Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Fog-based Secure Service Discovery for Internet of Multimedia Things: A Cross-blockchain Approach

Published: 17 December 2020 Publication History

Abstract

The Internet of Multimedia Things (IoMT) has become the backbone of innumerable multimedia applications in various fields. The wide application of IoMT not only makes our life convenient but also brings challenges to service discovery. Service discovery aims to leverage location information and trust evidence scattered in a variety of multimedia applications to find trusted IoMT devices that can provide specific service in target areas. However, the eavesdropping and tampering to these sensitive IoMT data during the trust propagation process invalidate the service discovery process. To address these challenges, we propose Secure Service Discovery (SSD) for IoMT using cross-blockchain-enabled fog computing. To resist the tampering and eavesdropping during the trust propagation process, a scalable cross-blockchain structure consisting of multiple parallel blockchains is first proposed based on fog, in which different parallel blockchains can be orchestrated to propagate encrypted location information and trust evidence of different applications. Moreover, to enable a cross-blockchain structure to leverage encrypted location information and trust evidence to find trusted IoMT devices in preset areas, a novel privacy-preserving range query is proposed to query and aggregate trust evidence. Security analysis and simulations are carried out to demonstrate the effectiveness and security of the proposed SSD.

References

[1]
Maha Abdallah, Carsten Griwodz, Kuan-Ta Chen, Gwendal Simon, Pin-Chun Wang, and Cheng-Hsin Hsu. 2018. Delay-sensitive video computing in the cloud: A survey. ACM Trans. Multimedia Comput. Commun. Appl. 14, 3s, Article 54 (June 2018), 29 pages.
[2]
Anuoluwapo A. Adewuyi, Hui Cheng, Qi Shi, Jiannong Cao, Áine MacDermott, and Xingwei Wang. 2019. CTRUST: A dynamic trust model for collaborative applications in the Internet of Things. IEEE Internet Things J. 6, 3 (2019), 5432--5445.
[3]
Vladimir Igorevich Arnol’d and André Avez. 1968. Ergodic Problems of Classical Mechanics. W. A. Benjamin, New York.
[4]
Pradeep K. Atrey, Bakul Trehan, and Mukesh K. Saini. 2019. Watch me from distance (WMD): A privacy-preserving long-distance video surveillance system. ACM Trans. Multimedia Comput. Commun. Appl. 15, 2, Article 37 (June 2019), 18 pages.
[5]
Kamran Ahmad Awan, Ikram Ud Din, Mahdi Zareei, Muhammad Talha, Mohsen Guizani, and Sultan Ullah Jadoon. 2019. Holitrust-a holistic cross-domain trust management mechanism for service-centric Internet of Things. IEEE Access 7 (2019), 52191--52201.
[6]
Ünal Çavuşoğlu, Sezgin Kaçar, Ahmet Zengin, and Ihsan Pehlivan. 2018. A novel hybrid encryption algorithm based on chaos and S-AES algorithm. Nonlin. Dynam. 92, 4 (2018), 1745--1759.
[7]
Hong-Ning Dai, Zibin Zheng, and Yan Zhang. 2019. Blockchain for Internet of Things: A survey. IEEE Internet Things J. 6, 5 (2019), 8076--8094.
[8]
Cicero Augusto de Lara Pahins, Nivan Ferreira, and Joao Comba. 2019. Real-time exploration of large spatiotemporal datasets based on order statistics. IEEE Trans. Visual. Comput. Graph. 1, 1 (2019), 1--1.
[9]
Keke Gai, Yulu Wu, Liehuang Zhu, Lei Xu, and Yan Zhang. 2019. Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J. 6, 5 (2019), 7992--8004.
[10]
Aleksei Grigorev, Shaohui Liu, Zhihong Tian, Jianxin Xiong, Seungmin Rho, and Jiang Feng. 2020. Delving deeper in drone-based person re-id by employing deep decision forest and attributes fusion. ACM Trans. Multimedia Comput. Commun. Appl. 16, 1s, Article 25 (Apr. 2020), 15 pages.
[11]
Junqin Huang, Linghe Kong, Guihai Chen, Min-You Wu, Xue Liu, and Peng Zeng. 2019. Towards secure industrial IoT: Blockchain system with credit-based consensus mechanism. IEEE Trans. Industr. Info. 15, 6 (2019), 3680--3689.
[12]
Uzair Javaid, Muhammad Naveed Aman, and Biplab Sikdar. 2020. A scalable protocol for driving trust management in internet of vehicles with blockchain. IEEE Internet Things J. 1, 1 (2020), 1--1.
[13]
Lichun Li, Rongxing Lu, and Cheng Huang. 2015. EPLQ: Efficient privacy-preserving location-based query over outsourced encrypted data. IEEE Internet Things J. 3, 2 (2015), 206--218.
[14]
Longpeng Li, Guangquan Xu, Litao Jiao, Xiaotong Li, Hao Wang, Jing Hu, Hequn Xian, Wenjuan Lian, and Honghao Gao. 2019. A secure random key distribution scheme against node replication attacks in industrial wireless sensor systems. IEEE Trans. Industr. Info. 16, 3 (2019), 2091--2101.
[15]
Haoran Liang, Jun Wu, Zhi Liu, and Jianhua Li. 2019. Shape-unconstrained privacy-preserving range query for fog computing supported vehicular networks using image. In Proceedings of the IEEE/CIC International Conference on Communications in China (ICCC’19). IEEE, Changchun, China, 683--688.
[16]
Haoran Liang, Jun Wu, Shahid Mumtaz, Jianhua Li, Xi Lin, and Miaowen Wen. 2019. MBID: Micro-blockchain-based geographical dynamic intrusion detection for V2X. IEEE Commun. Mag. 57, 10 (2019), 77--83.
[17]
Xi Lin, Jianhua Li, Jun Wu, Haoran Liang, and Wu Yang. 2019. Making knowledge tradable in edge-AI enabled IoT: A consortium blockchain-based efficient and incentive approach. IEEE Trans. Industr. Info. 15, 12 (2019), 6367--6378.
[18]
Yunlong Lu, Xiaohong Huang, Ke Zhang, Sabita Maharjan, and Yan Zhang. 2020. Blockchain empowered asynchronous federated learning for secure data sharing in Internet of vehicles. IEEE Trans. Vehic. Technol. 69, 4 (2020), 4298--4311.
[19]
Bin Mu and Spiridon Bakiras. 2016. Private proximity detection for convex polygons. Tsinghua Sci. Technol. 21, 3 (2016), 270--280.
[20]
Rinki Rani, Sushil Kumar, and Upasana Dohare. 2019. Trust evaluation for light weight security in sensor enabled Internet of Things: Game theory oriented approach. IEEE Internet Things J. 6, 5 (2019), 8421--8432.
[21]
Tian Wang, Hao Luo, Xi Zheng, and Mande Xie. 2019. Crowdsourcing mechanism for trust evaluation in CPCS based on intelligent mobile edge computing. ACM Trans. Intell. Syst. Technol. 10, 6, Article 62 (Oct. 2019), 19 pages.
[22]
Tian Wang, Lei Qiu, Arun Kumar Sangaiah, Guangquan Xu, and Anfeng Liu. 2019. Energy-efficient and trustworthy data collection protocol based on mobile fog computing in Internet of Things. IEEE Trans. Industr. Info. 16, 5 (2019), 3531--3539.
[23]
Chenhan Xu, Kun Wang, Peng Li, Song Guo, Jiangtao Luo, Baoliu Ye, and Minyi Guo. 2018. Making big data open in edges: A resource-efficient blockchain-based approach. IEEE Trans. Parallel Distrib. Syst. 30, 4 (2018), 870--882.
[24]
Guangquan Xu, Yao Zhang, Arun Kumar Sangaiah, Xiaohong Li, Aniello Castiglione, and Xi Zheng. 2019. CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Info. Sci. 476 (2019), 505--515.
[25]
Zhe Yang, Kan Yang, Lei Lei, Kan Zheng, and Victor C. M. Leung. 2019. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6, 2 (2019), 1495--1505.
[26]
Haipeng Yao, Tianle Mai, Jingjing Wang, Zhe Ji, Chunxiao Jiang, and Yi Qian. 2019. Resource trading in blockchain-based industrial Internet of Things. IEEE Trans. Industr. Info. 15, 6 (2019), 3602--3609.
[27]
Ruozhou Yu, Guoliang Xue, and Vishnu Teja Kilariand Xiang Zhang. 2018. The fog of things paradigm: Road toward on-demand Internet of Things. IEEE Commun. Mag. 56, 9 (2018), 48--54.
[28]
Sicheng Zhao, Shangfei Wang, Mohammad Soleymani, Dhiraj Joshi, and Qiang Ji. 2019. Affective computing for large-scale heterogeneous multimedia data: A survey. ACM Trans. Multimedia Comput. Commun. Appl. 15, 3s, Article 93 (Dec. 2019), 32 pages.
[29]
Hui Zhu, Fengwei Wang, Rongxing Lu, Fen Liu, Gang Fu, and Hui Li. 2018. Efficient and privacy-preserving proximity detection schemes for social applications. IEEE Internet Things J. 5, 4 (2018), 2947--2957.

Cited By

View all
  • (2024)Keamanan Data Internet of Things dalam Perspektif Pseudosains Mario BungeJurnal Filsafat Indonesia10.23887/jfi.v7i2.724357:2(207-216)Online publication date: 30-Jun-2024
  • (2024)HCNCT: A Cross-chain Interaction Scheme for the Blockchain-based MetaverseACM Transactions on Multimedia Computing, Communications, and Applications10.1145/359454220:7(1-23)Online publication date: 27-Mar-2024
  • (2024)Blockchain-based distributed application for multimedia system using Hyperledger FabricMultimedia Tools and Applications10.1007/s11042-023-15690-683:1(2473-2499)Online publication date: 1-Jan-2024
  • Show More Cited By

Index Terms

  1. Fog-based Secure Service Discovery for Internet of Multimedia Things: A Cross-blockchain Approach

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 16, Issue 3s
    Special Issue on Privacy and Security in Evolving Internet of Multimedia Things and Regular Papers
    October 2020
    190 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/3444536
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 December 2020
    Accepted: 01 August 2020
    Revised: 01 July 2020
    Received: 01 May 2020
    Published in TOMM Volume 16, Issue 3s

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Internet of Multimedia Things (IoMT)
    2. blockchain
    3. fog computing
    4. privacy-preserving

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • National Natural Science Foundation of China
    • Australian Research Council

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)33
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 10 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Keamanan Data Internet of Things dalam Perspektif Pseudosains Mario BungeJurnal Filsafat Indonesia10.23887/jfi.v7i2.724357:2(207-216)Online publication date: 30-Jun-2024
    • (2024)HCNCT: A Cross-chain Interaction Scheme for the Blockchain-based MetaverseACM Transactions on Multimedia Computing, Communications, and Applications10.1145/359454220:7(1-23)Online publication date: 27-Mar-2024
    • (2024)Blockchain-based distributed application for multimedia system using Hyperledger FabricMultimedia Tools and Applications10.1007/s11042-023-15690-683:1(2473-2499)Online publication date: 1-Jan-2024
    • (2023)Blockchain-Based Internet of Medical ThingsApplied Sciences10.3390/app1303128713:3(1287)Online publication date: 18-Jan-2023
    • (2023)TRUSED: A Trust-Based Security Evaluation Scheme for A Distributed Control SystemComputers, Materials & Continua10.32604/cmc.2023.03147274:2(4381-4398)Online publication date: 2023
    • (2023)Blockchain-Fog Computing Integration Applications: A Systematic ReviewCybernetics and Information Technologies10.2478/cait-2023-000123:1(3-37)Online publication date: 25-Mar-2023
    • (2023)NLP Research Based on Transformer Model2023 IEEE 10th International Conference on Cyber Security and Cloud Computing (CSCloud)/2023 IEEE 9th International Conference on Edge Computing and Scalable Cloud (EdgeCom)10.1109/CSCloud-EdgeCom58631.2023.00065(343-348)Online publication date: Jul-2023
    • (2023)An Improved Apriori Algorithm Based on Transaction Sequence Counting2023 IEEE 10th International Conference on Cyber Security and Cloud Computing (CSCloud)/2023 IEEE 9th International Conference on Edge Computing and Scalable Cloud (EdgeCom)10.1109/CSCloud-EdgeCom58631.2023.00041(192-196)Online publication date: Jul-2023
    • (2023)A Survey on Digital Twin for Industrial Internet of Things: Applications, Technologies and ToolsIEEE Communications Surveys & Tutorials10.1109/COMST.2023.329739525:4(2569-2598)Online publication date: Dec-2024
    • (2023)Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT DevicesIEEE Access10.1109/ACCESS.2023.328833711(62955-62969)Online publication date: 2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media