Mobile Relay Arrangement in Wireless Sensor Networks

Authors

  • G. Dhana Sekhar  Asst.Professor, MCA, Department of Computer Applications Svcet, Chittoor, Andhra Pradesh, India
  • D. Pavan  PG Scholar, Department of Computer Applications Svcet, Chittoor, Andhra Pradesh, India
  • A. Akill Kumar  PG Scholar, Department of Computer Applications Svcet, Chittoor, Andhra Pradesh, India

Keywords:

Secret Key Encryption And Public Key Encryption Searching Scheme, Key Generation, Data And Keywords Uploading, Data Sharing And Downloading And Data Searching And Retrieval.

Abstract

Over the last few years, smart devices are able to communicate with each other and with Internet/cloud from short to long range. As a consequence, a new paradigm is introduced called Internet of Things (IoT). However, by utilizing cloud computing, resource limited IoT smart devices can get various benefits like offload data storage and processing burden at cloud. To support latency sensitive, real-time data processing, mobility and high data rate IoT applications, working at the edge of the network offers more benefits than cloud. In this paper, we propose an efficient data sharing scheme that allows smart devices to securely share data with others at the edge of cloud-assisted IoT. In addition, we also propose a secure searching scheme to search desired data within own/shared data on storage. Finally, we analyze the performance based on processing time of our proposed scheme. The results demonstrate that our scheme has potential to be effectively used in IoT applications.

References

  1. M.R. Palattella, M. Dohler, A. Grieco, G. Rizzo, J. Torsner, T. Engel, et al., "Internet of Things in the 5G Era: Enablers, Architecture, and Business Models," IEEE J. Selected Areas in Communications, vol. 34, no. 3, 2016, pp. 510–527.
  2. L. Wang and R. Ranjan, "Processing Distributed Internet of Things Data in Clouds," IEEE Cloud Computing, vol. 2, no. 1, 2015, pp. 76–80.
  3. M. Satyanarayanan, P. Simoens, Y. Xiao, P. Pillai, Z. Chen, K. Ha, et al., "Edge Analytics in the Internet of Things," IEEE Pervasive Computing, vol. 14, 2015, pp. 24–31.
  4. S. Yi, Z. Hao, Z. Qin, and Q. Li, "Fog Computing: Platform and Applications," 2015 3rd IEEE Workshop Hot Topics Web Systems and Technologies (HotWeb), 2015, pp. 73–78.
  5. J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, "Twenty Security Considerations for CloudSupported Internet of Things," IEEE Internet of Things J., vol. 3, no. 3, 2016, pp. 269–284.
  6. M. Ali, R. Dhamotharan, E. Khan, S. U. Khan, A.V. Vasilakos, K. Li, et al., "SeDaSC: Secure Data Sharing in Clouds," IEEE Systems J., vol. 99, 2015, pp. 1–10.
  7. S.-H. Seo, M. Nabeel, X. Ding, and E. Bertino, "An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds," IEEE Trans. Knowledge and Data Engineering, vol. 26, no. 9, 2014, pp. 2107–2119.
  8. H. Kumarage, I. Khalil, A. Alabdulatif, Z. Tari, and X. Yi, "Secure Data Analytics for CloudIntegrated Internet of Things Applications," IEEE Cloud Computing, vol. 3, no. 2, 2016, pp. 46–56.
  9. J.B. Bernabe, J.L.H. Ramos, and A.F.S. Gomez, "TACIoT: Multidimensional Trust-Aware Access Control System for the Internet of Things," Soft Computing, vol. 20, no. 5, 2016, pp. 1763–1779.
  10. F. Li, Y. Rahulamathavan, M. Conti, and M. Rajarajan, "Robust Access Control Framework for Mobile Cloud Computing Network," Computer Communications, vol. 68, 2015, pp. 61–72.
  11. H. Li, D. Liu, Y. Dai, T.H. Luan, and X. Shen, "Enabling Efficient Multi-Keyword Ranked Search over Encrypted Mobile Cloud Data Through Blind Storage," IEEE Trans. Emerging Topics in Computing, vol. 3, no. 1, 2015, pp. 127–138.
  12. H. Li, D. Liu, Y. Dai, and T.H. Luan, "Engineering Searchable Encryption of Mobile Cloud Networks: When Qoe Meets Qop," IEEE Wireless Communications, vol. 22, no. 4, 2015, pp. 74–80.
  13. L. Xu, X. Wu, and X. Zhang, :CL-PRE: A Certificateless Proxy Re-Encryption Scheme For Secure Data Sharing with Public Cloud," Proc. 7th ACM Symposium on Information, Computer and Communications Security, 2012, pp. 87–88.
  14. A.N. Khan, M.M. Kiah, S.A. Madani, M. Ali, and S. Shamshirband, "Incremental Proxy ReEncryption Scheme for Mobile Cloud Computing Environment," J. Supercomputing, vol. 68, no. 2, 2014, pp. 624–651.
  15. S.K. Pasupuleti, S. Ramalingam, and R. Buyya, "An Efficient and Secure Privacy-Preserving Approach for Outsourced Data of Resource Constrained Mobile Devices in Cloud Computing," J. Network and Computer Applications, vol. 64, 2016, pp. 12–22.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
G. Dhana Sekhar, D. Pavan, A. Akill Kumar, " Mobile Relay Arrangement in Wireless Sensor Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.469-472, March-April-2018.