Abstract
Internet of things (IoT) has become an integral part of today’s technological revolution, which enhances the people’s quality of life. The IoT paradigm makes the world smarter and is employed in numerous real-time applications ranging from healthcare to vehicular networks. Surveillance systems are yet another important application of IoT and this work presents an IoT based home monitoring system, which deploys two ESP32 cameras for video sensing. The sensed data is not advisable to get stored as such, as the intruders may predict the usual events or frequent visitors to home. In order to ensure privacy, the cloud data storage must be secured and the purpose of this article is to ensure secure data storage, such that the data leakage can be prevented and the consistency is maintained. The data to be stored is secured by enforcing strict encryption scheme with keccak and chaotic sequence by considering the frames. The encrypted data is then stored in the cloud server. The performance of the proposed work is evaluated with respect to several performance measures and the work is proven to be efficient.
Similar content being viewed by others
Change history
14 June 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s12652-022-04145-9
References
https://www.github.com/gtoderici/sports-1 m-dataset/blob/wiki/ProjectHome.md
Alaa M, Zaidan AA, Zaidan BB, Talal M, Kiah MLM (2017) A review of smart home applications based on Internet of Things. Journal of Network Computer Applications 97:48–65
Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Kumar D (2017) Understanding the mirai botnet. In: 26th {{USENIX}} Security Symposium ({{USENIX}} Security 17), pp 1093–1110
Borujeni SE, Eshghi M (2009) Chaotic image encryption design using tompkins-paige algorithm. Hindawi Publishing Corporation Mathematical Problem in Engineering
Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon EJ, Yoo KY (2017) Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5:3028–3043
Choi C, Choi J (2019) Ontology-based security context reasoning for power IoT-cloud security service. IEEE Access 7:110510–110517
Das AK, Wazid M, Yannam AR, Rodrigues JJ, Park Y (2019) Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access 7:55382–55397
Farris I, Taleb T, Khettab Y, Song J (2018) A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Commun Surv Tutor 21(1):812–837
George G, Thampi SM (2018) A graph-based security framework for securing industrial IoT networks from vulnerability exploitations. IEEE Access 6:43586–43601
Gladence LM, Anu VM, Rathna R, Brumancia E (2020) Recommender system for home automation using IoT and artificial intelligence. J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-020-01968-2
Han Z, Li X, Huang K, Feng Z (2018) A software defined network-based security assessment framework for cloudIoT. IEEE Int Things J 5(3):1424–1434
Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743
Hua Z, Zhou Y (2017) Design of image cipher using block-based scrambling and image filtering. Inf Sci 396:97–113
Jie Y, Pei JY, Jun L, Yun G, Wei X (2013) Smart home system based on iot technologies. In: 2013 IEEE international conference on computational and information sciences, pp 1789–1791
Kandaswamy R, Furlonger D (2018) Blockchain-based transformation. Accessed: Jun. 5, 2018. https://www.gartner.com/en/doc/3869696-blockchain-based-transformation-a-gartner-trend-insightreport/
Kavitha D, Chandrasekaran S, Vigilson Prem M (2016) Software security risk assessment of data communication network through attack decomposition using fuzzy rough sets. Asian J Inf Technol 15(11):1758–1775
Kavitha D, Chandrasekaran S (2017) Security threat management by software obfuscation for privacy in internet of medical thing (IoMT) application. J Comput Theor Nanosci 14(7):3100–3114
Keertikumar M, Shubham M, Banakar RM (2015) Evolution of IoT in smart vehicles: an overview. In: 2015 IEEE International Conference on Green Computing and Internet of Things (ICGCIoT), pp 804–809.
Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite Precision representation. Chaos Solit Fract 32(4):1518–1529
Liu Y, Kuang Y, Xiao Y, Xu G (2017) SDN-based data transfer security for internet of things. IEEE Int Things J 5(1):257–268
Li X, Wang Q, Lan X, Chen X, Zhang N, Chen D (2019) Enhancing cloud-based IoT security through trustworthy cloud service: an integration of security and reputation approach. IEEE Access 7:9368–9383
Mao L, Sheng F, Zhang T (2019) Face occlusion recognition with deep learning in security framework for the IoT. IEEE Access 7:174531–174540
Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) Iot: Internet of threats? A survey of practical security vulnerabilities in real iot devices. IEEE Int Things J 6(5):8182–8201
Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N (2019) Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun Surv Tutor 21(3):2702–2733
Nizzi F, Pecorella T, Esposito F, Pierucci L, Fantacci R (2019) IoT security via address shuffling: the easy way. IEEE Int Things J 6(2):3764–3774
Rana OF, Warnier M, Quillinan TB, Brazier F, Cojocarasu D (2008) Managing violations in service level agreements. In: Grid middleware and services. Springer, Boston, pp 349–358
Sharma V, You I, Chen R, Cho JH (2019) BRIoT: behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems. IEEE Access 7:118556–118580
Shin D, Sharma V, Kim J, Kwon S, You I (2017) Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks. IEEE Access 5:11100–11117
Siboni S, Sachidananda V, Meidan Y, Bohadana M, Mathov Y, Bhairav S, Elovici Y (2018) Security testbed for internet-of-things devices. IEEE Trans Reliab 68(1):23–44
Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-017-0494-4
Sultana T, Wahid KA (2019) IoT-guard: event-driven fog-based video surveillance system for real-time security management. IEEE Access 7:134881–134894
Wang T, Zhang G, Liu A, Bhuiyan MZA, Jin Q (2019) A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE Int Thing J 6(3):4831–4843
Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2017) Design of secure user authenticated key management protocol for generic IoT networks. IEEE Int Things J 5(1):269–282
Ye G, Zhao H, Chai H (2016) Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn 83(4):2067–2077
Yi M, Xu X, Xu L (2019) An intelligent communication warning vulnerability detection algorithm based on IoT technology. IEEE Access 7:164803–164814
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-022-04145-9
About this article
Cite this article
Ravikumar, S., Kavitha, D. RETRACTED ARTICLE: IoT based home monitoring system with secure data storage by Keccak–Chaotic sequence in cloud server. J Ambient Intell Human Comput 12, 7475–7487 (2021). https://doi.org/10.1007/s12652-020-02424-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02424-x