Enhancing IoT Cloud Security Using a Hybrid Cryptography Method

Categories: Technology

Abstract

Information exchange between items (things), having detecting or registering capacities or both over the web is known as the Internet of Things (IoT). IoT and Cloud computing coordinated to shape a stage called IoTcloud. Since these advancements are altogether utilized, there is a requirement for the security of information accumulated from the gadgets associated through these advances. To solve the transport issue in the symmetric key algorithm and to acquire the high performance, the proposed method and RSA algorithm are combined together.

While actualizing the proposed framework, the symmetric key algorithm utilizes low RAM for preparing, in this way, it gives rapid.

RSA is one of the best and secures asymmetric encryption method. Here it is used only to encrypt the symmetric key, for this, it requires a negligible computational cost. The proposed method using DNA cryptography and Huffman coding for encrypting and decrypting data. DNA Cryptography can have a special advantage for secure authentication, data storage, steganography, digital signatures and so on.

Get quality help now
Bella Hamilton
Bella Hamilton
checked Verified writer

Proficient in: Technology

star star star star 5 (234)

“ Very organized ,I enjoyed and Loved every bit of our professional interaction ”

avatar avatar avatar
+84 relevant experts are online
Hire writer

Huffman code is a sort of ideal prefix code. What's more, it is ordinarily utilized for lossless information compression. This methodology utilizes variable key length so aggressor won't almost certainly surmise the length of the key recognition.

Introduction

Data exchange between objects over network with sensing and computing capabilities are termed as Internet of Things (IoT). IoT relies upon sharp and self-designing hubs controlled in a dynamic and worldwide condition [1]. It is a standout amongst the most developing advancements, empowering the objects to connect world. IoT is commonly portrayed as little objects with constrained capacity and handling limit.

Get to Know The Price Estimate For Your Paper
Topic
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

It permits devices, for the most part, installed in everyday objects, (for example, a cooler, lights, conditioner, fan, etc.) with the beforehand referenced abilities, and are controlled and communicated over the web. Cloud computing has started late grabbed prominence and formed into a noteworthy pattern in Data Innovation [2]. It is the most recent innovation in the field of distributing and furthermore gives different on the web and onrequest benefits for putting away the information. Different associations are anxious to utilize administrations of cloud because of the information security given by the cloud. With the tremendous utilization of IoT and Cloud computing.

The combination of cloud and IoT is called as IoTcloud. In the IoT cloud, the major issue is to give the security of data gathered from the articles related to the web. Security for any correspondence through the system can be given by the Authentication, Encryption, Decryption, Message authentication code, Hash function, and Digital signature and so on.

A hybrid methodology utilizing DNA cryptography and Huffman coding is proposed in this paper. This methodology utilizes variable key length with the goal that the aggressor won’t almost certainly surmise the length of the key. The applications of IoT are extensive. IoT has applications extending from wearable gadgets to Savvy homes. Wireless technologies, internet and Microelectromechanical Systems (MEMS) are evolved in IoT. It can be measured as the Internet of Everything.

Methodology

DNA Cryptography and Huffman Coding

This strategy depicts correspondence between IoT gadgets and the Portal(Gateway). Here the mix of Symmetric and Asymmetric cryptographic systems is proposed for the transmission of information inside the IoT organize for Intra-System security. The same cryptographic keys are used in Symmetric cryptography for both encryption and decryption processes. Asymmetric cryptography utilizes key sets: public keys and private keys, where public keys are freely accessible to everybody, and private keys are known just to the proprietor. Public key of the receiver is used in encryption, whereby the receiver can decrypt the message encrypted with the public key who is the only owner of the paired private key. In this method modified vigenere cipher [3] is used for Symmetric key encryption. The Asymmetric cryptographic algorithm is the RSA Algorithm. At the sender end, firstly get the current timestamp and create a random key K using current stamp. Then obtain the data P to be transmitted and use the modified Vigenere Cipher to encrypt P using the random key K for obtaining ciphertext C.

Next we have to obtain the public key Pk of the receiver. Then use RSA Algorithm to encrypt the random key K for obtaining the encrypted Key E. Then con- catenate the encrypted key E and the ciphertext C for obtain the encrypted message. Transmit this message to the receiver. At the Receiver’s end, firstly receive message from the sender. At that point split the message into two, ciphertext C and encoded key E. After this utilization RSA to decode E utilizing its own private key for acquiring irregular key K. Changed Vigenere cipher can be utilized to unscramble the ci- phertext C utilizing the key K for acquiring plaintext message P.

Security of IoT Using Encryption Algorithms

Hybrid encryption will combine two or more encryption systems. Hybrid encryption technique is mainly used for information confidentiality, integrity, non-repudiation in data exchange for IOT. In this paper, a hybrid encryption algorithm with the name of HAN [4] were analyzed. Special features in encryption and decryption in this pro- posed system is described in terms of speed even in building keys. During algorithm implementation several structures and digital signature were used to improve internet security.

In AES, key production procedure is used for create a key. Right off the bat, two 4 X 4 matrices, which are called key and remain, are utilized to deliver a key for encryption. It can pick a spot from the matrix and a key from the key system indiscriminately. Then deliver open key of I by sender in XOR task. From AES calculation, this progression of HAN calculation has been drawn. Delivered key of I is based on hexa- decimal. At that point open key K is created. Here concealed message is send from sender to recipient.

The private key is simply known by the receiver and open key K by both sender and receiver. Expect that a message is sent to the collector from the sender in which the message in multinomial is called message. The sender self-assertively picks a multinomial like m from the gathering (Lm) subsequently to make a multinomial message. In this way, it ought not be uncovered by the sender. At that point, this scrambled message will be transmitted to the recipient as an encryption message. Digital signature only for message legitimacy and evidence of security and character. For Digital signature, it must be from the sender to the recipient, so the beneficiary of the past development goes about as the sender now.

Proposed System

The proposed system describes about the combination of Symmetric key and Asym- metric key cryptography. Symmetric key calculation requires low RAM for handling accordingly it gives fast. When contrasted with symmetric key algorithm, Asymmetric key algorithm (like RSA) does not having any issue to exchange the key. For settling the issue of key transport in symmetric key encryption and to acquire the elite, proposed strategy and RSA calculation are joined together. To encrypt the message asymmetric key algorithm that is RSA is utilized just to encode the symmetric key during the execution. For this it requires inconsequential computational cost.

DNA Coding

The proposed method using DNA cryptography [5] and Huffman coding [6] for en- crypting and decrypting data. This methodology utilizes variable key length with the goal that attacker won't almost certainly surmise the length of the key. The proposed methodology utilizing the information at two dimensions by using the Huffman En- coding algorithm. DNA strand which is principally comprised of 4 nitrogenous bases to be specific: Adenine (A), Thymine (T), Guanine (G), Cytosine (C). The most ef- fortless approach to encode is to speak to these four units as four information:

A (0) – 00, T (1) – 01, G (2) – 10, C (3) – 11.

Huffman Coding

For lossless information compression, Huffman code (that is a kind of optimal prefix code) is regularly utilized. The Huffman methodology of acquiring the variable length code is given in the accompanying calculation.

Huffman Procedure

Firstly, acquire the tally of A, G, C and T from the DNA encoded string. At that point mastermind the characters in climbing request with loads. After this Take 2 least loads and add them at that point elevate it to another weight. At that point speak to indorsed load as root and 2 least loads as left and right offspring of the root. Rehash stage 3 and 4 until a solitary tree is assembled. Name left kid with 0 and right tyke as 1 from the root. Acquire the double grouping for A, G, C, T. Take all combinations of AGCT such as AA, AG, AC, AT, GA..... etc.

Encryption

Input (Plaintext) is converted into hexadecimal value and then to binary value. Bit- wise complement is performed in this result. Using level-1 key, the obtained binary value is encrypted that is AGCT codes. This DNA coded ciphertext is again scram- bled utilizing the level-2 keys got from Huffman Encoding. After applying level-2 keys binary coded cipher text is obtained.

Decryption

By using level-2 key, which is shared between the two parties will be encrypt the data. For converting the DNA sequence, apply level-1 key to this binary format. After complementing, obtained binary string will be converted into hexadecimal value. At long last, the hexadecimal esteem is changed over back to the plain content to get the unscrambled message. Consider the below example where the is message is “CRYPTOGRAPHY”.

PLAIN TEXT = CRYPTOGRAPHY

HEXADECIMAL = 43 52 59 50 54 4f 47 52 41 50 48 59

BINARY EQUIVALENT = 0100 0011 0101 0010 0101 1001 0101 0000 0101

0100 0100 1111 0100 0111 0101 0010 0100 0001 0101 0000 0100 1000 0101 1001

COMPLEMENT = 1011 1100 1010 1101 1010 0110 1010 1111 1010 1011 1011

0000 1011 1000 1010 1101 1011 1110 1010 1111 1011 0111

Apply level -1 key

DNA CODING = GC CA GG CT GG TG GG CC GG GC AA GC TA GG CT TT

AG CG CC GC TC

Apply level -2 key

DNA CODING = GC GC GC AT GC CG CT CC GC CA GG CT GG TG GG CC

GG GC GC AA GC GA GG CT GC CG GG CC GC TC

Binary Encrypted Message

0100101011010100011010011100111101011110110100000010110001101001101

011110110100101

Implementation in IoT

From different sensors, the edge devices (like smaller scale controller, workstation or cell phones) continue reading to creating the data that it gets from the environment. Presently, this information is explicitly transmitted to the cloud by using any micro- controller or cell phone which approaches the web. In the midst of the transmission, there are a few conceivable outcomes of assault fundamentally ridiculing and sniffing. The readings may respect medicinal services or money related subtleties, where as- sault can't go on without serious consequences. Along these lines, the most secure path is to encode the information before transmitting it to the cloud. To accomplish this, one can't generally depend on the mobile phones to complete the handling which results in deferral and utilization of more power.

The information that is gathered from sensors is gathered by the microcontroller or the cell phone. This is bolstered to the proposed encryption technique. This square takes keys for encryption with information. It forms the information and gives out the scrambled information and it will send back to the microcontroller/cell phone. At the edge gadget which associates it to the cloud, python code is running. The IP address for the cloud is noted down. Also, it is constantly transmitted as long as it is associated with the web. This encrypted information is put away in cloud everlastingly, at whatever point anybody other than the transmitter wishes to get to the information, a demand must be sent to the transmitter.

The transmitter utilizes the general population key given by the requester and encrypt the key used for the encryption of information and this is transmitted back to the requester. In the wake of accepting the connection and key utilized for encryption, the beneficiary can without much of a stretch decode the key from the private key. Later utilizing the key got after decoding by RSA [7], the information is decrypted from its encoded form, which can be additionally utilized for the required analysis or observation.

Performance Analysis

Huffman coding calculation's yield can be seen as a variable-length code table for encoding a source symbol, for example, a character in a record. In light of the evaluated likelihood or recurrence of the event (weight) for every conceivable estimation of the source symbol, it derives this table. More common symbols are generally repre sented using fewer bits than less common symbols. Physical size of a repeating string of characters [8] is reduced in Run-length encoding (RLE) process. This repeating string is known as run also, is commonly encoded into two bytes. The main byte im- plies the number of characters in the run and is known as the run count. In Uncom pressed, 16 T characters would usually need 16 bytes to store TTTTTTTTTTTTTTTT. After RLE encoding the similar strings would require just two bytes: 16T. The 16T code created to mean the character string is called an RLE parcel. The main byte speaks to the run check for example 16 and the second byte speaks to the run esteem. RLE plans are straightforward and quick, yet their pressure productivity relies upon the kind of picture information being encoded.

Conclusion

Combination of symmetric-key and asymmetric-key encryption technique for securing data in IoT Cloud is proposed. Symmetric key algorithm require low RAM for preparing in this way it gives fast. When contrasted with symmetric-key algorithm, Asymmetric key encryption (like RSA) does not having any issue to trade the key. For settling key transport issue in symmetric key encryption and to get the elite, proposed strategy and RSA calculation are consolidated together. Hybrid encryption is achieved through information exchange utilizing special session keys alongside symmetrical encryption.

One favorable position is that association channel is built up between two clients' arrangements of equipment. Clients at that point can interface through hybrid encryption. Uneven encryption can back off the encryption procedure, however with the concurrent utilization of symmetric encryption, the two types of encryption are progressed. The outcome is the additional security of the transmittal procedure alongside generally enhanced system performance. In a usage, the Asymmetric key calculation that is RSA is utilized just to encode the symmetric key, for this it re-quires lesser computational cost. The strategy utilizing DNA cryptography and Huffman coding for encoding and decrypting data.

References

  1. W. Bruce D, GR. Milne, Y. G. Andonova, and F M. Hajjat. 'Internet of Things: Convenience vs. privacy and secrecy.' Business Horizons 58, no.6, Science Direct, pp. 615-624, 2015.
  2. Prajapati Ashishkumar B, Prajapati Barkha, “Implementation Of Dna Cryptography In Cloud Computing And Using Socket Programming”G. IEEE International Conference on Computer Communication and Informatics (ICCCI -2016), 2016.
  3. Gurpreet Singh, Supriya,”Modified Vigenere Encryption Algorithm and Its Hybrid Im- plementation with Base64 and AES”, 2nd International Conference on Advanced Computing, Networking and Security-2013.
  4. Amirhossein Safi, “Improving the Security of Internet of Things Using Encryption Algorithms”, World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering - 2017
  5. Rakesh Kumar Jangid, Noor Mohmmad, Abhishek Didel , Swapnesh Taterh, “Hybrid Approach of Image Encryption Using DNA Cryptography and TF Hill Cipher Algrithm”, IEEE International Conference on Communication and Signal Processing, 2014, pp. 934.
  6. Nidhi Dhawale, “Implementation of Huffman algorithm and study for optimization”, International Conference on Advances in Communication and Computing Technologies (ICACACT 2014).
  7. R. L. Rivest, A. Shamir and L. Adleman, ”A method for obtaining digital signatures and public-key cryptosystem”, Communi. ACM, vol. 21 no. 2, pp. 120-126.
  8. Rupali B. Patil,K. D. Kulat, ”Audio compression using dynamic Huffman and RLE co ing”, 2nd International Conference on Communication and Electronics Systems (ICCES-2017).

 

 

 

 

 

 

 

 

 

 

 

Updated: Feb 18, 2024
Cite this page

Enhancing IoT Cloud Security Using a Hybrid Cryptography Method. (2024, Feb 18). Retrieved from https://studymoose.com/document/enhancing-iot-cloud-security-using-a-hybrid-cryptography-method

Live chat  with support 24/7

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment