Abstract
The internet of thing which is a prominent network for the transmission of valuable information over the internet, by tracking, computing and refining handles large scale of information as it being engaged in a wide range of application, ranging from the home to industries and government concerns. It provides with the capability of the transmitting information's over internet without the interference of the humans. Despite its potentials, the internet of the things suffer from limited storage facilities and seek the services of the cloud to assist with the storage provisions for the data that are being sensed. Though cloud is facilitated with the enormous resources of storage, the placing of the sensed data into the cloud would be energy consuming and prone to the security threats causing illegal access. So the paper proposes the multi-objective optimization technique based on the NDSGA-II to present with the optimal solutions for the energy and the security issues involved in the locating of the data into the cloud. The proposed method is validated using the network simulator-II to detail its efficiency, in terms of energy consumption, security, network longevity, and resource utilization.
References
- Ding, Wenxiu, Xuyang Jing, Zheng Yan, and Laurence T. Yang. "A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion." Information Fusion 51 (2019): 129-144.
- Wazid, Mohammad, Ashok Kumar Das, Rasheed Hussain, Giancarlo Succi, and Joel JPC Rodrigues. "Authentication in cloud-driven IoT-based big data environment: Survey and outlook." Journal of Systems Architecture 97 (2019): 185-196.
- Xu, Jie, Kaiping Xue, Shaohua Li, Hangyu Tian, Jianan Hong, Peilin Hong, and Nenghai Yu. "Healthchain: A Blockchain-based Privacy Preserving Scheme for Large-scale Health Data." IEEE Internet of Things Journal (2019).
- Liu, Yi-Ning, Yan-Ping Wang, Xiao-Fen Wang, Zhe Xia, and Jing-Fang Xu. "Privacy-preserving raw data collection without a trusted authority for IoT." Computer Networks 148 (2019): 340-348.
- He, Yu, Guangjie Han, Hao Wang, James Adu Ansere, and Whenbo Zhang. "A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things." Future Generation Computer Systems 96 (2019): 438-448.
- Wang, Hao, Guangjie Han, Lina Zhou, James Adu Ansere, and Wenbo Zhang. "A source location privacy protection scheme based on ring-loop routing for the IoT." Computer Networks 148 (2019): 142-150.
- Luceri, Luca, Felipe Cardoso, Michela Papandrea, Silvia Giordano, Julia Buwaya, Stephane Kundig, Constantinos Marios Angelopoulos et al. "VIVO: A secure, privacy-preserving, and real-time crowd sensing framework for the Internet of Things." Pervasive and Mobile Computing 49 (2018): 126-138.
- Conti, Mauro, Ali Dehghantanha, Katrin Franke, and Steve Watson. "Internet of Things security and forensics: Challenges and opportunities." (2018): 544-546.
- Sarwar, Kinza, Sira Yongchareon, and Jian Yu. "A Brief Survey on IoT Privacy: Taxonomy, Issues and Future Trends." In International Conference on Service-Oriented Computing, pp. 208-219. Springer, Cham, 2018.
- Shen, Jian, Chen Wang, Tong Li, Xiaofeng Chen, Xinyi Huang, and Zhi-Hui Zhan. "Secure data uploading scheme for a smart home system." Information Sciences 453 (2018): 186-197.
- Sastry, Naveen, Umesh Shankar, and David Wagner. "Secure verification of location claims." In Proceedings of the 2nd ACM workshop on Wireless security, pp. 1-10. ACM, 2003.
- Zhou, Jun, Zhenfu Cao, and Xiaolei Dong. "BDK: secure and efficient biometric based deterministic key agreement in wireless body area networks." In Proceedings of the 8th international conference on body area networks, pp. 488-494. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2013.
