Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario
Abstract
:1. Introduction
- ➢
- BDS1—Earth, Marine, and Space Sciences: Large data sets are collected and generated every second and at different space–time scales for operations, as the presentation, monitoring, and understanding of complex earth, marine, and space systems are enabled by the preference of sensing and computing simulation technologies. So, as an example, earth, marine, and space observation software collects terabytes of images daily [5,6,7,8], with gradual increases in space, time, and spectral analyses [5,9].
- ➢
- BDS2—Internet of Things: The IoT is a broader aspect and is considered to be all the devices that would be able to connect to the internet and could interact with each other [1,10,11,12]. The whole data that can be generated from the various IoT sensors includes spatiotemporal information, and thus, it can be described as BD. The combined use of IoT-BD in network environments, in addition to being integrated with technologies such as Cloud Computing, could offer new opportunities and lead to the accelerated development of Smart Cities [5,13].
- ➢
- BDS3—Social Sciences: Big Data are being generated by various social networks, such as Instagram, Twitter, and Facebook, and thus they could transform social sciences [5].
- ➢
- BDS4—Business: The various decisions for strategy, managing optimization, and competition related to Big Data could be enhanced by business intelligence and analytics [5]. Data related to the previous scenarios contain harmful amounts of geospatial information, for example, where and when a transition occurred [14,15].
- ➢
- ✓
- Presenting Cloud Computing and IoT-based Big Data that focus on security and management challenges in a more sustainable environment, in a Digital Twin scenario.
- ✓
- Integration benefits of Cloud Computing and IoT-based Big Data in a Digital Twin procedure.
- ✓
- The use of the encryption algorithms AES, RC5, and RSA and the proposed model extend the advances of Cloud Computing and IoT-based Big Data, offering a highly novel and scalable service platform to achieve more secure services in the sustainable environment of a Digital Twin scenario.
- ✓
- The filling of a scientific gap in the sector of integrating CC and IoT-based Big Data.
- ✓
- Proposal of a novel security model and an algorithm for sustainable Cloud systems that offer a more secure use of BD in CC as an integrated model of these two technologies.
2. Background Research
3. Background Research Analysis
4. Cloud Computing and Big Data Challenges
4.1. Privacy and Security Challenges in Cloud Computing
4.2. Big Data Challenges
- ➢
- BDC1—Big Data Storage: The quantity of data has exploded each time a new storage medium has been invented. Additionally, data creation does not have any restrictions, and data could be generated by everything connected to the network [4].
- ➢
- BDC2—Big Data Management: Big Data management could be used with a focus on customizing the consistency level [25].
- ➢
- BDC3—Big Data Processing: Let us suppose that an exabyte of data needs to be processed in its wholeness. More simply, we can assume the data is crumbled into blocks of eight words, and as a result, an exabyte is equal to 1 Kilo of petabytes.
5. Integration Aspects of IoT-Based Big Data with Sustainable Cloud Environments
5.1. Challenges and Issues in IoT-based Big Data and Cloud Computing Integration
5.2. Security Challenges of IoT-Based Big Data and Cloud Computing Integration
5.3. Proposed Security Method for Big Data Encryption in Sustainable Cloud Environment in Digital Twin Scenario
Algorithm 1. Proposed Algorithm |
Key Production Procedure m1 = im/8 counter = 0 while m1 if (m1==‘ ’ or m1 ==‘space’) break else counter = counter + 1 k = im * counter |
Encryption Procedure input k input im kc = 0 wpc = 0 while k if (k==‘ ’ or k ==‘space’) break else kc = kc + 1 while im if (im ==‘ ’ or im ==‘space’) break else wpc = wpc + 1 om = 1 while kc > 0 for i = 1, i++, i≤wpc om = (om*i)+im nk = k + i transfer routine for nk and om |
6. Comparative Analysis
7. Experimental Results and Analysis
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Stergiou, C.; Psannis, K.E.; Kim, B.-G.; Gupta, B. Secure integration of IoT and Cloud Computing. Futur. Gener. Comput. Syst. 2018, 78, 964–975. [Google Scholar] [CrossRef]
- Takabi, H.; Joshi, J.B.; Ahn, G.-J. Security and Privacy Challenges in Cloud Computing Environments. IEEE Secur. Priv. 2010, 8, 24–31. [Google Scholar] [CrossRef]
- Chen, J.; Chen, Y.; Du, X.; Li, C.; Lu, J.; Zhao, S.; Zhou, X. Big data challenge: A data management perspective. Front. Comput. Sci. 2013, 7, 157–164. [Google Scholar] [CrossRef]
- Stergiou, C.; Psannis, K.E. Algorithms for Big Data in Advanced Communication Systems and Cloud Computing. In Proceedings of the 19th IEEE Conference on Business Informatics 2017 (CBI2017), Doctoral Consortium, Thessaloniki, Greece, 24–26 July 2017. [Google Scholar] [CrossRef]
- Yang, C.; Huang, Q.; Li, Z.; Liu, K.; Hu, F. Big Data and cloud computing: Innovation opportunities and challenges. Int. J. Digit. Earth 2017, 10, 13–53. [Google Scholar] [CrossRef] [Green Version]
- Chatzievangelou, D.; Bahamon, N.; Martini, S.; del Rio, J.; Riccobene, G.; Tangherlini, M.; Danovaro, R.; De Leo, F.C.; Pirenne, B.; Aguzzi, J. Integrating Diel Vertical Migrations of Bioluminescent Deep Scattering Layers Into Monitoring Programs. Front. Mar. Sci. 2021, 8, 661809. [Google Scholar] [CrossRef]
- Aguzzi, J.; Flögel, S.; Marini, S.; Thomsen, L.; Albiez, J.; Weiss, P.; Picardi, G.; Calisti, M.; Stefanni, S.; Mirimin, L.; et al. Developing technological synergies between deep-sea and space research. Elementa: Sci. Anthr. 2022, 10, 00064. [Google Scholar] [CrossRef]
- Aguzzi, J.; Costa, C.; Calisti, M.; Funari, V.; Stefanni, S.; Danovaro, R.; Gomes, H.; Vecchi, F.; Dartnell, L.; Weiss, P.; et al. Research Trends and Future Perspectives in Marine Biomimicking Robotics. Sensors 2021, 21, 3778. [Google Scholar] [CrossRef]
- Schnase, J.L.; Duffy, D.Q.; Tamkin, G.S.; Nadeau, D.; Thompson, J.H.; Grieg, C.M.; Mclnerney, M.A.; Webster, W.P. MERRA Analytic Services: Meeting the big Data Challenges of Climate Science Through Cloud-Enabled Climate Analytics-as-A-Service. Computers. Environ. Urban Syst. 2017 61, 198–211. [CrossRef]
- Kotsiou, V.; Papadopoulos, G.Z.; Chatzimisios, P.; Theoleyre, F. LDSF: Low-Latency Distributed Scheduling Function for Industrial Internet of Things. IEEE Internet Things J. 2020, 7, 8688–8699. [Google Scholar] [CrossRef]
- Plageras, A.P.; Psannis, K.E.; Stergiou, C.; Wang, H.; Gupta, B.B. Efficient IoT-based sensor BIG Data collection-processing and analysis in Smart Buildings. Futur. Gener. Comput. Syst. 2018, 82, 349–357. [Google Scholar] [CrossRef]
- Zhou, P.; Zhong, G.; Hu, M.; Li, R.; Yan, Q.; Wang, K.; Ji, S.; Wu, D. Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment. IEEE Internet Things J. 2019, 6, 7450–7468. [Google Scholar] [CrossRef]
- Stergiou, C.L.; Psannis, K.E.; Gupta, B.B. IoT-based Big Data secure management in the Fog over a 6G Wireless Network. IEEE Internet Things J. 2021, 8, 5164–5171. [Google Scholar] [CrossRef]
- Parwez, M.S.; Rawat, D.B.; Garuba, M. Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network. IEEE Trans. Ind. Inform. 2017, 13, 2058–2065. [Google Scholar] [CrossRef]
- Wu, S.; Rendall, J.B.; Smith, M.J.; Zhu, S.; Xu, J.; Wang, H.; Yang, Q.; Qin, P. Survey on Prediction Algorithms in Smart Homes. IEEE Internet Things J. 2017, 4, 636–644. [Google Scholar] [CrossRef]
- O’Donovan, P.; Leahy, K.; Bruton, K.; O’Sullivan, D.T.J. Big data in manufacturing: A systematic mapping study. J. Big Data 2015, 2, 1–22. [Google Scholar] [CrossRef] [Green Version]
- Stergiou, C.; Psannis, K.E. Recent advances delivered by Mobile Cloud Computing and Internet of Things for Big Data applications: A survey. Int. J. Netw. Manag. 2016, 27, 1–12. [Google Scholar] [CrossRef]
- Agrawal, D.; Das, S.; El Abbadi, A. Big data and cloud computing: Current state and future opportunities. In Proceedings of the 14th International Conference on Extending Database Technology, EDBT/ICDT ’11, Uppsala, Sweden, 21–24 March 2011; ACM: New York, NY, USA; pp. 530–533. [Google Scholar]
- Demirkan, H.; Delen, D. Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud. Decis. Support Syst. 2013, 55, 412–421. [Google Scholar] [CrossRef]
- Castelino, C.; Grandhi, D.; Narula, H.G.; Chokshi, N.H. Integration of Big Data and Cloud Computing. Int. J. Eng. Trends Technol. 2014, 16, 100–102. [Google Scholar] [CrossRef] [Green Version]
- Inukollu, V.N.; Arsi, S.; Ravuri, S.R. Security Issues Associated with Big Data in Cloud Computing. Int. J. Netw. Secur. Its Appl. 2014, 6, 45–56. [Google Scholar] [CrossRef]
- Hashem, I.A.T.; Yaqoob, I.; Anuar, N.B.; Mokhtar, S.; Gani, A.; Khan, S.U. The rise of “big data” on cloud computing: Review and open research issues. Inf. Syst. 2015, 47, 98–115. [Google Scholar] [CrossRef]
- Stergiou, C.; Psannis, K.E. Efficient and secure BIG data delivery in Cloud Computing. Multimedia Tools Appl. 2017, 76, 22803–22822. [Google Scholar] [CrossRef]
- Pargmann, H.; Euhausen, D.; Faber, R. Intelligent big data processing for wind farm monitoring and analysis based on cloud-technologies and digital twins: A quantitative approach. In Proceedings of the IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA 2018), Chengdu, China, 20–22 April 2018. [Google Scholar]
- Bakshi, K. Considerations for big data: Architecture and approach. In Proceedings of the 2012 IEEE Aerospace Conference, Big Sky, MT, USA, 3–10 March 2012. [Google Scholar] [CrossRef]
- Stergiou, C.; Plageras, A.P.; Psannis, K.E.; Gupta, B.B. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network. In Handbook of Computer Networks and Cyber Security: Principles and Paradigms, Multimedia Systems and Applications; Springer: Berlin/Heidelberg, Germany, 2019. [Google Scholar]
- Xiong, J.; Zhang, Y.; Tang, S.; Liu, X.; Yao, Z. Secure Encrypted Data With Authorized Deduplication in Cloud. IEEE Access 2019, 7, 75090–75104. [Google Scholar] [CrossRef]
- Gai, K.; Qiu, M.; Zhao, H. Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing. IEEE Trans. Big Data 2018, 7, 678–688. [Google Scholar] [CrossRef] [Green Version]
- Mishra, S.K.; Puthal, D.; Sahoo, B.; Jena, S.K.; Obaidat, M.S. An adaptive task allocation technique for green cloud computing. J. Supercomput. 2018, 74, 370–385. [Google Scholar] [CrossRef]
- Chaudhary, R.; Aujla, G.S.; Kumar, N.; Rodrigues, J.J. Optimized Big Data Management across Multi-Cloud Data Centers: Software-Defined-Network-Based Analysis. IEEE Commun. Mag. 2018, 56, 118–126. [Google Scholar] [CrossRef]
- Wen, Y.; Liu, J.; Dou, W.; Xu, X.; Cao, B.; Chen, J. Scheduling workflows with privacy protection constraints for big data applications on cloud. Future Gener. Comput. Syst. 2018, 108, 1084–1091. [Google Scholar] [CrossRef]
Related Background Research | Challenges | |||||||
---|---|---|---|---|---|---|---|---|
Privacy | Security | Storage | Access Control | Computation (Processing) and Analysis | Management | Reliability | Scalability | |
Takabi et al. [2] | √ | √ | √ | √ | √ | |||
Agrawal et al. [18] | √ | √ | √ | √ | √ | √ | ||
Demirkan and Delen [19] | √ | √ | √ | √ | √ | |||
Castelino et al. [20] | √ | √ | √ | |||||
Inukollu et al. [21] | √ | √ | √ | √ | ||||
Hashem et al. [22] | √ | √ | √ | √ | √ | √ | √ | √ |
Yang et al. [5] | √ | √ | √ | √ | √ | √ | √ | √ |
Stergiou and Psannis [4] | √ | √ | √ | |||||
Stergiou and Psannis [23] | √ | √ | √ | |||||
Pargmann et al. [24] | √ | √ | √ | √ | ||||
Aguzzi et al. [8] | √ | √ | √ |
Cloud Computing Features | CCF1 | CCF2 | CCF3 | CCF4 | CCF5 |
---|---|---|---|---|---|
Big Data Features (5 Vs) | |||||
Volume | √ | √ | √ | ||
Velocity | √ | √ | √ | √ | |
Variety | √ | √ | |||
Veracity | √ | √ | √ | ||
Value | √ | √ | √ | √ | √ |
Cloud Computing Models | SaaS | PaaS | IaaS |
---|---|---|---|
Big Data Sources (BDS) | |||
BDS1 | √ | √ | |
BDS2 | √ | √ | √ |
BDS3 | √ | √ | |
BDS4 | √ | √ | |
BDS5 | √ | √ |
IoT-Based Big Data and Cloud Computing Integration Challenges | Privacy | Security | Storage | Access Control | Computation (Processing) and Analysis | Management | Reliability | Scalability |
---|---|---|---|---|---|---|---|---|
IoT-based Big Data | √ | √ | √ | √ | √ | |||
Cloud Computing | √ | √ | √ | √ | √ | √ |
Big Data | BDC1 | BDC2 | BDC3 |
---|---|---|---|
Cloud Computing | |||
CCC1 | √ | √ | |
CCC2 | √ | √ | |
CCC3 | √ | ||
CCC4 | √ | √ | |
CCC5 | √ | ||
CCC6 | √ | √ | √ |
m1 = key production number | wpc = word package counter |
im = input package of data | om = output package of data |
counter = word counter | i = default counter |
k = key | nk = new encryption key |
kc = keyword counter |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Stergiou, C.L.; Bompoli, E.; Psannis, K.E. Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario. Appl. Sci. 2023, 13, 758. https://doi.org/10.3390/app13020758
Stergiou CL, Bompoli E, Psannis KE. Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario. Applied Sciences. 2023; 13(2):758. https://doi.org/10.3390/app13020758
Chicago/Turabian StyleStergiou, Christos L., Elisavet Bompoli, and Konstantinos E. Psannis. 2023. "Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario" Applied Sciences 13, no. 2: 758. https://doi.org/10.3390/app13020758
APA StyleStergiou, C. L., Bompoli, E., & Psannis, K. E. (2023). Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario. Applied Sciences, 13(2), 758. https://doi.org/10.3390/app13020758