IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: A Hybrid Post-Quantum Cryptographic and Blockchain-Based Approach Toward a Trustworthy Cloud Computing

被引:23
作者
Irshad, Reyazur Rashid [1 ]
Hussain, Shahid [2 ]
Hussain, Ihtisham [3 ]
Nasir, Jamal Abdul [4 ]
Zeb, Asim [5 ]
Alalayah, Khaled M. [1 ]
Alattab, Ahmed Abdu [1 ]
Yousif, Adil [1 ]
Alwayle, Ibrahim M. [1 ]
机构
[1] Najran Univ, Coll Sci & Arts, Dept Comp Sci, Najran 68341, Saudi Arabia
[2] Natl Univ Ireland Maynooth NUIM, Innovat Value Inst IVI, Sch Business, Maynooth W23 F2H6, Ireland
[3] Abdul Wali Khan Univ Mardan AWKUM, Dept Comp Sci, Shaheed Rashid Hussain SRH Campus, Nowshera 24210, Pakistan
[4] Univ Galway, Sch Comp Sci, Galway H91 TK33, Ireland
[5] Abbottabad Univ Sci & Technol, Dept Comp Sci, Abbottabad 22500, Pakistan
关键词
Blockchain; IoT-enabled cloud architecture; post-quantum cryptography; artificial intelligence; scalability; multi-user systems; decentralized approach; HEALTH-CARE DATA; INTERNET; SCHEME; ISSUES; AUTHENTICATION; EFFICIENT;
D O I
10.1109/ACCESS.2023.3318755
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has revolutionized organizational operations by providing convenient, on-demand access to resources. The emergence of the Internet of Things (IoT) has introduced a new paradigm for collaborative computing, leveraging sensors and devices that generate and process vast amounts of data, thereby resulting in challenges related to scalability and security, making the significance of conventional security methods even more pronounced. Consequently, in this paper, we propose a novel Scalable and Secure Cloud Architecture (SSCA) that integrates IoT and cryptographic techniques, aiming to develop scalable and trustworthy cloud systems, thus enabling multi-user systems and facilitating simultaneous access to cloud resources by multiple users. The design adopts a decentralized approach, utilizing multiple cloud nodes to handle user requests efficiently and incorporates Multicast and Broadcast Rekeying Algorithm (MBRA) to ensure the privacy and confidentiality of user information, utilizing a hybrid cryptosystem that combines MBRA, Post Quantum Cryptography (PQC) and blockchain technology. Leveraging IoT devices, the architecture gathers data from distributed sensing resources and ensures the security of collected information through robust MBRA-PQC encryption algorithms, while the blockchain ensures that the confidential data is stored in distributed and immutable records. The proposed approach is applied to several datasets and the effectiveness is validated through various performance metrics, including response time, throughput, scalability, security, and reliability. The results highlight the effectiveness of the proposed SSCA, showcasing a notable reduction in response time by 1.67 seconds and 0.97 seconds for 250 and 1000 devices, respectively, in comparison to the MHE-IS-CPMT. Likewise, SSCA demonstrated significant improvements in the AUC values, exhibiting enhancements of 6.30%, 6.90%, 7.60%, and 7.30% at the 25-user level, and impressive gains of 5.20%, 9.30%, 11.50%, and 15.40% at the 50-user level when compared to the MHE-IS-CPMT, EAM, SCSS, and SHCEF models, respectively.
引用
收藏
页码:105479 / 105498
页数:20
相关论文
共 67 条
[1]   Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities [J].
Abbas, Khizar ;
Tawalbeh, Lo'Ai A. ;
Rafiq, Ahsan ;
Muthanna, Ammar ;
Elgendy, Ibrahim A. ;
Abd El-Latif, Ahmed A. .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[2]  
Achar S., 2022, International Journal of Computer and Systems Engineering, V16, P379
[3]   Hybrid cryptographic approach to enhance the mode of key management system in cloud environment [J].
Ahmad, Shahnawaz ;
Mehfuz, Shabana ;
Beg, Javed .
JOURNAL OF SUPERCOMPUTING, 2023, 79 (07) :7377-7413
[4]   An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques [J].
Albishry, Nabeel ;
AlGhamdi, Rayed ;
Almalawi, Abdulmohsen ;
Khan, Asif Irshad ;
Kshirsagar, Pravin R. ;
Debtera, Baru .
COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
[5]   Deep Learning Based Homomorphic Secure Search-Able Encryption for Keyword Search in Blockchain Healthcare System: A Novel Approach to Cryptography [J].
Ali, Aitizaz ;
Pasha, Muhammad Fermi ;
Ali, Jehad ;
Fang, Ong Huey ;
Masud, Mehedi ;
Jurcut, Anca Delia ;
Alzain, Mohammed A. .
SENSORS, 2022, 22 (02)
[6]   A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks [J].
Alkadi, Osama ;
Moustafa, Nour ;
Turnbull, Benjamin ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12) :9463-9472
[7]   Customers perspectives on adoption of cloud computing in banking sector [J].
Asadi, Shahla ;
Nilashi, Mehrbakhsh ;
Husin, Abd Razak Che ;
Yadegaridehkordi, Elaheh .
INFORMATION TECHNOLOGY & MANAGEMENT, 2017, 18 (04) :305-330
[8]   Special Section: The Transformative Value of Cloud Computing: A Decoupling, Platformization, and Recombination Theoretical Framework [J].
Benlian, Alexander ;
Kettinger, William J. ;
Sunyaev, Ali ;
Winkler, Till J. .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2018, 35 (03) :719-739
[9]   On the Implementation of the Discrete Fourier Transform in the Encrypted Domain [J].
Bianchi, Tiziano ;
Piva, Alessandro ;
Barni, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (01) :86-97
[10]   Smart City IoT System Network Level Routing Analysis and Blockchain Security Based Implementation [J].
Bommu, Samuyelu ;
Kumar, Aravind M. ;
Babburu, Kiranmai ;
Srikanth, N. ;
Thalluri, Lakshmi Narayana ;
Ganesh, V. G. ;
Gopalan, Anitha ;
Mallapati, Purna Kishore ;
Guha, Koushik ;
Mohammad, Hayath Rajvee ;
Kiran, S. S. .
JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2023, 18 (02) :1351-1368