Skip to main content
Log in

RETRACTED ARTICLE: IoT based home monitoring system with secure data storage by Keccak–Chaotic sequence in cloud server

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 14 June 2022

This article has been updated

Abstract

Internet of things (IoT) has become an integral part of today’s technological revolution, which enhances the people’s quality of life. The IoT paradigm makes the world smarter and is employed in numerous real-time applications ranging from healthcare to vehicular networks. Surveillance systems are yet another important application of IoT and this work presents an IoT based home monitoring system, which deploys two ESP32 cameras for video sensing. The sensed data is not advisable to get stored as such, as the intruders may predict the usual events or frequent visitors to home. In order to ensure privacy, the cloud data storage must be secured and the purpose of this article is to ensure secure data storage, such that the data leakage can be prevented and the consistency is maintained. The data to be stored is secured by enforcing strict encryption scheme with keccak and chaotic sequence by considering the frames. The encrypted data is then stored in the cloud server. The performance of the proposed work is evaluated with respect to several performance measures and the work is proven to be efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Change history

References

  • https://www.amazon.in/UG-LAND-INDIA-ESP32-CAM-Development/dp/B07VYS2QG8/ref=sr_1_6?keywords=esp32+wifi+camera&qid=1581687217&s=industrial&sr=1-6

  • https://www.github.com/gtoderici/sports-1 m-dataset/blob/wiki/ProjectHome.md

  • Alaa M, Zaidan AA, Zaidan BB, Talal M, Kiah MLM (2017) A review of smart home applications based on Internet of Things. Journal of Network Computer Applications 97:48–65

    Article  Google Scholar 

  • Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Kumar D (2017) Understanding the mirai botnet. In: 26th {{USENIX}} Security Symposium ({{USENIX}} Security 17), pp 1093–1110

  • Borujeni SE, Eshghi M (2009) Chaotic image encryption design using tompkins-paige algorithm. Hindawi Publishing Corporation Mathematical Problem in Engineering

  • Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon EJ, Yoo KY (2017) Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5:3028–3043

    Article  Google Scholar 

  • Choi C, Choi J (2019) Ontology-based security context reasoning for power IoT-cloud security service. IEEE Access 7:110510–110517

    Article  Google Scholar 

  • Das AK, Wazid M, Yannam AR, Rodrigues JJ, Park Y (2019) Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access 7:55382–55397

    Article  Google Scholar 

  • Farris I, Taleb T, Khettab Y, Song J (2018) A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Commun Surv Tutor 21(1):812–837

    Article  Google Scholar 

  • George G, Thampi SM (2018) A graph-based security framework for securing industrial IoT networks from vulnerability exploitations. IEEE Access 6:43586–43601

    Article  Google Scholar 

  • Gladence LM, Anu VM, Rathna R, Brumancia E (2020) Recommender system for home automation using IoT and artificial intelligence. J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-020-01968-2

    Article  Google Scholar 

  • Han Z, Li X, Huang K, Feng Z (2018) A software defined network-based security assessment framework for cloudIoT. IEEE Int Things J 5(3):1424–1434

    Article  Google Scholar 

  • Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743

    Article  Google Scholar 

  • Hua Z, Zhou Y (2017) Design of image cipher using block-based scrambling and image filtering. Inf Sci 396:97–113

    Article  Google Scholar 

  • Jie Y, Pei JY, Jun L, Yun G, Wei X (2013) Smart home system based on iot technologies. In: 2013 IEEE international conference on computational and information sciences, pp 1789–1791

  • Kandaswamy R, Furlonger D (2018) Blockchain-based transformation. Accessed: Jun. 5, 2018. https://www.gartner.com/en/doc/3869696-blockchain-based-transformation-a-gartner-trend-insightreport/

  • Kavitha D, Chandrasekaran S, Vigilson Prem M (2016) Software security risk assessment of data communication network through attack decomposition using fuzzy rough sets. Asian J Inf Technol 15(11):1758–1775

    Google Scholar 

  • Kavitha D, Chandrasekaran S (2017) Security threat management by software obfuscation for privacy in internet of medical thing (IoMT) application. J Comput Theor Nanosci 14(7):3100–3114

    Article  Google Scholar 

  • Keertikumar M, Shubham M, Banakar RM (2015) Evolution of IoT in smart vehicles: an overview. In: 2015 IEEE International Conference on Green Computing and Internet of Things (ICGCIoT), pp 804–809.

  • Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite Precision representation. Chaos Solit Fract 32(4):1518–1529

    Article  MathSciNet  Google Scholar 

  • Liu Y, Kuang Y, Xiao Y, Xu G (2017) SDN-based data transfer security for internet of things. IEEE Int Things J 5(1):257–268

    Article  Google Scholar 

  • Li X, Wang Q, Lan X, Chen X, Zhang N, Chen D (2019) Enhancing cloud-based IoT security through trustworthy cloud service: an integration of security and reputation approach. IEEE Access 7:9368–9383

    Article  Google Scholar 

  • Mao L, Sheng F, Zhang T (2019) Face occlusion recognition with deep learning in security framework for the IoT. IEEE Access 7:174531–174540

    Article  Google Scholar 

  • Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) Iot: Internet of threats? A survey of practical security vulnerabilities in real iot devices. IEEE Int Things J 6(5):8182–8201

    Article  Google Scholar 

  • Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N (2019) Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun Surv Tutor 21(3):2702–2733

    Article  Google Scholar 

  • Nizzi F, Pecorella T, Esposito F, Pierucci L, Fantacci R (2019) IoT security via address shuffling: the easy way. IEEE Int Things J 6(2):3764–3774

    Article  Google Scholar 

  • Rana OF, Warnier M, Quillinan TB, Brazier F, Cojocarasu D (2008) Managing violations in service level agreements. In: Grid middleware and services. Springer, Boston, pp 349–358

    Chapter  Google Scholar 

  • Sharma V, You I, Chen R, Cho JH (2019) BRIoT: behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems. IEEE Access 7:118556–118580

    Article  Google Scholar 

  • Shin D, Sharma V, Kim J, Kwon S, You I (2017) Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks. IEEE Access 5:11100–11117

    Article  Google Scholar 

  • Siboni S, Sachidananda V, Meidan Y, Bohadana M, Mathov Y, Bhairav S, Elovici Y (2018) Security testbed for internet-of-things devices. IEEE Trans Reliab 68(1):23–44

    Article  Google Scholar 

  • Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-017-0494-4

    Article  Google Scholar 

  • Sultana T, Wahid KA (2019) IoT-guard: event-driven fog-based video surveillance system for real-time security management. IEEE Access 7:134881–134894

    Article  Google Scholar 

  • Wang T, Zhang G, Liu A, Bhuiyan MZA, Jin Q (2019) A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE Int Thing J 6(3):4831–4843

    Article  Google Scholar 

  • Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2017) Design of secure user authenticated key management protocol for generic IoT networks. IEEE Int Things J 5(1):269–282

    Article  Google Scholar 

  • Ye G, Zhao H, Chai H (2016) Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn 83(4):2067–2077

    Article  MathSciNet  Google Scholar 

  • Yi M, Xu X, Xu L (2019) An intelligent communication warning vulnerability detection algorithm based on IoT technology. IEEE Access 7:164803–164814

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Ravikumar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-022-04145-9

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ravikumar, S., Kavitha, D. RETRACTED ARTICLE: IoT based home monitoring system with secure data storage by Keccak–Chaotic sequence in cloud server. J Ambient Intell Human Comput 12, 7475–7487 (2021). https://doi.org/10.1007/s12652-020-02424-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02424-x

Keywords

Navigation