A secure and energy-efficient architecture in Internet of Things-cloud computing network by enhancing and combining three cryptographic techniques via defining new features, areas, and entities

被引:0
作者
Farshadinia, Hojjat [1 ]
Barati, Ali [1 ]
Barati, Hamid [1 ]
机构
[1] Islamic Azad Univ, Inst Artificial Intelligence & Social & Adv Techno, Dezful, Iran
关键词
Internet of Things-cloud computing (IoT-cloud); Hyperledger Fabric blockchain (HFB); Lightweight cryptography; Multilayer security framework; Efficient blockchain-based encryption; Third-party auditing in IoT-cloud; SENSOR NETWORKS; ACCESS-CONTROL; BLOCKCHAIN; SCHEME;
D O I
10.1007/s11227-025-07390-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a secure and energy-efficient architecture for Internet of Things-cloud (IoT-cloud) environments by integrating and enhancing three cryptographic techniques-elliptic curve digital signature algorithm (ECDSA), Zhang's short signature (ZSS), and SEPAR-within a modular, multilayered framework. Current blockchain-based cryptographic systems face several critical challenges, including security vulnerabilities, high power consumption, overhead, and data integrity issues in multi-replica scenarios. The proposed model introduces novel structural components, including a Central Third-Party Auditor (C-TPA), an optimized Hyperledger Fabric-based auditing module (HF-Audit), a lightweight hybrid encryptor (EZ), and an audit channel management entity (M-Audit). These innovations improve data integrity, public auditing, traceability, mutual authentication, anonymity, and multilayer security. The architecture also introduces two original features-chronological order and user-defined encryption hierarchies-to reduce scheduling inefficiencies and enhance customizability. Experimental results show that the proposed method reduces power consumption by 30% and time costs by 40% compared to existing methods (e.g., HF-Audit, SEPAR), while achieving 56 ms latency and 2144-bit throughput. This work significantly advances secure and scalable cryptographic design for resource-constrained IoT-cloud systems.
引用
收藏
页数:43
相关论文
共 63 条
[1]  
Abrar I., 2021, Integration and Implementation of the Internet of Things Through Cloud Computing, P37
[2]   Secure lightweight cryptosystem for IoT and pervasive computing [J].
Abutaha, Mohammed ;
Atawneh, Basil ;
Hammouri, Layla ;
Kaddoum, Georges .
SCIENTIFIC REPORTS, 2022, 12 (01)
[3]   AAC-IoT: Attribute Access Control Scheme for IoT Using Lightweight Cryptography and Hyperledger Fabric Blockchain [J].
Alshehri, Suhair ;
Bamasag, Omaimah .
APPLIED SCIENCES-BASEL, 2022, 12 (16)
[4]   Elliptic Curve Lightweight Cryptography: A Survey [J].
Andres Lara-Nino, Carlos ;
Diaz-Perez, Arturo ;
Morales-Sandoval, Miguel .
IEEE ACCESS, 2018, 6 :72514-72550
[5]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[6]   Integration of Cloud Computing with Internet of Things: Challenges and Open Issues [J].
Atlam, Hany F. ;
Alenezi, Ahmed ;
Alharthi, Abdulrahman ;
Walters, Robert J. ;
Wills, Gary B. .
2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, :670-675
[7]   Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier [J].
Bian, Genqing ;
Zhang, Rui ;
Shao, Bilin .
IEEE ACCESS, 2022, 10 :40556-40570
[8]  
Buchanan W. J., 2017, Journal of Cyber Security Technology, V1, P187, DOI [DOI 10.1080/23742917.2017.1384917, 10.1080/23742917.2017.1405600, DOI 10.1080/23742917.2017.1405600]
[9]  
Dong GF, 2020, 2020 5TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (IEEE ICBDA 2020), P246, DOI 10.1109/ICBDA49040.2020.9101201
[10]  
Dutta IK, 2019, 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P475, DOI 10.1109/CCWC.2019.8666557