Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Measurement: Sensors 24 (2022) 100486

Contents lists available at ScienceDirect

Measurement: Sensors
journal homepage: www.sciencedirect.com/journal/measurement-sensors

Service Constraint NCBQ trust orient secure transmission with IoT devices
for improved data security in cloud using blockchain
Premkumar R.*, S. Sathya Priya
Department of Computer Science and Engineering, Hindustan Institute of Technology and Science, Chennai, India

A R T I C L E I N F O A B S T R A C T

Keywords: Problem of secure transmission in cloud systems has been well studied; there exist number of approaches dis­
Cloud security cussed around the problem. Number of threats has been identified in cloud which targets the services and data
IoT behind them. To mitigate the threats, different approaches are discussed in literature. The most approaches uses
Block chain
behavior of user in measuring trust, and some of them uses data level features in measuring trust of user. Also,
Data security
SCNCQB-TSTP
various data encryption schemes are discussed which suffer with poor performance in security achievement. To
NCBQ handle this issue, an efficient Service Constraint NCBQ (Network Condition and Behavior Quality) Trust orient
SCBM secure transmission protocol (SCNCQB-TSTP) is presented in this article. The proposed model involves in secure
Data encryption transmission by analyzing various factors of network, user behavior and quality of service. The method discovers
Secure transmission score set of routes to reach the service point and fetches several information about the transmission route like traffic,
Service constraint block chain model transmission frequency, bandwidth, IoT devices, hop count, throughput, and bandwidth utilization. According to
the above information fetched about different routes, the method analyzes the trust of each route in three ways
like Network Support Analysis, Behavior Support Analysis and QoS-Support Analysis. Based on the result of
different analysis, the method estimates the value of Secure Transmission Score (STS). According to the value of
STS, an optimal route has been selected to perform data transmission. Similarly, the method adapts Service
Constraint Blockchain Model (SCBM) towards data security, which classifies the services in various levels. Ac­
cording to the service claimed by the user, the service data has been encrypted with specific class of scheme and
key. Further, encrypted data has been placed is adapted to block chain to perform data transmission. The pro­
posed SCNCQB-TSTP model improves the performance of secure transmission and data security.

1. Introduction Towards services, there are number of threats identified which target
the services available and degrades the performance of the service by
The growth of information and communication technology has claiming numerous number of services and holding them without using
encouraged the global users in accessing various services independent of further. Also, there are few other type of threats can be named which
their location through different devices. Also, the emerge of cloud target the service performance, which would place illegal data, does not
environment stimulate the organizations in moving their data to cloud following the protocol of the service, format and so on. Each would
and maintaining them with little cost. The entry of cloud environment affect the performance of the service and degrade the service perfor­
allowed the users of the environment to access the data through set of mance. On the other side, the service point would be far away from the
services. This methodology allowed the organizational employees to user location which cannot be accessed directly by the user. In this case,
work together independent of their location in a collaborative manner. the service data has been forwarded through number of intermediate
The cloud service provider enables number of services and allows the nodes like wireless nodes, IoT (Internet of Things) devices, routers and
organizational users in accessing the services to perform their task. Like other networks. In this case, there is a possibility of containing malicious
any environment, the cloud also faces number of challenges in terms of node in the route identified. The presence of malicious node in the route
threats towards data as well as services. would target the data, service or both. The malicious user would directly

Abbreviations: IoT, Internet of Things; SCNCQB, Service Constraint Network Condition and Behavior Quality; TSTP, Trust orient secure transmission protocol;
NCBQ, Network Condition and Behavior Quality; SCBM, Service Constraint Blockchain Model; STS, Secure Transmission Score.
* Corresponding author.
E-mail address: premkumar.raju@gmail.com (R. Premkumar).

https://doi.org/10.1016/j.measen.2022.100486
Received 13 August 2022; Received in revised form 21 September 2022; Accepted 26 September 2022
Available online 1 October 2022
2665-9174/© 2022 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-
nc-nd/4.0/).
R. Premkumar and S. Sathya Priya Measurement: Sensors 24 (2022) 100486

drop the packet or modify the data or route the packet in an unsuitable migration approach for resource-constrained IoT systems. A Deep
route. In all the cases, the service performance gets reduced and affects Blockchain Framework-with Collaborative Intrusion Detection is pre­
the entire QoS performance. sented in Ref. [11], in the sense to protect IoT and cloud environments.
The presence of malicious nodes has been detected and mitigated in The model uses learning-based ensemble models in identifying mali­
several ways. There are different ways in transmitting the data in secure cious events on different virtual machines. A detailed review on
way, for example, secure transmission can be performed by choosing a detecting intrusion attack with blockchain is presented in Ref. [12],
secure route, encrypting the data with efficient encryption scheme. which works on collaborative manner in detecting anomalies.
Towards secure routing, there are numbers of approaches available A Virtual Machine Introspection (VMI) based security architecture
which select a route according to the trust of the routes where the trust design is presented in Ref. [13], which monitors the VM at process level
value is measured by considering different metrics like earlier trans­ and detect the attacks at the process level. The behaviors of the processes
mission, throughput support and so on. However, the methods do not are monitored in supporting the detection of attack. A novel approach to
consider other metrics like the network condition, the support of nodes handle brute force and DDOS attacks in cloud has been presented in
in achieving the required QoS performance and behavior of nodes. In Ref. [14], which consider the activities of services in detecting intrusion
case of data encryption, there are number of approaches described like attack. A blockchain based distributed approach in detecting intrusion
Attribute based encryption (ABE). Still the methods struggle to achieve attack is presented in Ref. [15], which uses Blockchain upon a stable
higher performance in data security as the adversary is capable of platform like cloud infrastructure [12]. A random forest based intrusion
tampering the encoded data. To improve the data security as well as detection scheme is presented in Ref. [16], which uses network traffic
route security, the blockchain techniques are recently encouraged by data in identifying the intrusion attack using various tools like tcpdump.
researchers. By adapting blockchain technique, the access restriction A honeypot based detection scheme is presented in Ref. [17], which
can be performed in block level as the blocks of the chain has been uses various security measures. A cloud based intrusion detection
allowed to access by only reputed and authorized users according to the scheme is presented in Ref. [18], which consider different features in
design. Also, the data in the block can be accessed and decrypted only by detecting the intrusion attack. A deep blockchain framework (DPF) is
the users who are dedicated for that [1]. designed towards intrusion detection and smart contracts are presented
By considering all these constraints, an efficient Service Constraint in Ref. [19]. The method uses bidirectional long short-term memory
NCBQ Trust orient secure transmission protocol Trust Orient Secure (BiLSTM) scheme in assessing different data sets.
Transmission Protocol with Blockchain (SCNCBQ-TSTP) is presented. A Network Intrusion Detection System as a Service (NIDSaaS) is
The model is designed to transmit data by choosing a route according to presented to support openstack model in Ref. [20], which uses command
trust value measured with Network Support Analysis, Behavior Support line interface (CLI) to integrate network intrusion detection system with
Analysis and QoS-Support Analysis. Also, the data level security has tenants. A Swarm Intelligence Based Feature Selection model has been
been enforced with Service Constraint Blockchain Model (SCBM) which presented in Ref. [21], towards intrusion detection. The method uses
improves data security. Multi-service networks rely on a (usually Whale Pearson hybrid feature selection wrapper and Whale optimiza­
centralized) authority to oversee and coordinate their different delivery tion Algorithm (WOA). The method identifies the intrusion attack ac­
at certain pricing in order to efficiently supply various items inside the cording to different features. A detailed review on different approaches
same infrastructure. Final consumers, in turn, are continuously looking in detecting attack on openstack cloud is presented in Refs. [22,24].
for ways to cut costs while enhancing quality and trustworthiness. The Also, a Network Intrusion Detection System (NIDS) is presented in
detailed approach has been sketched in next sections. detecting the attack with network traffic [31,32].
A detailed analysis of different anomaly detection scheme and ma­
2. Related works chine learning techniques are presented in Ref. [23]. A cuckoo search
with ANN towards intrusion detection is presented in Ref. [24], where
There exist number of approaches towards secure transmission and cuckoo search is used for feature selection and intrusion detection is
data security in cloud. Some of the approaches are discussed in detail in performed using ANN. A Security Infrastructure for Vehicular Informa­
this section. tion Using SDN is presented in Ref. [25], which uses protective measures
An SVM based encryption service model is presented in Ref. [2], towards intrusion detection. A VMI-Based Security Architecture for
which generates key in formal process to support data encryption in Intrusion Detection (VMGuard) is presented in Ref. [26], which monitor
cloud environment. A centralized low-latency, secure and reliable the process level and detects the attacks. CLOUD-IOT Based Smart Villa
decision-making algorithm having powerful emergency handling ca­ Intrusion Alert System is presented in Ref. [27], whichcontains com­
pacity (LSRDM-EH) is presented in Ref. [3], which improves the network ponents to detect illegal entry, location detection API, and image of
security with blockchain using multidimensional strategy. An optimal illegal object, alarm, water springer in detect intruders.
blockchain deployment method is presented to support IoT [4], which Deep reinforcement learning-based adaptive cloud IDS architecture
consider the limited resources of IoT devices and their vulnerability. The is presented in Ref. [28], which perform accurate detection and
method checks all the transaction by adjusting the blocks in a dynamic fine-grained classification of new and complex attacks. A deep learning
way. The method uses chaotic based genetic algorithm to assign the model combined with kernelized support vector machine to handle
length of blocks in chain. multi stage jamming attack is presented in Ref. [29]. In Ref. [30], an
A deep learning model with blockchain security is presented in efficient security model is presented which monitor different devices in
Ref. [5] to support 5G networks, which uses the chain in different layers detecting various attacks to provide optimal solution to protect from
of cloud like cloud, fog, edge and user. A blockchain based authentica­ threats.
tion scheme is presented in Ref. [6], which uses modular square root and All the above discussed approaches suffer to achieve expected per­
block chain in improving the performance. A block chain based access formance in data security as well as secure transmission.
control approach is presented in Ref. [7], to support smart grid systems.
The DBACP-IoTSG is designed to handle various attacks. A smart con­ 3. Service Constraint NCBQ trust orient secure transmission
tract based blockchain envisioned model is presented in Ref. [8], which using blockchain
enforces device to device authentication and device to gateway
authentication. The proposed approach maintains different traces of data trans­
A fuzzy logic based block chain model (FBASHI) is presented in mission performed earlier. The transmission traces contains number of
Ref. [9], which uses behavior of users in restricting the access of services information from source, destination, route, bandwidth, traffic, resource
to healthcare IoTs. In Ref. [10], presents a blockchain-based model utilization, number of IoT devices, hop count, throughput, status and

2
R. Premkumar and S. Sathya Priya Measurement: Sensors 24 (2022) 100486

The architecture of proposed SCNCQB-TSTP model is presented in


Fig. 1, where the components of the model are discussed in detail in this
section.

3.1. Route discovery

The proposed model handles the service request with a service


handler or the service provider receives the service request. Once the
service request is received, then the method identifies the set of routes to
reach the source node to deliver the data packets. The presence of routes
is identified according to the location details of the cloud user obtained
from the service request. To deliver the service data, the method dis­
covers the set of all routes to reach the user. Identified routes are used to
perform secure data transmission further.

3.2. Network support analysis

The performance of transmitting the data packets or service packets


towards a service point or to the user is depending on how the network
Fig. 1. Architecture of Proposed SCNCQB-TSTP model. infrastructure supports secure transmission. The network support anal­
ysis is the process of analyzing such metric according to the network
service. Such trace set has been used in analyzing the trust of different conditions. The network support value is measured by considering
routes towards data transmission when there is a service request. Upon various factors like bandwidth, number of hops or devices, number of
receiving a service request or when the service has a data to be send to IoT devices, throughput and so on. Using the above mentioned factors,
the user, it finds the set of routes available. For the routes identified, the the method computes the following metrics as follows: Consider the
method analyze the trust of route in three ways by performing Network route R has K number of hops which includes M number of IoT devices,
Support Analysis, Behavior Support Analysis and QoS-Support Analysis. N number of routers then the method computes the value of Infra­
Each analysis measure the trust of the route considered according to structure Support (IS). Second, the method computes the value of
various features to measure specific support values. According to the Streaming Factor (SF) according to the value of bandwidth, throughput
support values obtained from the analysis, the method estimates Secure and number of hops. Using these two values, the method compute the
Transmission Score (STS) based on which route selection is performed value of Network support (NS) towards secure transmission.

towards data transmission. Second, the method uses Service Centric


Blockchain Model (SCBM) which enforce data encryption and generates The above discussed algorithm shows the process of analyzing the
blockchain to improve data security. The detailed approach is discussed network support produced by the given route. It has been measured with
in this section. the factors of hop count, IoT devices, bandwidth, and throughput and so

3
R. Premkumar and S. Sathya Priya Measurement: Sensors 24 (2022) 100486

Table 1
Scheme index set.
1 2 3 4 5 6 7 8 9 10 11 12 13 14

Table 2
Index of scheme and key index.
1 2 3 4 5 6 7 8 9 10 11 12 13 14

Table 3
Table 4
Details of evaluation.
Performance analysis on secure transmission.
Key Factor Value
Secure Transmission Performance vs No of Services
Tool Used Advanced Java
50 Service 75 Services 100 Services
Total Services 100
Total Features 75 BiLSTM 68 72 78
Number of Traces 5 lakhs. DBACP-IoTSG 71 76 81
FBASHI 77 81 86
SCNCQB-TSTP 87 93 97
on. The method computes the value of infrastructure support and
streaming support to compute the value of network support. Estimated
value of NS has been used to perform secure data transmission. The above discussed algorithm explains the method of behavior
support analysis which is performed by computing the value of Trans­
mission Frequency and complete transmission rate. Using these values,
3.3. Behavior support analysis the method computes the value of behavior support to support secure
transmission.
The method performs behavior analysis to measure the trust of nodes
in the route according to the transmission performed. Towards this, the
method counts on the number of transmission each node performed, 3.4. QoS support analysis
number of them went complete and number of them went failed,
number of IoT devices and transmission frequency. Using all the above The QoS support analysis is the process of analyzing the performance
mentioned features, the method computes the value of Behavior Support of route in using the resource available like bandwidth, the average
(BS) for the route. Estimated value of BS has been used towards secure traffic in the route, average throughput in the route and latency with IoT
routing. devices. Using all the features, the method computes the value of QoS
Support. The estimated value of QoS Support has been used to perform

secure transmission.

4
R. Premkumar and S. Sathya Priya Measurement: Sensors 24 (2022) 100486

3.5. Secure transmission

The above discussed algorithm estimates the value of QoS support The proposed approach identifies the set of routes to send the data to
according to latency, traffic and throughput achievement on the route at the service point in most secure manner. For the routes identified, the
different transmission. Using these features, the method computes the method estimates different support measures by analyzing their trust on
value of QoS-support to perform secure transmission. behavior, network and QoS support. Based on the values obtained, the

Fig. 2. Analysis on Secure Transmission performance.

5
R. Premkumar and S. Sathya Priya Measurement: Sensors 24 (2022) 100486

Table 5
Analysis on Data Security performance. The above discussed algorithm shows how the data transmission is
Data Security Performance vs No of Services performed in secure way, andthe method select a single route from
available set by computing STS value and performs service centric block
50 Service 75 Services 100 Services
BiLSTM 72 76 81
DBACP-IoTSG 73 82 85
FBASHI 79 86 87 Table 6
SCNCQB-TSTP 86 92 98 Analysis on data encryption/decryption performance.
Data Encryption/Decryption Performance vs No of Services
method computes the value of Secure Transmission Score (STS). Ac­ 50 Service 75 Services 100 Services
cording to the value of STS, the method selects a single optimal route to
BiLSTM 65 71 78
perform secure routing. The data has been applied with service centric DBACP-IoTSG 72 79 83
block chain model to generate block chain and performs transmission FBASHI 75 83 87
through the route selected. SCNCQB-TSTP 85 88 96

Fig. 3. Analysis on Data Security performance.

6
R. Premkumar and S. Sathya Priya Measurement: Sensors 24 (2022) 100486

chain towards secure transmission.

3.6. Service Centric Blockchain Model The above discussed algorithm encrypts the data with the schemes
and keys dedicated for the service. The method identifies service centric
The service centric block chain model generates a block chain with scheme and key to select optimal key according to interpolation and
number of block. Each block has been generated with part of service randomization to generate the hash code. According to the hash code
data which has been encrypted with specific scheme and key. The present in the block the method can decrypt the data.
method maintains different set of schemes and keys towards various
service. According to the service class, the method identifies a scheme in 4. Results and discussion
a random manner and encrypts the data. The data encrypted has been
split into blocks and added to the chain. Each block has been generated The proposed service centric trust orient secure transmission proto­
with a hash code which denotes the scheme and key to be used in col with NCBQ and Block chain has been implemented and evaluated for
decrypting the block of data. To select the scheme, the method finds the its performance under various parameters. The method has been vali­
midpoint of the scheme array. The method split the data into k number dated with different number of data and users. In each case, the per­
of blocks and the chain is generated with the same k value. Now towards formance of the method has been measured and compared in this
selecting the scheme index, the method generates a random value r, and section.
interpolates the value r in the left to identify scheme index where the The conditions considered for the performance evaluation is pre­
same is interpolate on another direction to identify the index of key sented in Table 3. Accordingly, the performance of the method has been
index. The hash code has been generated using the index generated to measured and compared in this section.
support decoding the original data. The proposed approach has been measured for the performance of
The Table 1 shows the scheme index set being used in encrypting the secure transmission and compared in Table 4. The proposed SCNCQB-
data given and generating hash code for different blocks. Now, first the TSTP approach improves the performance of secure transmission than
method generates a midpoint as 8 for example, then it generates a others.
random number R as 3, then it will be interpolate to left to identify the The performance of SCNCQB-TSTP approach in secure transmission
index value 5 as index for the scheme and again interpolate right to is presented in Fig. 2, and the proposed approach improves the perfor­
identify the key with the random number 4 to get index as 12. Here, the mance than other approaches.
random number is generated specially for key to get a random number to The performance of the method in providing data security has been
identify the key index. measured and presented in Table 5, where the proposed SCNCQB-TSTP
The index of scheme and key being selected with the proposed algorithm has produced higher performance than other approaches in
approach has been marked in Table 2. Now with these two index values, all the test cases.
the method would generate a hash code as “3@4@8” which denotes the The performance of different methods in providing data security has
user that the user should interpolate to left for 3 and right for 4 to been measured and presented in Fig. 3, where the proposed SCNCQB-
identify the index of scheme and keys to get decrypts the original data. TSTP algorithm has achieved higher performance than other schemes.

7
R. Premkumar and S. Sathya Priya Measurement: Sensors 24 (2022) 100486

Fig. 4. Analysis on data encryption decryption performance.

The performance of methods in data encryption and decryption is Sci. Technol. vol. 27 (Aug. 2022) 760–776, https://doi.org/10.26599/
TST.2021.9010046, 4.
measured and compared in Table 6, where the proposed SCNCQB-TSTP
[3] J. Zhou, G. Feng, Y. Wang, Optimal deployment mechanism of blockchain in
algorithm has produced higher performance than other schemes. resource-constrained IoT systems, 11, IEEE Internet of Things J. vol. 9 (2022)
The performance of the methods in data encryption and decryption 8168–8177, https://doi.org/10.1109/JIOT.2021.3106355, 1 June1.
has been measured and compared in Fig. 4, where the proposed [4] S. Rathore, J.H. Park, H. Chang, Deep learning and blockchain-empowered security
framework for intelligent 5G-enabled IoT, IEEE Access vol. 9 (2021) 90075–90083,
SCNCQB-TSTP algorithm has produced higher performance than others. https://doi.org/10.1109/ACCESS.2021.3077069.
[5] X. Yang, et al., Blockchain-based secure and lightweight Authentication for internet
of Things, 5, IEEE Internet of Things J. vol. 9 (2022) 3321–3332, https://doi.org/
5. Conclusion 10.1109/JIOT.2021.3098007, 1 March1.
[6] B. Bera, S. Saha, A.K. Das, A.V. Vasilakos, Designing blockchain-based access
This article presents a novel service centric trust orient secure control protocol in IoT-enabled smart-grid system, 7, IEEE Internet of Things J. vol.
8 (2021) 5744–5761, https://doi.org/10.1109/JIOT.2020.3030308, 1 April1.
transmission protocol with IoT devices in cloud environment using block
[7] A. Vangala, A.K. Sutrala, A.K. Das, M. Jo, Smart contract-based blockchain-
chain. The method discovers the routes and analyzes the trust of routes envisioned authentication scheme for smart farming, 13, IEEE Internet of Things J.
in different ways like behavior, network and QoS support. Using the vol. 8 (2021) 10792–10806, https://doi.org/10.1109/JIOT.2021.3050676, 1
result of all the analysis results, the method computes the value of secure July1.
[8] Z. Zulkifl, et al., FBASHI: fuzzy and blockchain-based adaptive security for
transmission score to identify a optimal route. The method encrypts the healthcare IoTs, IEEE Access vol. 10 (2022) 15644–15656, https://doi.org/
data according to the service centric block chain model. The SCBM 10.1109/ACCESS.2022.3149046.
model generates the block chain with interpolation scheme and hash [9] C. Zhang et al., "A blockchain-based model migration approach for secure and
sustainable federated learning in IoT systems," in IEEE Internet of Things J., doi:
codes are used in decrypting the data. The proposed approach improves 10.1109/JIOT.2022.3171926.
the performance of data security, secure transmission and encryption/ [10] O. Alkadi, N. Moustafa, B. Turnbull, K.-K.R. Choo, A deep blockchain framework-
decryption performance. enabled collaborative intrusion detection for protecting IoT and cloud networks,
IEEE (ITJ) 8 (12) (2021) 9463–9472.
[11] O. Alkadi, N. Moustafa, B. Turnbull, A review of intrusion detection and blockchain
CRediT authorship contribution statement applications in the cloud: approaches, challenges and solutions, IEEE 8 (2020)
104893–104917.
[12] M. Arivukarasi, A. Antonidoss, Performance analysis of malicious URL detection by
Premkumar R.: Conceptualization, Methodology, Data curation, using RNN and LSTM, 2020 Fourth Int. Conf. Comput. Method. Commun. (ICCMC)
Validation, Writing – original draft, preparation. S. Sathya Priya: Su­ (2020, March) 454–458. IEEE.
pervision, Writing – review & editing. [13] P. Mishra, V. Varadharajan, E.S. Pilli, U. Tupakula, VMGuard: a VMI-based security
architecture for intrusion detection in cloud environment, IEEE (TCC) 8 (3) (2020)
957–971.
[14] M. Nadeem, A. Arshad, S. Riaz, S.S. Band, A. Mosavi, Intercept the cloud network
Declaration of competing interest from brute force and DDoS attacks via intrusion detection and prevention system,
IEEE 9 (2021) 152300–152309.
[15] M. Kumar, A.K. Singh, Distributed intrusion detection system using blockchain and
The authors declare that they have no known competing financial
cloud computing infrastructure, IEEE (ICOEI)(48184) (2020) 248–252, https://doi.
interests or personal relationships that could have appeared to influence org/10.1109/ICOEI48184.2020.9142954.
the work reported in this paper. [16] L. Chen, M. Xian, J. Liu, H. Wang, Intrusion Detection System in Cloud Computing
Environment, IEEE (CCNS) (2020) 131–135, https://doi.org/10.1109/
CCNS50731.2020.00037.
Data availability [17] P.S. Negi, A. Garg, R. Lal, Intrusion detection and prevention using honeypot
network for cloud security, IEEE (Confluence) (2020) 129–132, https://doi.org/
Data will be made available on request. 10.1109/Confluence47617.2020.9057961.
[18] J. Snehi, M. Snehi, A. Bhandari, V. Baggan, R. Ahuja, Introspecting intrusion
detection systems in dealing with security concerns in cloud environment, IEEE
References (SMART) (2021) 345–349, https://doi.org/10.1109/SMART52563.2021.9676258.
[19] O. Alkadi, N. Moustafa, B. Turnbull, K.-K.R. Choo, A deep blockchain framework-
enabled collaborative intrusion detection for protecting IoT and cloud networks,
[1] D. Samanta, et al., Cipher block chaining support vector machine for secured
IEEE (ITJ) 8 (2021) 9463–9472. Number. 12.
decentralized cloud enabled intelligent IoT architecture, IEEE Access vol. 9 (2021)
[20] C. Xu, R. Zhang, M. Xie, L. Yang, Network intrusion detection system as a service in
98013–98025, https://doi.org/10.1109/ACCESS.2021.3095297.
OpenStack cloud, IEEE (ICNC) (2020) 450–455, https://doi.org/10.1109/
[2] J. Ren, J. Li, H. Liu, T. Qin, Task offloading strategy with emergency handling and
ICNC47757.2020.9049480.
blockchain security in SDN-empowered and fog-assisted healthcare IoT, Tsinghua

8
R. Premkumar and S. Sathya Priya Measurement: Sensors 24 (2022) 100486

[21] V. Ravindranath, S. Ramasamy, R. Somula, K.S. Sahoo, A.H. Gandomi, Swarm [27] P. Mishra, V. Varadharajan, E.S. Pilli, U. Tupakula, VMGuard: a VMI-based security
Intelligence Based Feature Selection for Intrusion and Detection System in Cloud architecture for intrusion detection in cloud environment, IEEE (TCC) 8 (2020)
Infrastructure, IEEE (CEC) (2020) 1–6, https://doi.org/10.1109/ 957–971. Number. 3.
CEC48606.2020.9185887. [28] J.A. Ajala, G. Saini, Pooja, cloud-iot based smart villa intrusion alert system, IEEE
[22] H. Gajjar, Z. Malek, A survey of intrusion detection system (ids) using openstack (ICRITO) (2020) 1326–1329, https://doi.org/10.1109/
private cloud, IEEE (WorldS4) (2020) 162–168, https://doi.org/10.1109/ ICRITO48877.2020.9198022.
WorldS450073.2020.9210313. [29] K. Sethi, R. Kumar, N. Prajapati, P. Bera, Deep Reinforcement Learning Based
[23] P. Cocoros, M. Sobocinski, K. Steiger, J. Coffman, Evaluating techniques for Intrusion Detection System for Cloud Infrastructure, IEEE (COMSNETS) (2020)
practical cloud-based network intrusion detection, IEEE (2020) 62–67, https://doi. 1–6, https://doi.org/10.1109/COMSNETS48256.2020.9027452.
org/10.1109/SmartCloud49737.2020.00020. [30] M. Hachimi, G. Kaddoum, G. Gagnon, P. Illy, Multi-stage jamming attacks
[24] M. Arivukarasi, A. Antonidoss, DeepPhish: automated phishing detection using detection using deep learning combined with kernelized support vector machine in
recurrent neural network, in: Advances in Smart System Technologies, Springer, 5g cloud radio access networks, IEEE (ISNCC) (2020) 1–5, https://doi.org/
Singapore, 2021, pp. 233–242. 10.1109/ISNCC49221.2020.9297290.
[25] A. Gupta, M. Kalra, Intrusion detection and prevention system using cuckoo search [31] M. Nadeem, A. Arshad, S. Riaz, S.S. Band, A. Mosavi, Intercept the cloud network
algorithm with ann in cloud computing, IEEE (PDGC) (2020) 66–72, https://doi. from brute force and DDoS attacks via intrusion detection and prevention system,
org/10.1109/PDGC50313.2020.9315771. IEEE 9 (2021) 152300–152309.
[26] P. Meyer, et al., Demo: a security infrastructure for vehicular information using [32] S. Singh, A.S.M.S. Hosen, B. Yoon, Blockchain security attacks, challenges, and
sdn, intrusion detection, and a defense center in the cloud, IEEE (VNC) (2020) 1–2, solutions for the future distributed IoT network, IEEE Access vol. 9 (2021)
https://doi.org/10.1109/VNC51378.2020.9318351. 13938–13959, https://doi.org/10.1109/ACCESS.2021.3051602.

You might also like