Abstract

As IoT (Internet of Things) devices are diversified in the fields of use (manufacturing, health, medical, energy, home, automobile, transportation, etc.), it is becoming important to analyze and process data sent and received from IoT devices connected to the Internet. Data collected from IoT devices is highly dependent on secure storage in databases located in cloud environments. However, storing directly in a database located in a cloud environment makes it not only difficult to directly control IoT data, but also does not guarantee the integrity of IoT data due to a number of hazards (error and error handling, security attacks, etc.) that can arise from natural disasters and management neglect. In this paper, we propose an optimized hash processing technique that enables hierarchical distributed processing with an n-bit-size blockchain to minimize the loss of data generated from IoT devices deployed in distributed cloud environments. The proposed technique minimizes IoT data integrity errors as well as strengthening the role of intermediate media acting as gateways by interactively authenticating blockchains of n bits into n + 1 and n − 1 layers to normally validate IoT data sent and received from IoT data integrity errors. In particular, the proposed technique ensures the reliability of IoT information by validating hash values of IoT data in the process of storing index information of IoT data distributed in different locations in a blockchain in order to maintain the integrity of the data. Furthermore, the proposed technique ensures the linkage of IoT data by allowing minimal errors in the collected IoT data while simultaneously grouping their linkage information, thus optimizing the load balance after hash processing. In performance evaluation, the proposed technique reduced IoT data processing time by an average of 2.54 times. Blockchain generation time improved on average by 17.3% when linking IoT data. The asymmetric storage efficiency of IoT data according to hash code length is improved by 6.9% on average over existing techniques. Asymmetric storage speed according to the hash code length of the IoT data block was shown to be 10.3% faster on average than existing techniques. Integrity accuracy of IoT data is improved by 18.3% on average over existing techniques.

Highlights

  • Over the past few years, the IoT (Internet of Things) has been utilized in a variety of areas such as healthcare, environment, military, transportation, and IT [1], as various technologies related to the IoT have emerged in the cloud environment [1]

  • We propose an optimized hash processing technique that can minimize the integrity errors of data generated by numerous IoT devices deployed in distributed cloud environments

  • This section is based on Monte Carlo, which parameters are used in simulation to verify the integrity of IoT data deployed in distributed cloud environments

Read more

Summary

Introduction

Over the past few years, the IoT (Internet of Things) has been utilized in a variety of areas such as healthcare, environment, military, transportation, and IT [1], as various technologies related to the IoT have emerged in the cloud environment [1]. We propose an optimized hash processing technique that can minimize the integrity errors of data generated by numerous IoT devices deployed in distributed cloud environments. The proposed technique used polynomial multiplication and security comparison to allow IoT data to be configured as building blocks to be optimized for distributed environments, and load balance was performed after asymmetric hash of IoT data to minimize errors in IoT data integrity. Through this process, the proposed technique allows minimum errors of collected IoT data while ensuring the linkage of IoT data.

Related Works
Overview
System Architecture
Device Layer
Load Balance Layer
Treatment Layer
Cloud Layer
Creation of IoT Information
Properties Creation by IoT Data Type
Propertiesininthe thecreation creation of
IoT Data Block Processing
InofFigure
Evaluation
Environment Setting
Evaluation of IoT Data Processing Time
Storage Rate According to Hash Code Length of IoT Data Block
IoT Data Storage Efficiency of Servers
Blockchain Link Creation Time Comparison
Integrity Accuracy of IoT Data
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call