• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2016, Volume: 9, Issue: 45, Pages: 1-13

Original Article

Security Architecture for the Cloud Integrated Internet of Things

Abstract

Objectives: To design efficient hybrid architecture for data security is applied for securing communication link between two user/senders by considering symmetric key algorithm and asymmetric key algorithm. Methods/ Analysis: A highly efficient architectures for data security is applied for securing communication link between two user/senders in cloud integrated Internet of Things (IoT). Data is encrypted with Advanced Encryption Standard (AES) algorithm and Elliptical Curve Cryptography (ECC) concept is used for securing the secret key between user/ sender and system/receiver. In this architecture authentication is provided by Elliptic Curve Diffie Hellman algorithm between user/sender and system/receiver. The efficient hybrid architecture is implemented on Field Programmable Gate Array (FPGA) and is scripted in verilog Hardware Description language (HDL).Findings: According to the IoT concept, Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN) meet new challenges related to large volume of data. The physical things in an IoT are generally identified by WSN or RFID before connecting with each other. Once identified, they can interchange data between them. Cloud computing provides virtual infrastructure for storing, analyzing, and virtualization large data in client delivery. Data transferring like storing and retrieving from cloud by different user/senders should be secure from Men in the Middle (MIM) attack of information. The outcomes obtained shows that the efficient cryptosystem with encryption and decryption has a minimum period of 18.060ns with the maximum achievable frequency of 55.371MHz on Xilinx Virtex-5 (XC5VLX50T-1FF1136).Novelty/ Improvement: In this paper ECC algorithm is for providing security communication between user/senders and system/receiver. ECC encryption is used for encrypting the request of user/senders connected to the receiver. The file in the system/receiver is accessed by the user/sender and the file is encrypted by system/receiver using user/ sender’s public key. When uploading the files system/receiver encrypts the file using AES encryption algorithm or while downloading the file from data storage the system/receiver decrypts the data or file using AES algorithm.

Keywords: Advanced Encryption Standard (AES), Cloud Computing, Elliptic Curve Cryptography (ECC), Elliptic Curve Diffie-Hellman-Merkle, Internet of Things (IoT), Key Exchange

DON'T MISS OUT!

Subscribe now for latest articles and news.