Abstract
The Internet of Multimedia Things (IoMT) has become the backbone of innumerable multimedia applications in various fields. The wide application of IoMT not only makes our life convenient but also brings challenges to service discovery. Service discovery aims to leverage location information and trust evidence scattered in a variety of multimedia applications to find trusted IoMT devices that can provide specific service in target areas. However, the eavesdropping and tampering to these sensitive IoMT data during the trust propagation process invalidate the service discovery process. To address these challenges, we propose Secure Service Discovery (SSD) for IoMT using cross-blockchain-enabled fog computing. To resist the tampering and eavesdropping during the trust propagation process, a scalable cross-blockchain structure consisting of multiple parallel blockchains is first proposed based on fog, in which different parallel blockchains can be orchestrated to propagate encrypted location information and trust evidence of different applications. Moreover, to enable a cross-blockchain structure to leverage encrypted location information and trust evidence to find trusted IoMT devices in preset areas, a novel privacy-preserving range query is proposed to query and aggregate trust evidence. Security analysis and simulations are carried out to demonstrate the effectiveness and security of the proposed SSD.
- Maha Abdallah, Carsten Griwodz, Kuan-Ta Chen, Gwendal Simon, Pin-Chun Wang, and Cheng-Hsin Hsu. 2018. Delay-sensitive video computing in the cloud: A survey. ACM Trans. Multimedia Comput. Commun. Appl. 14, 3s, Article 54 (June 2018), 29 pages. DOI:https://doi.org/10.1145/3212804Google Scholar
- Anuoluwapo A. Adewuyi, Hui Cheng, Qi Shi, Jiannong Cao, Áine MacDermott, and Xingwei Wang. 2019. CTRUST: A dynamic trust model for collaborative applications in the Internet of Things. IEEE Internet Things J. 6, 3 (2019), 5432--5445.Google Scholar
Cross Ref
- Vladimir Igorevich Arnol’d and André Avez. 1968. Ergodic Problems of Classical Mechanics. W. A. Benjamin, New York.Google Scholar
- Pradeep K. Atrey, Bakul Trehan, and Mukesh K. Saini. 2019. Watch me from distance (WMD): A privacy-preserving long-distance video surveillance system. ACM Trans. Multimedia Comput. Commun. Appl. 15, 2, Article 37 (June 2019), 18 pages. DOI:https://doi.org/10.1145/3312574Google Scholar
Digital Library
- Kamran Ahmad Awan, Ikram Ud Din, Mahdi Zareei, Muhammad Talha, Mohsen Guizani, and Sultan Ullah Jadoon. 2019. Holitrust-a holistic cross-domain trust management mechanism for service-centric Internet of Things. IEEE Access 7 (2019), 52191--52201.Google Scholar
- Ünal Çavuşoğlu, Sezgin Kaçar, Ahmet Zengin, and Ihsan Pehlivan. 2018. A novel hybrid encryption algorithm based on chaos and S-AES algorithm. Nonlin. Dynam. 92, 4 (2018), 1745--1759.Google Scholar
Cross Ref
- Hong-Ning Dai, Zibin Zheng, and Yan Zhang. 2019. Blockchain for Internet of Things: A survey. IEEE Internet Things J. 6, 5 (2019), 8076--8094.Google Scholar
Cross Ref
- Cicero Augusto de Lara Pahins, Nivan Ferreira, and Joao Comba. 2019. Real-time exploration of large spatiotemporal datasets based on order statistics. IEEE Trans. Visual. Comput. Graph. 1, 1 (2019), 1--1. DOI:https://doi.org/10.1109/TVCG.2019.2914446Google Scholar
- Keke Gai, Yulu Wu, Liehuang Zhu, Lei Xu, and Yan Zhang. 2019. Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J. 6, 5 (2019), 7992--8004.Google Scholar
Cross Ref
- Aleksei Grigorev, Shaohui Liu, Zhihong Tian, Jianxin Xiong, Seungmin Rho, and Jiang Feng. 2020. Delving deeper in drone-based person re-id by employing deep decision forest and attributes fusion. ACM Trans. Multimedia Comput. Commun. Appl. 16, 1s, Article 25 (Apr. 2020), 15 pages. DOI:https://doi.org/10.1145/3360050Google Scholar
Digital Library
- Junqin Huang, Linghe Kong, Guihai Chen, Min-You Wu, Xue Liu, and Peng Zeng. 2019. Towards secure industrial IoT: Blockchain system with credit-based consensus mechanism. IEEE Trans. Industr. Info. 15, 6 (2019), 3680--3689.Google Scholar
Cross Ref
- Uzair Javaid, Muhammad Naveed Aman, and Biplab Sikdar. 2020. A scalable protocol for driving trust management in internet of vehicles with blockchain. IEEE Internet Things J. 1, 1 (2020), 1--1. DOI:https://doi.org/10.1109/JIOT.2020.3002711Google Scholar
Cross Ref
- Lichun Li, Rongxing Lu, and Cheng Huang. 2015. EPLQ: Efficient privacy-preserving location-based query over outsourced encrypted data. IEEE Internet Things J. 3, 2 (2015), 206--218.Google Scholar
Cross Ref
- Longpeng Li, Guangquan Xu, Litao Jiao, Xiaotong Li, Hao Wang, Jing Hu, Hequn Xian, Wenjuan Lian, and Honghao Gao. 2019. A secure random key distribution scheme against node replication attacks in industrial wireless sensor systems. IEEE Trans. Industr. Info. 16, 3 (2019), 2091--2101.Google Scholar
Cross Ref
- Haoran Liang, Jun Wu, Zhi Liu, and Jianhua Li. 2019. Shape-unconstrained privacy-preserving range query for fog computing supported vehicular networks using image. In Proceedings of the IEEE/CIC International Conference on Communications in China (ICCC’19). IEEE, Changchun, China, 683--688.Google Scholar
Cross Ref
- Haoran Liang, Jun Wu, Shahid Mumtaz, Jianhua Li, Xi Lin, and Miaowen Wen. 2019. MBID: Micro-blockchain-based geographical dynamic intrusion detection for V2X. IEEE Commun. Mag. 57, 10 (2019), 77--83.Google Scholar
Cross Ref
- Xi Lin, Jianhua Li, Jun Wu, Haoran Liang, and Wu Yang. 2019. Making knowledge tradable in edge-AI enabled IoT: A consortium blockchain-based efficient and incentive approach. IEEE Trans. Industr. Info. 15, 12 (2019), 6367--6378.Google Scholar
Cross Ref
- Yunlong Lu, Xiaohong Huang, Ke Zhang, Sabita Maharjan, and Yan Zhang. 2020. Blockchain empowered asynchronous federated learning for secure data sharing in Internet of vehicles. IEEE Trans. Vehic. Technol. 69, 4 (2020), 4298--4311.Google Scholar
Cross Ref
- Bin Mu and Spiridon Bakiras. 2016. Private proximity detection for convex polygons. Tsinghua Sci. Technol. 21, 3 (2016), 270--280.Google Scholar
- Rinki Rani, Sushil Kumar, and Upasana Dohare. 2019. Trust evaluation for light weight security in sensor enabled Internet of Things: Game theory oriented approach. IEEE Internet Things J. 6, 5 (2019), 8421--8432.Google Scholar
Cross Ref
- Tian Wang, Hao Luo, Xi Zheng, and Mande Xie. 2019. Crowdsourcing mechanism for trust evaluation in CPCS based on intelligent mobile edge computing. ACM Trans. Intell. Syst. Technol. 10, 6, Article 62 (Oct. 2019), 19 pages. DOI:https://doi.org/10.1145/3324926Google Scholar
Digital Library
- Tian Wang, Lei Qiu, Arun Kumar Sangaiah, Guangquan Xu, and Anfeng Liu. 2019. Energy-efficient and trustworthy data collection protocol based on mobile fog computing in Internet of Things. IEEE Trans. Industr. Info. 16, 5 (2019), 3531--3539.Google Scholar
Cross Ref
- Chenhan Xu, Kun Wang, Peng Li, Song Guo, Jiangtao Luo, Baoliu Ye, and Minyi Guo. 2018. Making big data open in edges: A resource-efficient blockchain-based approach. IEEE Trans. Parallel Distrib. Syst. 30, 4 (2018), 870--882.Google Scholar
Digital Library
- Guangquan Xu, Yao Zhang, Arun Kumar Sangaiah, Xiaohong Li, Aniello Castiglione, and Xi Zheng. 2019. CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Info. Sci. 476 (2019), 505--515. DOI:https://doi.org/10.1016/j.ins.2018.05.022Google Scholar
- Zhe Yang, Kan Yang, Lei Lei, Kan Zheng, and Victor C. M. Leung. 2019. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6, 2 (2019), 1495--1505.Google Scholar
Cross Ref
- Haipeng Yao, Tianle Mai, Jingjing Wang, Zhe Ji, Chunxiao Jiang, and Yi Qian. 2019. Resource trading in blockchain-based industrial Internet of Things. IEEE Trans. Industr. Info. 15, 6 (2019), 3602--3609.Google Scholar
Cross Ref
- Ruozhou Yu, Guoliang Xue, and Vishnu Teja Kilariand Xiang Zhang. 2018. The fog of things paradigm: Road toward on-demand Internet of Things. IEEE Commun. Mag. 56, 9 (2018), 48--54.Google Scholar
Cross Ref
- Sicheng Zhao, Shangfei Wang, Mohammad Soleymani, Dhiraj Joshi, and Qiang Ji. 2019. Affective computing for large-scale heterogeneous multimedia data: A survey. ACM Trans. Multimedia Comput. Commun. Appl. 15, 3s, Article 93 (Dec. 2019), 32 pages. DOI:https://doi.org/10.1145/3363560Google Scholar
Digital Library
- Hui Zhu, Fengwei Wang, Rongxing Lu, Fen Liu, Gang Fu, and Hui Li. 2018. Efficient and privacy-preserving proximity detection schemes for social applications. IEEE Internet Things J. 5, 4 (2018), 2947--2957.Google Scholar
Cross Ref
Index Terms
Fog-based Secure Service Discovery for Internet of Multimedia Things: A Cross-blockchain Approach
Recommendations
A cloud-fog scalable video streaming architecture for multimedia internet of things devices
Cloud computing can be used to provide guaranteed quality of video services. On the other hand, fog computing can lower the transmission costs by using collaborative machine-to-machine and near-user edge communications. In this paper, a cloud-fog scalable ...
A Review on Trust Evaluation for Internet of Things
MobiMedia '16: Proceedings of the 9th EAI International Conference on Mobile Multimedia CommunicationsThe Internet of Things (IoT) has been widely used in various application domains to provide advanced and intelligent services for human beings, such as environmental monitoring, intrusion detection. In IoT networks, senor nodes are normally low ...
Privacy-Preserving Key Agreement Protocol for Fog Computing Supported Internet of Things Environment
AbstractFog computing is an emerging paradigm that provides confluence facilities between Internet of Things (IoT) devices and cloud. The fog nodes process the information collected by the IoT devices, thereby providing services to the cloud. With the ...






Comments