-4, doi: 10.1109/ICSESP.2018.8376676.

F. S. Ferraz and C. A. G. Ferraz, "Smart City Security Issues: Depicting Information Security Issues in the Role of an Urban Environment," 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, London, 2014, pp. 842-847, doi: 10.1109/UCC.2014.137.

Towards Cloud based Smart Cities Data Security and Privacy Management , IEEE/ACM 7th International Conference on Utility and Cloud Computing, 2014

Anciaux, Nicolas & Bonnet, Philippe & Bouganim, Luc & Nguyen, Benjamin & Popa, iulian & Pucheral, Philippe. (2013). Trusted Cells: A Sea Change for Personal Data Services.

A. Martinez-Balleste, P. A. Perez-martinez and A. Solanas, "The pursuit of citizens' privacy: a privacy-aware smart city is possible," in IEEE Communications Magazine, vol. 51, no. 6, pp. 136-141, June 2013, doi: 10.1109/MCOM.20