Internet of things assisted public security management platform for urban transportation using hybridised cryptographic-integrated steganography

被引:19
作者
Bi, Dexu [1 ]
Kadry, Seifedine [2 ]
Kumar, Priyan Malarvizhi [3 ]
机构
[1] Inst Guangxi Police Coll, Nanning 530023, Guangxi, Peoples R China
[2] Inst Beirut Arab Univ, Beirut 11072809, Lebanon
[3] Middlesex Univ, London NW4 4BT, England
关键词
authorisation; data integrity; steganography; cloud computing; data privacy; Internet of Things; traffic engineering computing; public transport; public security management platform; significant challenging issues; secure data sharing; data security; privacy; confidentiality; resource scheduling; cryptographic-integrated steganography algorithm; auxiliary data inputs; secured data; internet of things; urban transportation system; cloud data; cryptography converts data; secure format; authorised user; secret data; confidential data; efficient data; ATTRIBUTE-BASED ENCRYPTION; PRIVACY; MODEL;
D O I
10.1049/iet-its.2019.0833
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In cloud computing, data sharing and security are considered as the significant challenging issues in the present era. Until recently, considering secure data sharing in the cloud, several problems have been taken into consideration, such as data security, privacy, data integrity, confidentiality and resource scheduling. In this study, the hybridised cryptographic-integrated steganography (HCIS) algorithm has been used with auxiliary data inputs for secured data sharing in an internet of things assisted cloud environment for the urban transportation system. Further, the cryptography or cryptology generates code that provides a high level of privacy to the group or individual who can access cloud data. Furthermore, cryptography converts data into a secure format that is readable by an authorised user and steganography helps to transmit secret data to avoid the detection of information. The confidential data is extracted at its destination, and the encryption key has been utilised for hiding or effectively protecting data. The experimental results show that efficient and secure data sharing with multi-owners in cloud computing has been achieved using the HCIS method.
引用
收藏
页码:1497 / 1506
页数:10
相关论文
共 27 条
[1]   A Novel Intelligent Medical Decision Support Model Based on Soft Computing and IoT [J].
Abdel-Basset, Mohamed ;
Manogaran, Gunasekaran ;
Gamal, Abduallah ;
Chang, Victor .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) :4160-4170
[2]  
[Anonymous], 2018, PAKISTAN J BIOTECHNO
[3]   Trusted FPGA-based transport traffic inject, impersonate (I2) attacks beaconing in the Internet of Vehicles [J].
Appathurai, Ahilan ;
Manogaran, Gunasekaran ;
Chilamkurti, Naveen .
IET NETWORKS, 2019, 8 (03) :169-178
[4]   An energy persistent Range-dependent Regulated Transmission Communication model for vehicular network applications [J].
Baskar, S. ;
Periyanayagi, S. ;
Shakeel, P. Mohamed ;
Dhulipala, V. R. Sarma .
COMPUTER NETWORKS, 2019, 152 :144-153
[5]  
Bhagat P., 2017, INT J COMPUT SCO NET, V6, P438
[6]   Hierarchical attribute-based encryption with continuous auxiliary inputs leakage [J].
Guo, Yuyan ;
Li, Jiguo ;
Zhang, Yichen ;
Shen, Jian .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) :4852-4862
[7]   Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks [J].
Hu, Chengyu ;
Liu, Pengtao ;
Zhou, Yongbin ;
Guo, Shanqing ;
Wang, Yilei ;
Xu, Qiuliang .
SOFT COMPUTING, 2016, 20 (12) :4919-4932
[8]   Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption [J].
Jayapandian, N. ;
Rahman, A. M. J. Md. Zubair .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (02) :1561-1573
[9]   Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation [J].
Jiang, Tao ;
Chen, Xiaofeng ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2363-2373
[10]   RETRACTED: Intelligent face recognition and navigation system using neural learning for smart security in Internet of Things (Retracted Article) [J].
Kumar, Priyan Malarvizhi ;
Gandhi, Ushadevi ;
Varatharajan, R. ;
Manogaran, Gunasekaran ;
Jidhesh, R. ;
Vadivel, Thanjai .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4) :S7733-S7744