skip to main content
research-article

Fog-based Secure Service Discovery for Internet of Multimedia Things: A Cross-blockchain Approach

Authors Info & Claims
Published:17 December 2020Publication History
Skip Abstract Section

Abstract

The Internet of Multimedia Things (IoMT) has become the backbone of innumerable multimedia applications in various fields. The wide application of IoMT not only makes our life convenient but also brings challenges to service discovery. Service discovery aims to leverage location information and trust evidence scattered in a variety of multimedia applications to find trusted IoMT devices that can provide specific service in target areas. However, the eavesdropping and tampering to these sensitive IoMT data during the trust propagation process invalidate the service discovery process. To address these challenges, we propose Secure Service Discovery (SSD) for IoMT using cross-blockchain-enabled fog computing. To resist the tampering and eavesdropping during the trust propagation process, a scalable cross-blockchain structure consisting of multiple parallel blockchains is first proposed based on fog, in which different parallel blockchains can be orchestrated to propagate encrypted location information and trust evidence of different applications. Moreover, to enable a cross-blockchain structure to leverage encrypted location information and trust evidence to find trusted IoMT devices in preset areas, a novel privacy-preserving range query is proposed to query and aggregate trust evidence. Security analysis and simulations are carried out to demonstrate the effectiveness and security of the proposed SSD.

References

  1. Maha Abdallah, Carsten Griwodz, Kuan-Ta Chen, Gwendal Simon, Pin-Chun Wang, and Cheng-Hsin Hsu. 2018. Delay-sensitive video computing in the cloud: A survey. ACM Trans. Multimedia Comput. Commun. Appl. 14, 3s, Article 54 (June 2018), 29 pages. DOI:https://doi.org/10.1145/3212804Google ScholarGoogle Scholar
  2. Anuoluwapo A. Adewuyi, Hui Cheng, Qi Shi, Jiannong Cao, Áine MacDermott, and Xingwei Wang. 2019. CTRUST: A dynamic trust model for collaborative applications in the Internet of Things. IEEE Internet Things J. 6, 3 (2019), 5432--5445.Google ScholarGoogle ScholarCross RefCross Ref
  3. Vladimir Igorevich Arnol’d and André Avez. 1968. Ergodic Problems of Classical Mechanics. W. A. Benjamin, New York.Google ScholarGoogle Scholar
  4. Pradeep K. Atrey, Bakul Trehan, and Mukesh K. Saini. 2019. Watch me from distance (WMD): A privacy-preserving long-distance video surveillance system. ACM Trans. Multimedia Comput. Commun. Appl. 15, 2, Article 37 (June 2019), 18 pages. DOI:https://doi.org/10.1145/3312574Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Kamran Ahmad Awan, Ikram Ud Din, Mahdi Zareei, Muhammad Talha, Mohsen Guizani, and Sultan Ullah Jadoon. 2019. Holitrust-a holistic cross-domain trust management mechanism for service-centric Internet of Things. IEEE Access 7 (2019), 52191--52201.Google ScholarGoogle Scholar
  6. Ünal Çavuşoğlu, Sezgin Kaçar, Ahmet Zengin, and Ihsan Pehlivan. 2018. A novel hybrid encryption algorithm based on chaos and S-AES algorithm. Nonlin. Dynam. 92, 4 (2018), 1745--1759.Google ScholarGoogle ScholarCross RefCross Ref
  7. Hong-Ning Dai, Zibin Zheng, and Yan Zhang. 2019. Blockchain for Internet of Things: A survey. IEEE Internet Things J. 6, 5 (2019), 8076--8094.Google ScholarGoogle ScholarCross RefCross Ref
  8. Cicero Augusto de Lara Pahins, Nivan Ferreira, and Joao Comba. 2019. Real-time exploration of large spatiotemporal datasets based on order statistics. IEEE Trans. Visual. Comput. Graph. 1, 1 (2019), 1--1. DOI:https://doi.org/10.1109/TVCG.2019.2914446Google ScholarGoogle Scholar
  9. Keke Gai, Yulu Wu, Liehuang Zhu, Lei Xu, and Yan Zhang. 2019. Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J. 6, 5 (2019), 7992--8004.Google ScholarGoogle ScholarCross RefCross Ref
  10. Aleksei Grigorev, Shaohui Liu, Zhihong Tian, Jianxin Xiong, Seungmin Rho, and Jiang Feng. 2020. Delving deeper in drone-based person re-id by employing deep decision forest and attributes fusion. ACM Trans. Multimedia Comput. Commun. Appl. 16, 1s, Article 25 (Apr. 2020), 15 pages. DOI:https://doi.org/10.1145/3360050Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Junqin Huang, Linghe Kong, Guihai Chen, Min-You Wu, Xue Liu, and Peng Zeng. 2019. Towards secure industrial IoT: Blockchain system with credit-based consensus mechanism. IEEE Trans. Industr. Info. 15, 6 (2019), 3680--3689.Google ScholarGoogle ScholarCross RefCross Ref
  12. Uzair Javaid, Muhammad Naveed Aman, and Biplab Sikdar. 2020. A scalable protocol for driving trust management in internet of vehicles with blockchain. IEEE Internet Things J. 1, 1 (2020), 1--1. DOI:https://doi.org/10.1109/JIOT.2020.3002711Google ScholarGoogle ScholarCross RefCross Ref
  13. Lichun Li, Rongxing Lu, and Cheng Huang. 2015. EPLQ: Efficient privacy-preserving location-based query over outsourced encrypted data. IEEE Internet Things J. 3, 2 (2015), 206--218.Google ScholarGoogle ScholarCross RefCross Ref
  14. Longpeng Li, Guangquan Xu, Litao Jiao, Xiaotong Li, Hao Wang, Jing Hu, Hequn Xian, Wenjuan Lian, and Honghao Gao. 2019. A secure random key distribution scheme against node replication attacks in industrial wireless sensor systems. IEEE Trans. Industr. Info. 16, 3 (2019), 2091--2101.Google ScholarGoogle ScholarCross RefCross Ref
  15. Haoran Liang, Jun Wu, Zhi Liu, and Jianhua Li. 2019. Shape-unconstrained privacy-preserving range query for fog computing supported vehicular networks using image. In Proceedings of the IEEE/CIC International Conference on Communications in China (ICCC’19). IEEE, Changchun, China, 683--688.Google ScholarGoogle ScholarCross RefCross Ref
  16. Haoran Liang, Jun Wu, Shahid Mumtaz, Jianhua Li, Xi Lin, and Miaowen Wen. 2019. MBID: Micro-blockchain-based geographical dynamic intrusion detection for V2X. IEEE Commun. Mag. 57, 10 (2019), 77--83.Google ScholarGoogle ScholarCross RefCross Ref
  17. Xi Lin, Jianhua Li, Jun Wu, Haoran Liang, and Wu Yang. 2019. Making knowledge tradable in edge-AI enabled IoT: A consortium blockchain-based efficient and incentive approach. IEEE Trans. Industr. Info. 15, 12 (2019), 6367--6378.Google ScholarGoogle ScholarCross RefCross Ref
  18. Yunlong Lu, Xiaohong Huang, Ke Zhang, Sabita Maharjan, and Yan Zhang. 2020. Blockchain empowered asynchronous federated learning for secure data sharing in Internet of vehicles. IEEE Trans. Vehic. Technol. 69, 4 (2020), 4298--4311.Google ScholarGoogle ScholarCross RefCross Ref
  19. Bin Mu and Spiridon Bakiras. 2016. Private proximity detection for convex polygons. Tsinghua Sci. Technol. 21, 3 (2016), 270--280.Google ScholarGoogle Scholar
  20. Rinki Rani, Sushil Kumar, and Upasana Dohare. 2019. Trust evaluation for light weight security in sensor enabled Internet of Things: Game theory oriented approach. IEEE Internet Things J. 6, 5 (2019), 8421--8432.Google ScholarGoogle ScholarCross RefCross Ref
  21. Tian Wang, Hao Luo, Xi Zheng, and Mande Xie. 2019. Crowdsourcing mechanism for trust evaluation in CPCS based on intelligent mobile edge computing. ACM Trans. Intell. Syst. Technol. 10, 6, Article 62 (Oct. 2019), 19 pages. DOI:https://doi.org/10.1145/3324926Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Tian Wang, Lei Qiu, Arun Kumar Sangaiah, Guangquan Xu, and Anfeng Liu. 2019. Energy-efficient and trustworthy data collection protocol based on mobile fog computing in Internet of Things. IEEE Trans. Industr. Info. 16, 5 (2019), 3531--3539.Google ScholarGoogle ScholarCross RefCross Ref
  23. Chenhan Xu, Kun Wang, Peng Li, Song Guo, Jiangtao Luo, Baoliu Ye, and Minyi Guo. 2018. Making big data open in edges: A resource-efficient blockchain-based approach. IEEE Trans. Parallel Distrib. Syst. 30, 4 (2018), 870--882.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Guangquan Xu, Yao Zhang, Arun Kumar Sangaiah, Xiaohong Li, Aniello Castiglione, and Xi Zheng. 2019. CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Info. Sci. 476 (2019), 505--515. DOI:https://doi.org/10.1016/j.ins.2018.05.022Google ScholarGoogle Scholar
  25. Zhe Yang, Kan Yang, Lei Lei, Kan Zheng, and Victor C. M. Leung. 2019. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6, 2 (2019), 1495--1505.Google ScholarGoogle ScholarCross RefCross Ref
  26. Haipeng Yao, Tianle Mai, Jingjing Wang, Zhe Ji, Chunxiao Jiang, and Yi Qian. 2019. Resource trading in blockchain-based industrial Internet of Things. IEEE Trans. Industr. Info. 15, 6 (2019), 3602--3609.Google ScholarGoogle ScholarCross RefCross Ref
  27. Ruozhou Yu, Guoliang Xue, and Vishnu Teja Kilariand Xiang Zhang. 2018. The fog of things paradigm: Road toward on-demand Internet of Things. IEEE Commun. Mag. 56, 9 (2018), 48--54.Google ScholarGoogle ScholarCross RefCross Ref
  28. Sicheng Zhao, Shangfei Wang, Mohammad Soleymani, Dhiraj Joshi, and Qiang Ji. 2019. Affective computing for large-scale heterogeneous multimedia data: A survey. ACM Trans. Multimedia Comput. Commun. Appl. 15, 3s, Article 93 (Dec. 2019), 32 pages. DOI:https://doi.org/10.1145/3363560Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Hui Zhu, Fengwei Wang, Rongxing Lu, Fen Liu, Gang Fu, and Hui Li. 2018. Efficient and privacy-preserving proximity detection schemes for social applications. IEEE Internet Things J. 5, 4 (2018), 2947--2957.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Fog-based Secure Service Discovery for Internet of Multimedia Things: A Cross-blockchain Approach

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 16, Issue 3s
      Special Issue on Privacy and Security in Evolving Internet of Multimedia Things and Regular Papers
      October 2020
      190 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3444536
      Issue’s Table of Contents

      Copyright © 2020 ACM

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 December 2020
      • Accepted: 1 August 2020
      • Revised: 1 July 2020
      • Received: 1 May 2020
      Published in tomm Volume 16, Issue 3s

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!