Abstract
Edge computing is an emerging technology for the acquisition of Internet-of-Things (IoT) data and provisioning different services in connected living. Artificial Intelligence (AI) powered edge devices (edge-AI) facilitate intelligent IoT data acquisition and services through data analytics. However, data in edge networks are prone to several security threats such as external and internal attacks and transmission errors. Attackers can inject false data during data acquisition or modify stored data in the edge data storage to hamper data analytics. Therefore, an edge-AI device must verify the authenticity of IoT data before using them in data analytics. This article presents an IoT data authenticity model in edge-AI for a connected living using data hiding techniques. Our proposed data authenticity model securely hides the data source’s identification number within IoT data before sending it to edge devices. Edge-AI devices extract hidden information for verifying data authenticity. Existing data hiding approaches for biosignal cannot reconstruct original IoT data after extracting the hidden message from it (i.e., lossy) and are not usable for IoT data authenticity. We propose the first lossless IoT data hiding technique in this article based on error-correcting codes (ECCs). We conduct several experiments to demonstrate the performance of our proposed method. Experimental results establish the lossless property of the proposed approach while maintaining other data hiding properties.
- [1] . 2017. Mobile edge computing: A survey. IEEE Internet of Things Journal 5, 1 (2017), 450–465.Google Scholar
Cross Ref
- [2] . 2015. Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings. Information Systems 53 (2015), 224–236. Google Scholar
Digital Library
- [3] . 2017. Walsh–Hadamard-based 3-D steganography for protecting sensitive information in point-of-care. IEEE Transactions on Biomedical Engineering 64, 9 (2017), 2186–2195.Google Scholar
Cross Ref
- [4] . 2019. IoTSign: Protecting privacy and authenticity of IoT using discrete cosine based steganography. CoRR abs/1911.00604 (2019). arXiv:1911.00604. http://arxiv.org/abs/1911.00604.Google Scholar
- [5] . 2019. Towards connected living: 5G enabled Internet of Things (IoT). IETE Technical Review 36, 2 (2019), 190–202.Google Scholar
Cross Ref
- [6] . 2001. Digital steganography: Hiding data within data. IEEE Internet Computing 5, 3 (2001), 75–80. Google Scholar
Digital Library
- [7] . 2011. An enhanced least significant bit modification technique for audio steganography. In 2011 International Conference on Computer Networks and Information Technology (ICCNIT’11). IEEE, 143–147.Google Scholar
Cross Ref
- [8] . 2011. Secure and quality of service assurance scheduling scheme for WBAN with application to ehealth. In 2011 IEEE Wireless Communications and Networking Conference. IEEE, 1102–1106.Google Scholar
Cross Ref
- [9] . 2004. Hiding data in images by simple LSB substitution. Pattern Recognition 37, 3 (2004), 469–474.Google Scholar
Cross Ref
- [10] . 2018. Learn to cache: Machine learning for network edge caching in the big data era. IEEE Wireless Communications 25, 3 (2018), 28–35.Google Scholar
Cross Ref
- [11] . 2014. Hiding patients confidential datainthe ECG signal viaa transform-domain quantization scheme. Journal of Medical Systems 38, 6 (2014), 1–8. Google Scholar
Digital Library
- [12] . 2002. Increasing the capacity of LSB-based audio steganography. In 2002 IEEE Workshop on Multimedia Signal Processing. IEEE, 336–338.Google Scholar
Cross Ref
- [13] . 2014. CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living. Future Generation Computer Systems 35 (2014), 114–127.
DOI: DOI: https://doi.org/10.1016/j.future.2013.07.009 Google ScholarCross Ref
- [14] . 2017. BDCaM: Big data for context-aware monitoring - A personalized knowledge discovery framework for assisted healthcare. IEEE Transactions on Cloud Computing 5, 4 (2017), 628–641.
DOI: DOI: https://doi.org/10.1109/TCC.2015.2440269Google ScholarCross Ref
- [15] . 2011. Youprove: Authenticity and fidelity in mobile sensing. In Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems. 176–189. Google Scholar
Digital Library
- [16] . 2000. PhysioBank, PhysioToolkit, and PhysioNet. Circulation 101, 23 (2000), e215–e220.
DOI: DOI: https://doi.org/10.1161/01.CIR.101.23.e215arXiv: http://circ.ahajournals.org/content/101/23/e215.full.pdf.Google ScholarCross Ref
- [17] . 2012. A new data hiding scheme based on DNA sequence. International Journal of Innovative Computing and Information Control 8, 1 (2012), 139–149.Google Scholar
- [18] . 1950. Error detecting and error correcting codes. Bell Labs Technical Journal 29, 2 (1950), 147–160.Google Scholar
Cross Ref
- [19] . 2011. A novel video steganography based on non-uniform rectangular partition. In 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE’11). IEEE, 57–61. Google Scholar
Digital Library
- [20] . 2013. Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Transactions on Biomedical Engineering 60, 12 (2013), 3322–3330.Google Scholar
Cross Ref
- [21] . 2010. Embedding patients confidential data in ECG signal for healthcare information systems. In 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology. IEEE, 3891–3894.Google Scholar
Cross Ref
- [22] . 2015. ECG steganography using curvelet transform. Biomedical Signal Processing and Control 22 (2015), 161–169.Google Scholar
Cross Ref
- [23] . 2012. Fundamentals of biosignals. Biomedical Signals and Sensors I: Linking Physiological Phenomena and Biosignals (2012), 1–26.Google Scholar
- [24] . 2012. High-capacity DNA-based steganography. In 2012 8th International Conference on Informatics and Systems (INFOS’12). IEEE, BIO–76.Google Scholar
- [25] . 2010. Research on Diffie-Hellman key exchange protocol. In 2010 2nd International Conference on Computer Engineering and Technology, Vol. 4. IEEE, V4–634.Google Scholar
- [26] . 2017. An IoT data communication framework for authenticity and integrity. In 2017 IEEE/ACM 2nd International Conference on Internet-of-Things Design and Implementation (IoTDI’17). IEEE, 159–170. Google Scholar
Digital Library
- [27] . 2018. Performance modeling of representative load sharing schemes for clustered servers in multiaccess edge computing. IEEE Internet of Things Journal 6, 3 (2018), 4880–4888.Google Scholar
Cross Ref
- [28] . 2013. Steganography-based access control to medical data hidden in electrocardiogram. In 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2013, Osaka, Japan, July 3–7, 2013. 1302–1305. https://doi.org/10.1109/EMBC.2013.6609747Google Scholar
- [29] . 2013. Proposed steganography approach using DNA properties. International Journal of Information Technology and Business Management 14, 1 (2013), 96–102.Google Scholar
- [30] . 2018. Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Transactions on Industrial Informatics 14, 8 (2018), 3679–3689.
DOI: DOI: https://doi.org/10.1109/TII.2018.2791944Google ScholarCross Ref
- [31] . 2012. DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management 32, 2 (2012), 175–181.
DOI: DOI: https://doi.org/10.1016/j.ijinfomgt.2011.11.016Google ScholarCross Ref
- [32] . 2001. Numerical Computing with IEEE Floating Point Arithmetic. SIAM. Google Scholar
Digital Library
- [33] . 2017. Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. Journal of Biomedical Informatics 66 (2017), 214–230. Google Scholar
Digital Library
- [34] . 2018. Electronic health record hiding in images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication. Future Generation Computer Systems 108 (2018), 935–949.Google Scholar
- [35] . 2012. UniSpaCh: A text-based data hiding method using unicode space characters. Journal of Systems and Software 85, 5 (2012), 1075–1082. Google Scholar
Digital Library
- [36] . 2019. A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems. International Journal of Information Management 45 (2019), 276–288.Google Scholar
Cross Ref
- [37] . 2017. Highly imperceptible and reversible text steganography using invisible character based codeword. In 21st Pacific Asia Conference on Information Systems (PACIS’17). AIS Electronic Library (AISeL), 1–13.Google Scholar
- [38] . 2016. Imperceptibility-robustness tradeoff studies for ECG steganography using Continuous Ant Colony Optimization. Expert Systems with Applications 49 (2016), 123–135. Google Scholar
Digital Library
- [39] . 2009. Chapter 11 - Wireless network security. In Computer and Information Security Handbook, (Ed.). Morgan Kaufmann, Boston, 169–182. Google Scholar
Digital Library
- [40] . 2017. Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimedia Tools and Applications 76, 3 (2017), 3519–3536. Google Scholar
Digital Library
- [41] . 2012. A compression-based text steganography method. Journal of Systems and Software 85, 10 (2012), 2385–2394. Google Scholar
Digital Library
- [42] . 2014. A Huffman compression based text steganography method. Multimedia Tools and Applications 70, 3 (2014), 2085–2110. Google Scholar
Digital Library
- [43] . 2017. The emergence of edge computing. Computer 50, 1 (2017), 30–39. Google Scholar
Digital Library
- [44] . 2011. Chapter 11 - Counting and correcting. In Electronics Simplified (3rd ed.), (Ed.). Newnes, Oxford, 203–221.Google Scholar
- [45] . 2014. Current status and key issues in image steganography: A survey. Computer Science Review 13 (2014), 95–113. Google Scholar
Digital Library
- [46] . 2009. Novel methods of faster cardiovascular diagnosis in wireless telecardiology. IEEE Journal on Selected Areas in Communications 27, 4 (2009), 537–552.
DOI: DOI: https://doi.org/10.1109/JSAC.2009.090515 Google ScholarCross Ref
- [47] . 2009. A new feature detection mechanism and its application in secured ECG transmission with noise masking. Journal of Medical Systems 33, 2 (2009), 121–132.
DOI: DOI: https://doi.org/10.1007/s10916-008-9172-6 Google ScholarCross Ref
- [48] . 2011. Cardioids-based faster authentication and diagnosis of remote cardiovascular patients. Security and Communication Networks 4, 11 (2011), 1351–1368.
DOI: DOI: https://doi.org/10.1002/sec.262 Google ScholarCross Ref
- [49] . 2011. A clustering based system for instant detection of cardiac abnormalities from compressed ECG. Expert Systems with Applications 38, 5 (2011), 4705–4713.
DOI: DOI: https://doi.org/10.1016/j.eswa.2010.08.149 Google ScholarCross Ref
- [50] . 2011. Compressed ECG biometric: A fast, secured and efficient method for identification of CVD patient. Journal of Medical Systems 35, 6 (2011), 1349–1358.
DOI: DOI: https://doi.org/10.1007/s10916-009-9412-4 Google ScholarCross Ref
- [51] . 2018. Fast and peer-to-peer vital signal learning system for cloud-based healthcare. Future Generation Computer Systems 88 (2018), 220–233.
DOI: DOI: https://doi.org/10.1016/j.future.2018.05.042Google ScholarCross Ref
- [52] . 2019. Collaborative extreme learning machine with a confidence interval for P2P learning in healthcare. Computer Networks 149 (2019), 127–143.
DOI: DOI: https://doi.org/10.1016/j.comnet.2018.11.002Google ScholarCross Ref
- [53] . 2006. Steganography in compressed video stream. In 1st International Conference on Innovative Computing, Information and Control, 2006 (ICICIC’06). Vol. 1. IEEE, 269–272. Google Scholar
Digital Library
- [54] . 2015. Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions. IEEE Wireless Communications 22, 2 (2015), 136–144.Google Scholar
Digital Library
- [55] . 2020. Toward an intelligent edge: Wireless communication meets machine learning. IEEE Communications Magazine 58, 1 (2020), 19–25.Google Scholar
Digital Library
Index Terms
A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living
Recommendations
Lossless Data Hiding Based on Histogram Modification for Image Authentication
EUC '08: Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 01Lossless data hiding enables the embedding of messages in a host image without any loss of content. In this paper, we present a lossless data hiding technique based on histogram modification for image authentication that is lossless in the sense that if ...
A lossless robust data hiding scheme
This paper presents a lossless robust data hiding scheme. The original cover image can be recovered without any distortion after the hidden data have been extracted if the stego-image remains intact, and on the other hand, the hidden data can still be ...
Reversibility improved lossless data hiding
Recently, lossless data hiding has attracted increasing interests. As a reversible watermark scheme, the host media and hidden data should be recovered without distortion. A latest lossless data hiding technique based on image blocking and block ...






Comments