FOG computing based energy efficient and secured iot data sharing using SGSOA and GMCC

被引:0
作者
Narla, Swapna [1 ]
Peddi, Sreekar [2 ]
Valivarthi, Dharma Teja [2 ]
Kethu, Sai Sathish [3 ]
Natarajan, Durai Rajesh [4 ]
Kurniadi, Dede [5 ]
机构
[1] Tek Yantra Inc, Folsom, CA 95630 USA
[2] TekLeaders, Plano, TX USA
[3] Neura Flash, Atlanta, GA USA
[4] Estrada Consulting Inc, Sacramento, CA USA
[5] Inst Teknol Garut, Dept Comp Sci, Comp Sci, Jl Mayor Syamsu 1, Garut 44151, Indonesia
关键词
Data aggregation; Internet of things; Hadoop distributed file system (HDFS); K -means clustering (KMC); Merkle tree (MT); And free and open-source ghost (FOG) server; DATA AGGREGATION;
D O I
10.1016/j.suscom.2025.101109
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A Free and open-source Ghost (FOG) computing is a decentralized computing infrastructure, that helps in processing the data efficiently to end-user. None of the existing works concentrated on authorization between source, destination, and intermediate server during the Internet of Things (IoT) sensor data transmission. Therefore, the paper presents the authentication of the servers using Cholesky-HAVAL for secure IoT sensor data transmission. Initially, the IoT sensor devices are registered and logged into the FOG server. Next, the sensor nodes are clustered using Bray Pearson K-Means (BP-KMeans) clustering method. Through the cluster head, the IoT data is sensed, and the attributes are extracted. The sensed data is then secured using Gauss Montgomery Curve Cryptography (GMCC). The secured data is stored in the Hadoop Distributed File System (HDFS) FOG server. Here, the data is mapped using BP-KMeans and then reduced using the Schwefel Group Search Optimization Algorithm (SGSOA). Meanwhile, Merkle Tree (MT) is created using Cholesky-HAVAL regarding the sensor data attributes, IoT sensor ID (Identification), and FOG server ID. Next, to retrieve the sensor data, the user registers and logs into the server. Then, the user gives a query request for accessing the data present in the cloud. The attributes are extracted from the query, and using SGSOA, the query is optimized. Finally, the hashcode verification is done regarding the attributes from sensed data and the query. The IoT data is thus retrieved for the verified hashcodes. Thus, the proposed work clustered the sensor nodes in 4578 ms and generated the hashcode in 1476 ms.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Optimizing energy-efficient data replication for IoT applications in fog computing
    Mohamed, Ahmed Awad
    Diabat, Ali
    Abualigah, Laith
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2024, 37 (14)
  • [2] An Integrated Blockchain Framework for Secure Data Sharing in IoT Fog Computing
    Bathula, Peda Narayana
    Sreenivasulu, M.
    TSINGHUA SCIENCE AND TECHNOLOGY, 2025, 30 (03): : 957 - 977
  • [3] EDaTAD: Energy-Aware Data Transmission Approach with Decision-Making for Fog Computing-Based IoT Applications
    Idrees, Ali Kadhum
    Ali-Yahiya, Tara
    Idrees, Sara Kadhum
    Couturier, Raphael
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (03)
  • [4] Fog Computing Based Efficient IoT Scheme for the Industry 4.0
    Peralta, Goiuri
    Iglesias-Urkia, Markel
    Barcelo, Marc
    Gomez, Raul
    Moran, Adrian
    Bilbao, Josu
    2017 IEEE INTERNATIONAL WORKSHOP OF ELECTRONICS, CONTROL, MEASUREMENT, SIGNALS AND THEIR APPLICATION TO MECHATRONICS (ECMSM), 2017,
  • [5] An Energy-Efficient Data Aggregation Mechanism for IoT Secured by Blockchain
    Ahmed, Adeel
    Abdullah, Saima
    Bukhsh, Muhammad
    Ahmad, Israr
    Mushtaq, Zaigham
    IEEE ACCESS, 2022, 10 : 11404 - 11419
  • [6] Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing
    Zhang, Yinghui
    Zhao, Jiangfan
    Zheng, Dong
    Deng, Kaixin
    Ren, Fangyuan
    Zheng, Xiaokun
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 581 - 590
  • [7] A secret sharing-based scheme for secure and energy efficient data transfer in sensor-based IoT
    Shivhare, Anubhav
    Maurya, Manish Kumar
    Sarif, Jafar
    Kumar, Manish
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (15) : 17132 - 17149
  • [8] ENHANCING DATA SECURITY IN IoT HEALTHCARE SERVICES USING FOG COMPUTING
    Winnie, Yumnam
    Umamaheswari, E.
    Ajay, D. M.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 200 - 205
  • [9] Development of Modified ECC-Based Secured FoG-Assisted Healthcare Data Management System in IoT-Enabled WSN
    Tina Victoria, A.
    Kowsigan, M.
    CYBERNETICS AND SYSTEMS, 2024,
  • [10] Dynamic FOG Computing for the Efficient Management of IoT Infrastructures
    Arnau Munoz, Lucia
    Berna Martinez, Jose Vicente
    Calatayud Asensi, Carlos
    Lorenzo Fonseca, Iren
    DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, 21ST INTERNATIONAL CONFERENCE, 2025, 1259 : 220 - 229