An enhanced encryption-based security framework in the CPS Cloud

被引:7
作者
Priyadarshini, R. [1 ]
Quadir, Abdul Md [1 ]
Rajendran, N. [2 ]
Neelanarayanan, V [1 ]
Sabireen, H. [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] BS Abdur Rahman Crescent Inst Sci & Technol, Dept Informat Technol, Chennai, Tamil Nadu, India
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2022年 / 11卷 / 01期
关键词
Healthcare; IoMT; CPS; Cloud security; Encryption; CBM; BAO; FET-RP; INDUSTRY; 4.0;
D O I
10.1186/s13677-022-00336-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid advancement of computation techniques and cloud computing has led to substantial advancements in Cyber-Physical Systems (CPS), particularly in the field of health care. There are a variety of ways in which CPS is used in healthcare today, including delivering intelligent feedback systems, automatically updating patient data digitally, monitoring patients passively with biosensors, etc. In recent years, cyber-physical systems have become capable of making lifesaving decisions as they are becoming more connected to the cloud. However, healthcare has become one of the most critical issues for many. A CPS network uses the Internet of Medical Things (IoMT) to continuously monitor patients' health metrics such as body temperature, heart rate, etc. Due to physical connectivity restrictions, networks are more susceptible to security threats. In spite of the fact that the data is stored in the cloud, it is necessary to provide security regardless of device security and network security. Several cyber-security vulnerabilities have been identified in cloud-based healthcare systems in particular. To give patients a reliable healthcare experience, security concerns with CPSs need to be addressed carefully. In this context, this paper proposes a Cross-Breed Blowfish and MD5 (CBM) approach to improve the security of health data in the CPS cloud. The proposed model uses the wireless sensor network, in which data acquired by the network is transmitted via the transmitting node. Using the fuzzified effective trust-based routing protocol (FET-RP), the most efficient path for data travel is selected. The best route is determined using Butter-Ant Optimization (BAO) algorithm. The proposed method conveys data throughput encryption and decryption in a decoded format. The encrypted data is then stored in the cloud database for security reasons. The route finding algorithm is the one which is sending the data from one end to other end. The data is encrypted based on the source and destination. We compare the performance metrics of our recommended technique to those of other existing techniques, such as RSA, Two fish, ICC, and FHEA, in order to ensure that it performs optimally. The values of Cross Breed Blowfish and MD5 and FET-RP with regard to the performance metrics in terms of encryption (60 ms), decryption (55 ms), latency (60 s), throughput (97 mbps), security level (98%), and execution time (57 ms) which outperforms the conventional methods by 10-15%. Also the proposed encryption shows the considerable improvement in the level of security making our model a real world solution.
引用
收藏
页数:13
相关论文
共 32 条
  • [1] Fog-Computing-Based Cyber-Physical System for Secure Food Traceability through the Twofish Algorithm
    Awan, Kamran Ahmad
    Din, Ikram Ud
    Almogren, Ahmad
    Kim, Byung-Seo
    [J]. ELECTRONICS, 2022, 11 (02)
  • [2] A unified data security framework for federated prognostics and health management in smart manufacturing
    Bagheri, Behrad
    Rezapoor, Maryam
    Lee, Jay
    [J]. MANUFACTURING LETTERS, 2020, 24 : 136 - 139
  • [3] Cyber Physical Systems Dependability Using CPS-IOT Monitoring
    Bagula, Antoine
    Ajayi, Olasupo
    Maluleke, Hloniphani
    [J]. SENSORS, 2021, 21 (08)
  • [4] Fortified-Chain: A Blockchain-Based Framework for Security and Privacy-Assured Internet of Medical Things With Effective Access Control
    Egala, Bhaskara S.
    Pradhan, Ashok K.
    Badarla, Venkataramana
    Mohanty, Saraju P.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (14) : 11717 - 11731
  • [5] Evsutin O., 2022, Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions, P81
  • [6] Reinforcement learning-based application Autoscaling in the Cloud: A survey
    Gari, Yisel
    Monge, David A.
    Pacini, Elina
    Mateos, Cristian
    Garcia Garino, Carlos
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2021, 102
  • [7] Haoxiang W., 2020, J Trends Comput Sci Smart Technol (TCSST), V2, P141, DOI [10.36548/jtcsst.2020.3.003, DOI 10.36548/JTCSST.2020.3.003]
  • [8] Ivkic I, 2022, ACM T INTERNET TECHN, V2, P1
  • [9] Cyberbullying detection solutions based on deep learning architectures
    Iwendi, Celestine
    Srivastava, Gautam
    Khan, Suleman
    Maddikunta, Praveen Kumar Reddy
    [J]. MULTIMEDIA SYSTEMS, 2023, 29 (03) : 1839 - 1852
  • [10] Pointer-Based Item-to-Item Collaborative Filtering Recommendation System Using a Machine Learning Model
    Iwendi, Celestine
    Ibeke, Ebuka
    Eggoni, Harshini
    Velagala, Sreerajavenkatareddy
    Srivastava, Gautam
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2022, 21 (01) : 463 - 484