Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2024 Aug 23:10:e2211.
doi: 10.7717/peerj-cs.2211. eCollection 2024.

Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system

Affiliations

Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system

Sheharyar Khan et al. PeerJ Comput Sci. .

Abstract

In the distributed computing era, cloud computing has completely changed organizational operations by facilitating simple access to resources. However, the rapid development of the IoT has led to collaborative computing, which raises scalability and security challenges. To fully realize the potential of the Internet of Things (IoT) in smart home technologies, there is still a need for strong data security solutions, which are essential in dynamic offloading in conjunction with edge, fog, and cloud computing. This research on smart home challenges covers in-depth examinations of data security, privacy, processing speed, storage capacity restrictions, and analytics inside networked IoT devices. We introduce the Trusted IoT Big Data Analytics (TIBDA) framework as a comprehensive solution to reshape smart living. Our primary focus is mitigating pervasive data security and privacy issues. TIBDA incorporates robust trust mechanisms, prioritizing data privacy and reliability for secure processing and user information confidentiality within the smart home environment. We achieve this by employing a hybrid cryptosystem that combines Elliptic Curve Cryptography (ECC), Post Quantum Cryptography (PQC), and Blockchain technology (BCT) to protect user privacy and confidentiality. Additionally, we comprehensively compared four prominent Artificial Intelligence anomaly detection algorithms (Isolation Forest, Local Outlier Factor, One-Class SVM, and Elliptic Envelope). We utilized machine learning classification algorithms (random forest, k-nearest neighbors, support vector machines, linear discriminant analysis, and quadratic discriminant analysis) for detecting malicious and non-malicious activities in smart home systems. Furthermore, the main part of the research is with the help of an artificial neural network (ANN) dynamic algorithm; the TIBDA framework designs a hybrid computing system that integrates edge, fog, and cloud architecture and efficiently supports numerous users while processing data from IoT devices in real-time. The analysis shows that TIBDA outperforms these systems significantly across various metrics. In terms of response time, TIBDA demonstrated a reduction of 10-20% compared to the other systems under varying user loads, device counts, and transaction volumes. Regarding security, TIBDA's AUC values were consistently higher by 5-15%, indicating superior protection against threats. Additionally, TIBDA exhibited the highest trustworthiness with an uptime percentage 10-12% greater than its competitors. TIBDA's Isolation Forest algorithm achieved an accuracy of 99.30%, and the random forest algorithm achieved an accuracy of 94.70%, outperforming other methods by 8-11%. Furthermore, our ANN-based offloading decision-making model achieved a validation accuracy of 99% and reduced loss to 0.11, demonstrating significant improvements in resource utilization and system performance.

Keywords: Artificial intelligence; Big data; Blockchain; Cryptography; Data security and privacy; Hybrid computing; Internet of Things (IoT); Machine learning; Offloading; Smart home.

PubMed Disclaimer

Conflict of interest statement

The authors declare there are no competing interests.

Figures

Figure 1
Figure 1. Smart home devices connect to edge, fog, and cloud servers via a base station for data processing and analytics. Edge servers are preferred if nearby; otherwise, fog servers are used. For critical processing, requests are forwarded to cloud servers.
Image source credits: Smart home technology set icons, FreePik, https://www.freepik.com; Cloud server, Database free icons, Wifi, FlatIcon, https://www.flaticon.com; Cloud server, https://freepngimg.com/png/11351-cloud-server-png-file#google_vignette, CC BY-NC 4.0; Vector Server Icon, server icons PNG Designed By EncoderXSolutions from https://pngtree.com/freepng/vector-server-icon_4973694.html?sol=downref&id=bef; Database, https://icon-icons.com/icon/database-data/19664, CC BY-NC 4.0.
Figure 2
Figure 2. Smart home user process flow with proposed TIBDA methodology.
It begins with user initiation, followed by data encryption with ECC-PQC and Blockchain. Anomaly detection is conducted using Isolation Forest and Random Forest algorithms. Hash verification confirms user permissions, and servers are selected via an ANN algorithm, secured with Blockchain. Finally, the process concludes with analytics processing, ultimately directing data for further processing, analytics, or action to the exact user. Image source credits: Smart home created by Freepik - Flaticon; Cctv Camera, created by Tru3 Art - Flaticon; Smart House, created by Tru3 Art - Flaticon; Smart TV, created by Corner Pixel - Flaticon; Internet Of Things, created by Chattapat - Flaticon; Router, created by Graficon - Flaticon; Hacker, created by Andrean Prabowo - Flaticon; Csv File, created by surang - Flaticon; Machine Learning, created by Iconjam - Flaticon; Result, created by Uniconlabs - Flaticon; Profile, created by Paul J. - Flaticon; Decryption, created by Nhor Phai - Flaticon; Bandwidth, created by Flat Icons - Flaticon; Latency, created by Vectors Tank - Flaticon; Decision, created by GOWI - Flaticon; Cloud Server, created by turkkub - Flaticon; Networking, created by Konkapp - Flaticon; Cpu Tower, created by Freepik - Flaticon; Broadcast, created by Freepik - Flaticon; Cloud Server, created by Uniconlabs - Flaticon; Blockchain, created by Freepik - Flaticon; Data Analytics, created by vectorsmarket15 - Flaticon; Encryption, Data Processing, Mind development, Testing, Malware, Block user, Batteries, Fog, www.freepik.com.
Figure 3
Figure 3. Framework process flow diagram.
Figure 4
Figure 4. Average response time (ms) and numbers of users comparison.
Figure 5
Figure 5. Average response time (ms) and numbers of devices comparison.
Figure 6
Figure 6. Average response time (ms) and numbers of devices transactions comparison.
Figure 7
Figure 7. A comparison of the security utilizing the AUC at different user levels.
Figure 8
Figure 8. Approaches comparison analysis for system reliability.
Figure 9
Figure 9. Analysis and results of anomalies detection.
Figure 10
Figure 10. Comparison of anomaly detection algorithm accuracies.
Figure 11
Figure 11. Confusion matrix analysis for random forest algorithm.
Figure 12
Figure 12. Performance comparison of malicious and non-malicious classification.
Figure 13
Figure 13. ANN offloading model training and validation accuracy.
Figure 14
Figure 14. ANN offloading model training and validation loss.
Figure 15
Figure 15. ANN offloading confusion matrix.
Figure 16
Figure 16. ANN offloading strategies results presentation.

Similar articles

Cited by

References

    1. Abbas K, Tawalbeh LA, Rafiq A, Muthanna A, Elgendy IA, Abd El-Latif AA. Convergence of blockchain and IoT for secure transportation systems in smart cities. Security and Communication Networks. 2021;2021:1–13. doi: 10.1155/2021/5597679. - DOI
    1. Abu-Tair M, Djahel S, Perry P, Scotney B, Zia U, Carracedo JM, Sajjad A. Towards secure and privacy-preserving IoT enabled smart home: architecture and experimental study. Sensors. 2020;20(21):6131. doi: 10.3390/s20216131. - DOI - PMC - PubMed
    1. Achar S. Cloud computing security for multi-cloud service providers: controls and techniques in our modern threat landscape. International Journal of Computer and Systems Engineering. 2022;16(9):379–384.
    1. Ahanger TA, Tariq U, Ibrahim A, Ullah I, Bouteraa Y. Iot-inspired framework of intruder detection for smart home security systems. Electronics. 2020;9(9):1361. doi: 10.3390/electronics9091361. - DOI
    1. Ahmad S, Mehfuz S, Beg J. Hybrid cryptographic approach to enhance the mode of key management system in cloud environment. The Journal of Supercomputing. 2023;79(7):7377–7413. doi: 10.1007/s11227-022-04964-9. - DOI

LinkOut - more resources