IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: A Hybrid Post-Quantum Cryptographic and Blockchain-Based Approach Toward a Trustworthy Cloud Computing

被引:23
作者
Irshad, Reyazur Rashid [1 ]
Hussain, Shahid [2 ]
Hussain, Ihtisham [3 ]
Nasir, Jamal Abdul [4 ]
Zeb, Asim [5 ]
Alalayah, Khaled M. [1 ]
Alattab, Ahmed Abdu [1 ]
Yousif, Adil [1 ]
Alwayle, Ibrahim M. [1 ]
机构
[1] Najran Univ, Coll Sci & Arts, Dept Comp Sci, Najran 68341, Saudi Arabia
[2] Natl Univ Ireland Maynooth NUIM, Innovat Value Inst IVI, Sch Business, Maynooth W23 F2H6, Ireland
[3] Abdul Wali Khan Univ Mardan AWKUM, Dept Comp Sci, Shaheed Rashid Hussain SRH Campus, Nowshera 24210, Pakistan
[4] Univ Galway, Sch Comp Sci, Galway H91 TK33, Ireland
[5] Abbottabad Univ Sci & Technol, Dept Comp Sci, Abbottabad 22500, Pakistan
关键词
Blockchain; IoT-enabled cloud architecture; post-quantum cryptography; artificial intelligence; scalability; multi-user systems; decentralized approach; HEALTH-CARE DATA; INTERNET; SCHEME; ISSUES; AUTHENTICATION; EFFICIENT;
D O I
10.1109/ACCESS.2023.3318755
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has revolutionized organizational operations by providing convenient, on-demand access to resources. The emergence of the Internet of Things (IoT) has introduced a new paradigm for collaborative computing, leveraging sensors and devices that generate and process vast amounts of data, thereby resulting in challenges related to scalability and security, making the significance of conventional security methods even more pronounced. Consequently, in this paper, we propose a novel Scalable and Secure Cloud Architecture (SSCA) that integrates IoT and cryptographic techniques, aiming to develop scalable and trustworthy cloud systems, thus enabling multi-user systems and facilitating simultaneous access to cloud resources by multiple users. The design adopts a decentralized approach, utilizing multiple cloud nodes to handle user requests efficiently and incorporates Multicast and Broadcast Rekeying Algorithm (MBRA) to ensure the privacy and confidentiality of user information, utilizing a hybrid cryptosystem that combines MBRA, Post Quantum Cryptography (PQC) and blockchain technology. Leveraging IoT devices, the architecture gathers data from distributed sensing resources and ensures the security of collected information through robust MBRA-PQC encryption algorithms, while the blockchain ensures that the confidential data is stored in distributed and immutable records. The proposed approach is applied to several datasets and the effectiveness is validated through various performance metrics, including response time, throughput, scalability, security, and reliability. The results highlight the effectiveness of the proposed SSCA, showcasing a notable reduction in response time by 1.67 seconds and 0.97 seconds for 250 and 1000 devices, respectively, in comparison to the MHE-IS-CPMT. Likewise, SSCA demonstrated significant improvements in the AUC values, exhibiting enhancements of 6.30%, 6.90%, 7.60%, and 7.30% at the 25-user level, and impressive gains of 5.20%, 9.30%, 11.50%, and 15.40% at the 50-user level when compared to the MHE-IS-CPMT, EAM, SCSS, and SHCEF models, respectively.
引用
收藏
页码:105479 / 105498
页数:20
相关论文
共 67 条
[41]  
Numenta, Numenta Anomaly Benchmark
[42]  
Padhy R.P., 2011, Int. J. Comput. Sci. Inf. Technol. Secur. (IJCSITS), V1, P136
[43]   Key Issues in Healthcare Data Integrity: Analysis and Recommendations [J].
Pandey, Abhishek Kumar ;
Khan, Asif Irshad ;
Abushark, Yoosef B. ;
Alam, Md Mottahir ;
Agrawal, Alka ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
IEEE ACCESS, 2020, 8 :40612-40628
[44]  
Patel KK., 2016, International journal of engineering science and computing, V6, DOI [DOI 10.4010/2016.1482.MAY, 10.4010/2016.1482, DOI 10.4010/2016.1482]
[45]   Blockchain Based Decentralized Management of Demand Response Programs in Smart Energy Grids [J].
Pop, Claudia ;
Cioara, Tudor ;
Antal, Marcel ;
Anghel, Ionut ;
Salomie, Ioan ;
Bertoncini, Massimo .
SENSORS, 2018, 18 (01)
[46]   Response time optimization with enhanced fault-tolerant wireless sensor network design for on-board rapid transit applications [J].
Raghunath, K. M. Karthick ;
Rengarajan, N. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4) :S9737-S9753
[47]   Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT [J].
Rahman, Anichur ;
Islam, Md Jahidul ;
Band, Shahab S. ;
Muhammad, Ghulam ;
Hasan, Kamrul ;
Tiwari, Prayag .
DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (02) :411-421
[48]  
Saleh ME, 2016, INT J ADV COMPUT SC, V7, P390, DOI 10.14569/ijacsa.2016.070651
[49]   IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model [J].
Sarker, Iqbal H. ;
Abushark, Yoosef B. ;
Alsolami, Fawaz ;
Khan, Asif Irshad .
SYMMETRY-BASEL, 2020, 12 (05)
[50]   Cloud computing and trans-border health data: Unpacking US and EU healthcare regulation and compliance [J].
Seddon, Jonathan J. M. ;
Currie, Wendy L. .
HEALTH POLICY AND TECHNOLOGY, 2013, 2 (04) :229-241