International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

Archives

TuEngr+Logo
:: International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

http://TuEngr.com



ISSN 2228-9860
eISSN 1906-9642
CODEN: ITJEA8


FEATURE PEER-REVIEWED ARTICLE

Vol.12(12) (2021)

  • A Blockchain Architecture for Cloud Gateway Environment and IoT

    Hanaa Mohammad Saied (Department of Business Management/ Information system, College of Science and Humanities in Al-Ghat, Majmaah University, Al-Majmaah 11952, Saudi Arabia and Faculty of Computing Science & IT, Cairo, Egypt, Ahram Canadian University Cairo, Egypt).
    Mona Gaber A. Abdel Hafez (Department of English, College of Science and Hummanites Majmaah University, Al-Majmaah 11952, SAUDI ARABIA).

    Disciplinary: Information Technology & Computer Systems.

    ➤ FullText

    doi: 10.14456/ITJEMAST.2021.247

    Keywords: Blockchain Architecture; Cloud gateway; Internet of Things (IoT); Information and communication technology (ICT); Network; Blockchain-based cloud-enabled architecture; Blockchain development stack; Cloud security; Device layer; Gateway layer; Cloud layer; Data management; DDoS.

    Abstract
    The main aim of this paper is to provide a theoretically and empirically grounded discussion on big data and to propose a conceptual framework for big data based on a temporal dimension. This study adopts two research methods. The first research method is a critical assessment of the literature that aims to identify the concept of big data in a cloud gateway. This method is composed of a search for source materials, the selection of the source materials, and their analysis and synthesis. It has been used to develop a conceptual framework for assessing a cloud gateway's readiness to adopt big data. The purpose of the second research method is to provide an initial verification of the developed framework. We built the suggested network using Ethereum blockchain technology and tested it against industry standards for security, Such as precision and security response time. The results show that the proposed security solutions achieve better results than the current solutions, and this architecture provides the following solutions to reduce the authentication, integrity, and confidentiality issues of the heterogeneous IoT and the central gates that make up the cloud gate. the results of our analysis show that, within appropriate E-business paradigms, BC technology can play an efficient role in facilitating active tasks for all activities over the architecture of IoT in many domains. We also experiment with our design and make a comprehensive discussion.

    Paper ID: 12A12P

    Cite this article:

    Saied, H. M., Hafez, M. G. A. (2021). A Blockchain Architecture for Cloud Gateway Environment and IoT. International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies, 12(12), 12A12P, 1-10. http://doi.org/10.14456/ITJEMAST.2021.247



References

  1. Ahram T, Sargolzaei A, Sargolzaei S, Daniels J, Amaba B. Blockchain technology innovations. In: 2017 IEEEtechnology & engineering management conference (TEMSCON), 2017.
  2. Bull P, Austin R, Popov E, Sharma M, Watson R. Flow-based security for IoT devices using an SDN gateway. In: 2016 IEEE 4th international conference on the future internet of things and cloud (FiCloud). 2016.
  3. Chandramohan J, Nagarajan R, Satheeshkumar K, Ajithkumar N, Gopinath PA, Ranjithkumar S (2017) Intelligentcloud gateway automation and security system using Arduino and Wi-fi. Int J Eng Comput Sci (IJECS) 6:20694-20698.
  4. Chen M, Yang J, Zhu X, Wang X, Liu M, Song J. Cloud gateway 2.0: innovative cloud gateway system powered by botanical IoT and emotion detection. Mob Netw Appl. 2017; 22:1159-1169.
  5. Copos B, Levitt K, Bishop M, Rowe J. Is anybody home? Inferring activity from cloud gateway network traffic. In: 2016 IEEE security and privacy workshops (SPW), 2016.
  6. Gartner. Gartner: blockchain and connected home are almost at the peak of the hype cycle. 2016. https ://prwire.com.au/pr/62010/gardener-blockchain-and-connected-home-are-almost-at-the-peak-of-the-hype-cycle . Accessed Dec 2019.
  7. Gu K, Yang L, Yin B Location data record privacy protection based on differential privacy mechanism. InfTechnol Control. 2018; 47(4):639-654.
  8. He S, Zeng W, Xie K, Yang H, Lai M, Su X. PPNC: privacy Preserving Scheme for Random Linear Network Coding Smart Grid. KSII Transact Internet Inf Sys. 2017; 11(3):1-10.
  9. Lee B, Malik S, Wi S, Lee JH. Firmware verification of embedded devices based on a blockchain. In: international conference on heterogeneous networking for quality, reliability, security and robustness, 2016.
  10. Lin H, Bergmann N. IoT privacy and security challenges for cloud gateway environments. Information. 2016; 7:1-1.
  11. Mittal Y, Toshniwal P, Sharma S, Singhal D, Gupta R, Mittal VK. A voice-controlled multi-functional cloud gateway automation system. In: 2015 Annual IEEE India conference (INDICON), 2015.
  12. Panwar N, Sharma S, Mehrotra S, Krzywiecki L, Venkatasubramanian N. Cloud gateway survey on security andprivacy. 2019. arXiv preprint. arXiv:1904.05476.
  13. Park JH, Salim MM, Jo JH, Sicato JC, Rathore S, Park JH. CIoT-Net: a scalable cognitive IoT based smart city network architecture. Human-centric Computing and Information Sciences. 2019; 9(1):1-20.
  14. Poh GS, Gope P, Ning J. Privhome: privacy-preserving authenticated communication in cloud gateway environment. IEEE Trans Depend Secure Comput. 2019. DOI: 10.1109/TDSC.2019.29149 11.
  15. Pongle P, Chavan G (2015) A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 international conference on pervasive computing (ICPC), 2015.
  16. Rathore S, Pan Y, Park JH. BlockDeepNet: a Blockchain-based secure deep learning for IoT network. Sustainability. 2019; 11(14):3960-3974.
  17. Rathore S, Park JH. Semi-supervised learning based distributed attack detection framework for IoT. Appl SoftComput. 2018; 72:79-89.
  18. Robles RJ, Kim TH, Cook D, Das S. A review on security in cloud gateway development. Int J Adv Sci Technol. 2010; 15:13-22.
  19. Sanchez I, Satta R, Fovino IN, Baldini G, Steri G, Shaw D, Ciardulli A. Privacy leakages in cloud gateway wireless technologies. In: 2014 international Carnahan conference on security technology (ICCST), 2014.
  20. Schiefer M. Cloud gateway definition and security threats. In: 2015 ninth international conference on IT security incident management & IT forensics, 2015.
  21. Sharma PK, Moon SY, Park JH () Block-VN: a distributed blockchain-based vehicular network architecture in the smart city. JIPS. 2017;13:184-195.
  22. Sharma PK, Rathore S, Park JH. DistArch-SCNet: blockchain-based distributed architecture with li-fi communication for a scalable smart city network. IEEE Consum Electron Mag. 2018; 7(4):55-64.
  23. Shouran Z, Ashari A, Priyambodo T. Internet of things (IoT) of cloud gateway: privacy and security. Int J Comput Appl. 2019; 182:3-8.
  24. Singh S, Sharma PK, Park JH. SH-SecNet: an enhanced secure network architecture for the diagnosis of security threats in a cloud gateway Sustainability. 2017; 9:1-19.
  25. Sivaraman V, Gharakheili HH, Vishwanath A, Boreli R, Mehani O. Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International conference on wireless and mobile computing, networking and communications (WiMob), 2015.
  26. Sun R, Xi J, Yin C, Wang J, Kim GJ. Location privacy protection research based on querying anonymous region construction for the smart campus. Mobile information systems. 2018.
  27. Wang J, Gao Y, Liu W, Sangaiah AK, Kim HJ. Energy-efficient routing algorithm with mobile sink support for wireless sensor networks. Sensors. 2019; 19(7):1468-1494.
  28. Xie K, Ning X, Wang X, He S, Ning Z, Liu X, Qin Z. An efficient privacy-preserving compressive data gathering scheme in WSNs. Inf Sci. 2017; 390:82-94.
  29. Xiong B, Yang K, Zhao J, Li K. Robust dynamic network traffic partitioning against malicious attacks. J Netw Comput Appl. 2017; 87:20-31.
  30. Yin C, Zhou B, Yin Z, Wang J. Local privacy protection classification based on human-centric computing.Human Comput Inf Sci. 2019; 9(1):33.


Other issues:
Vol.12(13)(2021)
Vol.12(11)(2021)
Vol.12(10)(2021)
Archives




Call-for-Papers

Call-for-Scientific Papers
Call-for-Research Papers:
ITJEMAST invites you to submit high quality papers for full peer-review and possible publication in areas pertaining engineering, science, management and technology, especially interdisciplinary/cross-disciplinary/multidisciplinary subjects.

To publish your work in the next available issue, your manuscripts together with copyright transfer document signed by all authors can be submitted via email to Editor @ TuEngr.com (no space between). (please see all detail from Instructions for Authors)


Publication and peer-reviewed process:
After the peer-review process (4-10 weeks), articles will be on-line published in the available next issue. However, the International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies cannot guarantee the exact publication time as the process may take longer time, subject to peer-review approval and adjustment of the submitted articles.