Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2019.9.11.008

An IoT Information Security Model for Securing Bigdata Information for IoT Users  

Jeong, Yoon-Su (Department of information Communication Convergence Engineering, Mokwon University)
Yoon, Deok-Byeong (Department of Business, Tongmyong University)
Shin, Seung-Soo (Department of Information Security, Tongmyong University)
Publication Information
Journal of Convergence for Information Technology / v.9, no.11, 2019 , pp. 8-14 More about this Journal
Abstract
Due to the development of computer technology, IoT technology is being used in various fields of industry, economy, medical service and education. However, multimedia information processed through IoT equipment is still one of the major issues in the application sector. In this paper, a big data protection model for users of IoT based IoT is proposed to ensure integrity of users' multimedia information processed through IoT equipment. The proposed model aims to prevent users' illegal exploitation of big data information collected through IoT equipment without users' consent. The proposed model uses signatures and authentication information for IoT users in a hybrid cryptographic method. The proposed model feature ensuring integrity and confidentiality of users' big data collected through IoT equipment. In addition, the user's big data is not abused without the user's consent because the user's signature information is encrypted using a steganography-based cryptography-based encryption technique.
Keywords
Steganography; IoT; User information; Bigdata; Information security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. Fan, D. J. He, X. Z. Pan & L. D. Ping. (2011). An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks. Journal of Zhejiang University-Science C-Computers & Electronics, 12(7), 550-560.   DOI
2 N. Gonzalez, C. Miers, F. Redigolo, T. Carvalho., M. Simplicio, M. Naslund & M. Pourzandi. (2011). A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing. 2011 IEEE Third International Conference on Cloud Computing Technology and Science, 231-238.
3 G. Garkoti, S. K. Peddoju & R. Balasubramanian. (2014). Detection of insider attacks in cloud based e-healthcare environment. Proceedings - 2014 13th International Conference on Information Technology( ICIT 2014), 195-200.
4 Q. A. Kester, L. Nana, A. C. Pascu, S. Gire, J. M. Eghan & N. N. Quaynor. (2015). A Security Technique for Authentication and Security of Medical Images in Health Information Systems. Proceedings - 15th International Conference on Computational Science and Its Applications(ICCSA 2015), 8-13.
5 J. J. Yang, J. Q. Li & Y. Niu. (2015). A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems, 43(44), 74-86.
6 X. B. Li & L. Z. Lu. (2015). General Construction Method of Multilength Optical Orthogonal Codes With Arbitrary Cross-Correlation Constraint for OCDMA Multimedia Network. Journal of Optical Communications and Networking, 7(3), 156-163.   DOI
7 J. G. Ko., C. Lu., M. B. Srivastava., J. A. Stankovic., A. Terzis. & M. Welsh. (2010). Wireless sensor networks for healthcare. Proceedings of the IEEE, 98(11), 1947-1960.   DOI
8 S. C. Rathi & I. Technology. (2012) Medical Image Authentication through Watermarking Preserving ROI. Health Information - An International Journal, 2, 292-295.
9 G. Virone., A, Wood. L. Selavo., Q. Cao., L. Fang., T. Doan. & J. A. Stankovic. (2006). An Advanced Wireless Sensor Network for Health Monitoring. Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare (D2H2), 2-5.
10 M. AI Ameen., J. Liu & K. Kwak. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93-101.   DOI
11 D. Liu, T. Song & Y. Dai. (2005). Isomorphism and generation of Montgomery-form elliptic curves suitable for cryptosystems. Tsinghua Science and Technology, 10(2), 145-151.   DOI
12 S. M. R. Islam, D. Kwak, M. Kabir, M. Hossain &. Kwak. (2015). The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access, 3, 678-708.   DOI
13 L. Catarinucci, D. de Donno, L. Mainetti, L. Palano, L. Patrono, M. L. Stefanizzi & L. Tarricone. (2015). An IoT-Aware Architecture for Smart Healthcare Systems. IEEE Internet of Things Journal, 2(6), 515-526.   DOI
14 S. K. Datta, C. Bonnet, A. Gyrard, R. P. Ferreira da Costa & K. Boudaoud. (2015). Applying Internet of Things for personalized healthcare in smart homes, WOCC, 164-169.
15 T. Yang, D. Mu, W. Hu & H. Zhang. (2014). Energy-efficient border intrusion detection using wireless sensors network. EURASIP Journal on Wireless Communications and Networking, 1, 46.
16 H. Samani & R. Zhu. (2016). Robotic Automated External Defibrillator Ambulance for Emergency Medical Service in Smart Cities. IEEE Access, 4, 268-283.   DOI