Next Article in Journal
Impact of Label Noise on the Learning Based Models for a Binary Classification of Physiological Signal
Previous Article in Journal
An Efficient and Uncertainty-Aware Decision Support System for Disaster Response Using Aerial Imagery
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Interaction of Secure Cloud Network and Crowd Computing for Smart City Data Obfuscation

by
Manikandan Thirumalaisamy
1,
Shajahan Basheer
1,
Shitharth Selvarajan
2,
Sara A. Althubiti
3,
Fayadh Alenezi
4,
Gautam Srivastava
5,6,7 and
Jerry Chun-Wei Lin
8,*
1
School of Computing Science and Engineering, Galgotias University, Greater Noida 203201, India
2
Department of Computer Science, Kebri Dehar University, Kebri Dehar P.O. Box 250, Ethiopia
3
Department of Computer Science, College of Computer and Information Sciences, Majmaah University, Al-Majmaah 11952, Saudi Arabia
4
Department of Electrical Engineering, College of Engineering, Jouf University, Sakaka 72388, Saudi Arabia
5
Department of Mathematics and Computer Science, Brandon University, Brandon, MB R7A 6A9, Canada
6
Research Center for Interneural Computing, China Medical University, Taichung 40402, Taiwan
7
Department of Computer Science and Mathematics, Lebanese American University, Beirut 1102, Lebanon
8
Department of Computer Science, Electrical Engineering and Mathematical Sciences, Western Norway, University of Applied Sciences, 5063 Bergen, Norway
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(19), 7169; https://doi.org/10.3390/s22197169
Submission received: 28 July 2022 / Revised: 5 September 2022 / Accepted: 7 September 2022 / Published: 21 September 2022
(This article belongs to the Special Issue Cybersecurity for Sensor Technologies)

Abstract

:
There can be many inherent issues in the process of managing cloud infrastructure and the platform of the cloud. The platform of the cloud manages cloud software and legality issues in making contracts. The platform also handles the process of managing cloud software services and legal contract-based segmentation. In this paper, we tackle these issues directly with some feasible solutions. For these constraints, the Averaged One-Dependence Estimators (AODE) classifier and the SELECT Applicable Only to Parallel Server (SELECT-APSL ASA) method are proposed to separate the data related to the place. ASA is made up of the AODE and SELECT Applicable Only to Parallel Server. The AODE classifier is used to separate the data from smart city data based on the hybrid data obfuscation technique. The data from the hybrid data obfuscation technique manages 50% of the raw data, and 50% of hospital data is masked using the proposed transmission. The analysis of energy consumption before the cryptosystem shows the total packet delivered by about 71.66% compared with existing algorithms. The analysis of energy consumption after cryptosystem assumption shows 47.34% consumption, compared to existing state-of-the-art algorithms. The average energy consumption before data obfuscation decreased by 2.47%, and the average energy consumption after data obfuscation was reduced by 9.90%. The analysis of the makespan time before data obfuscation decreased by 33.71%. Compared to existing state-of-the-art algorithms, the study of makespan time after data obfuscation decreased by 1.3%. These impressive results show the strength of our methodology.

1. Introduction

This study focuses on the upkeep of Internet of Things (IoT) sensor data in smart sensor cities and its management through cloud computing. Cloud computing is the process of storing, managing, and accessing data through the Internet as opposed to on a local server or personal computer (PC). Cloud computing is becoming more popular and advantageous for individuals, companies, and organizations. The processing of physical devices in IoT allows data to be shared from one device to another. To prevent work overload, work is shared from one device to another. Organizations can use IoT to examine how their systems work in real-time and obtain insights into everything from equipment performance to supply chain and logistics operations. The IoT work-sharing technique controls the system’s performance lagging [1]. IoT is suggested for the collection of sensor data from multiple crowdsourcing datasets. These links are built on the smart cities that use sensors in hospitals, on the sides of roadways, and in virtual environments for crowd interactions using cloud technology [2]. The categorized AODE is used to classify the data. This organizes the crowd data gathered from various sensors and smart cities. The majority of hospitals and roadside places are categorized in the data gathered from smart cities. The AODE in sensor data is used to categorize this data collection and assign it to different data storage. This storage completes the necessary database, which controls the information needed to reach the suggested conclusion. Additionally, a method for storing data behaviour and redundancy has been suggested. The sensor-based data has advanced, and this controls how cities are formed. Hybrid data obfuscation is used to manage the method of classifying the data for the blockchain facilities [3]. The security objective for data management and data formation is made for security purposes by data obfuscation [4]. The management of data encryption masking and data tokenization for the original data is handled by data transfer from smart cities. Environmental production controls the process, and an external processor is suggested for moving records from one location to another. Data encryption is managed by data security to handle original data for production environments on both public and private systems. Personal data has been used for a different type of data obfuscation function [5]. The system structure for the cryptosystem is used to manage the encrypted data. This security, which evolves through the creation of additional storage for each connected piece of data, can be managed by the database. Text, photos, GIFs, and videos are the categories used to categorize the factors for storing data based on associated images. The hybrid data obfuscation technique is also used for this classification’s data storing process [6]. When using cloud-based services, this research depends on remote servers for our technological infrastructure. Since cloud computing encourages mobile access via smart devices, it keeps people informed. It decreased IT expenditures. If you move to the cloud, the cost of managing and maintaining your IT systems may can thus go down. Scalability, company continuity, collaborative effectiveness, flexibility in work procedures, and accessibility to automated upgrades are other advantages that can be accessed remotely from the cloud, or another virtual location is likewise covered by this. Thanks to companies that provide cloud services, users can store files and apps on remote servers and then access the material via the internet. The synergy of cloud and crowd computing for the smart city focused on maintaining the data collected from the IoT sensor in smart sensor cities and managing it in cloud computing. The data obfuscation, classification, and crowd computing methods are performing cloud computing platforms for improving the data storing and retrieving which is got from smart cities using sensors. The data collection and classification using the crowd computing approach are emphasized. Data collection uses the IoT sensor for storing big cloud data. In the approach of crowd computing, the separation of the data from the smart cities is collected and separated using the technique of AODE classifier; the classification is done (collection of data from hospitals, stations, etc.) The cryptosystem and data obfuscation has hybrid data obfuscation technique). For improved data security, hybrid data obfuscation is used for transmitting from while storing in the big data. For data retrieving, the SELECT-APSL method from the cloud is based on the data from the IoT sensor from smart cities and hybrid data obfuscation for security purposes. The SELECT-APSL method was used in this paper to retrieve the data. The single-column in-pages dexes are used to obtain the data from the table. Only the index page is used for retrieval during the procedure. This page serves as the primary scanning point for both the multi-column index scan key retrieval and the data retrieval for the plugin [7]. This retrieval of the data from the smart cities with the security details has been done. The main objective of the paper is as follows:
  • The data collected from the smart cities using the crowd to the cloud computing is proposed by using the AODE classifier.
  • The hybrid data obfuscation technique has been used for security purposes for data analysis.
  • Also, for retrieving the data, the method of SELECT-APSL is saved in the cloud.
The rest of the paper is organized in Section 1, the introduction. In Section 2, the related works, and in Section 3, the proposed system is presented. In Section 4, the methods and the results have been elaborated in graphs and tables. In Section 5, the conclusion has been written along with future work.

2. Literature Review

Different layers of firmware and middleware have performed sophisticated services for real-world and cyber-physical combinations for CPS in this study. This makes cloud computing possible and controls the latency caused by geographic distance for the user’s orchestration of services and resources. These cloud-based data have been gathered from industry 4.0, smart households, and smart cities. This can be integrated into the currently suggested architecture to enable cloud and crowd computing in a federated environment [8]. In this study, a crowd-based SciCrowd system is introduced, and a scholarly literature search is developed for various research communities. These studies include data indexing, automatic paper extraction, and crowdsourced data processing. This allows for data searching based on intelligent cities in the currently planned system [9]. The decision-making process and land management for planning for repercussions are done for new opportunities in this manuscript, which controls social sensing data. A geospatial data algorithm for the analysis of complex data for land governance is suggested. By incorporating this technique into the system that is currently being presented, social goals to manage energy extraction can be suggested [10]. The fifth generation of drones is proposed as edge intelligence for controlling artificial intelligence. To construct intelligent settings, security based on data sharing and applications based on blockchain is used. Additionally, obstacles for drone edge intelligence have been created to manage upcoming data-sharing tendencies. This can be done in the federated synergy system that is currently being suggested [7]. It has been suggested that autonomous aerial vehicles and a revolutionary framework would enable future smart cities. Additionally, the automated necessity of an intelligent ecosystem is recommended in the process of locating autonomous cars and decision-making among smart cities and light plains. Additionally, a mechanism for automating FAUAVs has been suggested. Swarm intelligence has been presented to manage the different missions with this rising efficiency. By managing this in the currently suggested system, it has been suggested that unnamed aerial vehicles be controlled and monitored [2]. Future trends data and surveillance of intelligent cities have been examined in this research based on the data collection. Additionally, an embedded system for visual computing and future trends and problems, as well as video surveillance for the most recent data set, are studied. The analysis of data based on big data has been evaluated by incorporating this into the system that is now being suggested. This article was motivated by technical elements for the development of the economy and blockchain based on the secrecy of flaws and constructing a system that improves vital component qualities [11]. Effective authentication and donation implementation have been suggested. The construction of a useful smoothing of blockchain security is managed in this work. Based on concerns in current developments in technology-based cities and IoT smart cities, Mukherjee et al. suggest intelligent cities by integrating this into the present system and controlling academic references of cloud-based data, IoT-based intelligent administration, factors for innovative entities, and crucial decisions based on the smart city are offered [12]. This motivated the author to participate in the currently suggested system by retrieving data from a database [13]. To increase the deep and broad correlations of different channels and produce a successful SR network, Tian et al. introduced a 40-layer ESRGCNN [14]. This study uses adaptive up-sampling to create a flexible SR model that is especially useful for real-world uses. This study concludes that, in addition to the shallow ESRGCNN used in the number of parameters to layer RDN and CSFM for obtaining excellent visual effects, the super-resolution group CNN (ESRGCNN) for SISR will enhance the effect of deep and wide channel features by correlations of different channels to ESRGCNN for inheriting. It works with low-resolution images captured using different sampling strategies. This study achieves Comprehensive SISR objectives in terms of complexity and visual quality.
Finally, this literature review concentrated on the firmware and middleware layers concerning cyber-physical cloud computing. By doing this, the geographical delay is reduced. The SciCrowd crowd-based technology that has been presented develops academic literature search for various research communities. Multiple variables and planetary-scale geographical data were considered in the decision-making process [15]. Data exchange, analysis, and decision-making are the foundations for security when it comes to autonomous aerial aircraft [16], detecting autonomous vehicles, and making decisions. The effectiveness of monitoring unidentified cars has been improved by several existing automation systems. The most recent data for embedded systems is applied to the video surveillance system. Big data-based information provides motivating guidelines for advancing the economy and blockchain privacy. These studies provide an interesting idea regarding blockchain security.

3. Proposed Smart City Data Acquisition

The use of (ICTs) to improve quality of life, efficiency, and competitiveness, while ensuring that it meets the needs of present and future generations it represents Smart buildings, smart vehicles and roads, smart energy management, smart home, and so on [12]. A smart city is an intelligent city that is integrated digital technologies into its networks, services, and infrastructures. A smart city is a municipality that uses information and communication technologies to increase operational efficiency, share information with the public, and improve the quality of government services and citizen welfare.
Data collection is one of the critical building blocks of smart city applications. It uses Internet of Things (IoT) devices such as sensors, meters, among others, to collect and analyze data. The data in smart cities helps to improve infrastructures, public utilities, and services and to manage the daily task of enhancing public safety and environmental issues [17]. Here, data are collected from multiple sources. These sources are everywhere, including environmental sensors, cameras, GPS, smart gadgets, etc. Several big data can be arranged and stored at various sites for analysis. Many sensors, cameras, and other devices are utilized for data collection as the different types of data from different sources are required for analysis and to provide resources [10]. The entire process takes place with the help of the internet.
These data are generated continuously every second and every day, so the data are too large and complex to manage and store in a local server. In addition, this is not secure for data. Hence cloud computing technology is used for data storage and process. Cloud computing can store and manage a massive volume of data with the functionality of scalable and virtualized resources for computation by integrating resources of the electrical power system through a network. This increases the capacity of storage, robustness, and load balancing. It provides resources to users anytime and anywhere whenever a resource is required [11].
The smart city is based on the development of technology in the environment and society to make life easier and more comfortable, i.e., smart classrooms, smart vehicles, smart bus stations, and many others. The data collection is through devices, sensors, cameras, and so on with the help of the Internet [17]. Sensors are installed in indoor and outdoor cities, which provide the data by observing the signals that support and measure the various types of data from multiple places that can be converted to give understandable data. These collected data are stored in the cloud for future access or analysis, as shown in Figure 1 [18].
The sensors monitor the smart cities’ environment that rates the acceptable range of data. Each sensor holds an AODE classifier for the multiclassification purpose of each sensor collected data. This AODE (Averaged One-Dependence Estimator) classifier is a supervised machine learning algorithm that necessitates the attributes dependent on one another by averaging the whole classifier [15]. The AODE classifier classifies the collected data as normal or abnormal environment data by considering the majority voting. Algorithm 1 shows the steps for collecting data from IoT sensors in Smart Cities.
Algorithm 1: Algorithm for Collecting Data from IoT Sensors in Smart Cities.
Begin
  Input: A= {a1…an}-instance, R- result  // training data
For each instance
  Initially, the sensor finds a neighbour sensor, NN
  p (b, a) = p (b| a) p (a)
        P ( b / a ) = p b p ( a | b ) p a   //Compute the probability of b given a:
The end for // testing data
Repeat
 For ak ϵ A
    Compute p (b, a) = p (b, ak) p (a| b, ak)
        P ( b / a ) = p b , a k p ( a | b ,   a k ) p a
 Get R☐ node NN
 Return class value
 Update classifier
 End for
 Until Convergence
End.
For instance, each sensor held the AODE classifier. One of the sensors acts as a global classifier to predict the final output that collects the data from the local classifier. For each ak belongs to the A, and AODE looks for an estimate of the probability of each class b as follows,
P ( b / a ) = p b , a k p ( a | b , a k ) p a ,
where P(b/a) represents the estimation of p b , a k . The input sample data and n count of sensors. The prediction is based on the network traffic as either normal or abnormal data using distributed majority voting [19]. Consider an odd sensor count for distributed majority voting when the primary or highest vote determines the network traffic pattern. Finally, based on the sensor count, we can find the probability of data as normal or abnormal.

3.1. Crowd Computing in Smart City

The crowd represents a collection or group. It is a distributed computing model where a huge non-trivial process or task is split into several independent atomic or individual tasks distributed over multiple computing devices for each process [20]. Similarly, in crowd computing, the crowd determines a group sharing the resources or an ideal CPU cycle of a device for doing different computational processes. As many tasks are continuously taking place, it becomes difficult to manage them, so crowd computing is adapted [2].
These individual tasks are represented as micro-tasks, always in a ready state inside a job pool. Then the available crowd workers are searched, and a set of required crowd workers are selected. These crowd workers are potential to provide flexible support to overcome the challenges in managing and allocating work properly by assigning each task from the job pool to a variety of selected crowd workers and, in some cases, to maintain reliability, the same tasks might be given to different workers [18]. These individual tasks are provided as a simple program to the crowd workers without any other information depending on the context. Each crowd of workers produces a separate report of output to the centralized master, where all the results of each task are gathered after the execution of an independent individual task. After collecting those outputs, it masters checks for errors and assembles them to the final result set [21].
The development of technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), cloud, and other technologies paved the way for the growth of smart cities worldwide [22]. It is a promising technology with the functionality of using computing resources in a scalable and virtualized manner [20]. The city is called smart when the other fields such as transportation, public utilizes, education, smart home, public safety, and social and health care become smart, so it is found there is extensive use of data; thus, to manage these data, a cloud with crowd computing is used in this system [23].
As the single field contains the extensive data collected and managed by cloud computing, different areas need to be gathered, maintained, monitored, and continuously accessed in the smart city. It becomes difficult to apply crowd computing, which works as a distributed system with complex tasks that are hard for computers and are handled by distributing the task across the Internet [13]. The extracted set of tasks is managed by crowd management which contains a steady flow of crowds to prevent large crowds and ensure that the tasks are controlled in an orderly manner for accessing the resource from the cloud, which produces effective processing results—shown in Figure 2.

3.2. AODE-Based Classification

In this system, an AODE method is used to separate data gathered from smart cities, such as traffic data, power supply data, etc. These data should be managed individually to provide resources effectively. AODE represents Averaged One-Dependence Estimator; it is a method of classification learning which forms a specific format of a Bayesian classifier network named single dependence classifier. This method allows mutual dependencies between value pairs within a vector of input when ignoring complicated relationships of dependencies that take place in three or more values to remove some of the naivety of naive Bayesian classifiers [16].
It performs well with a considerable number of training or input data. AODE performs classification by aggregating the predictions of all single dependency classifiers in which all attributes depend on the same single parent attribute and the class. That parent attribute satisfies a minimum frequency constraint. It is an effective method for accommodating the violations of independence attributes of Naïve Bayes to allow dependent attributes from other attributes of non-classes [24]. To maintain efficiency, it uses a single dependency classifier such as TAN, where each attribute is based on the class and, at most, one other attribute. The learning process in a single dependency classifier is conducted through model selection, which is a process that generally uses substantial computational overheads and increases the number of variances related to Naïve Bayes. However, AODE considered averaging the predictions of a single-dependency classifier to avoid the model selection process [5].
In every dependency classifier, the attributes are considered as a parent of all other attributes, and these attributes are known as super parents. This type of classifier is known as a super parent single dependency classifier; that is, only those classifiers with a value a i which takes place at least n times, were used for predicting a class label b for the instance of test a = a 1 ,   a 2 ,   , a i thus for any values of attribute a i is represented as,
P b ,   A = P b ,   a i   P ( A |   b , a i )
as equality remains for every ai. Therefore, it becomes
P b ,   A = P   y , x 1 i n F   x i m P   y , x i P   ( x | y . x i ) 1 i n     F x i m
where f(ai) determines the attribute value in frequency ai in the training sample dataset. Considering Equation (1), assuming that the attributes are independent, providing the class and super-parent ai. Now, AODE predicts the class for A by choosing,
M a x 1 i n           F x i m   1   P ^   y , x i .     1 < j < n           j i   P ^   y , x i   ¨
After that, each dependency classifier estimates the joint probability P(b, A). AODE is used to average the many estimates of a single term since it lowers the estimates’ variance. It includes significantly less bias by raising variance in a narrow range because AODE provides a weaker attribute that is a conditional independence assumption than Naive Bayes during the avoidance of the model selection process [13].
Numerous studies claim that it consistently has a much lower loss—0 to 1—than a naive Bayes technique utilizing a medium-time complexity. As a result, in those studies, an AODE has a mathematically significant advantage of 0 to 1 loss over many other semi-naive Bayesian algorithms. It offers classification accuracy comparable to state-of-the-art methods’ discrimination accuracy. AODE must update the estimated probability whenever a new instance becomes easily accessible. Because of this, incremental learning techniques also leverage this mechanism. Thus, AODE has much promise and is utilized as a replacement for a classification approach due to its many attractive qualities [25].

3.3. Hybrid Data Obfuscation Technique

Data security is critical in the Cloud storage method, as it provides a large amount of storage medium to store data collected from smart cities and other sources. These data might be accessed illegally without proper authentication using a piece of code; thus, it should be encrypted or masked for security to protect data from unauthorized access [9]. However, in this system, to strengthen data security [26,27,28], both the encrypted and made formats are used, i.e., cryptosystem and data obfuscation methods are used, and its combination is known as Hybrid data obfuscation; this is shown in Figure 3.

Secure Data Handling by Data Obfuscation

Data obfuscation is a masking format that alters sensitive data in such a manner that it is of little or no use to unauthorized intruders but is usable by a legitimate individual. The data masking is used to safeguard sensor data that is saved in the cloud. This information might be sensitive in terms of commerce, health, etc. Data masking replaces the actual data with plausible but bogus data to protect privacy. Any data masking or obfuscation should not change the meaning of the data; instead, the data must be sufficiently altered such that it is not immediately apparent that the masked data came from a source of production data [7].
Data obfuscation may be done using a variety of methods. We employ methods of replacement in this system. Substitution is one of the best ways to maintain the actual appearance and feel of the data records. This method is most effective in masking the overall data subset is a masked data set for several different data fields. Substitution masks the original value by replacing the data with a different value. This one is one of the best data masking techniques that keeps the data’s original appearance and feel. Several different sorts of data may be used using this method. By applying anonymity to the data records and mixing the data with the data structure, it is, therefore, simple to keep the data using this technique while simultaneously maintaining a realistic-looking database that is difficult to distinguish from a database made up of masked data [25].
While maintaining the services in the cloud, the hybrid data obfuscation technique (obfuscation and cryptography) is a more powerful tool that secures the data from a malicious user. When the user uses the cloud service to perform the task, the user needs to obfuscate the encrypted data without knowing anyone about the sensitive data. This leads the cloud server to finish the task without losing data privacy [29].
In the cryptographic method, as data encryption is used, the symmetric and private keys are used to encrypt the sensor data into unusable form till these data are decrypted. When encrypting the data, no one can analyze the data. Here we use the public-key cryptographic method for encrypting and decrypting the data [5]. The public key can be shared with anyone, while the private key is protected. Compounding the private and public keys, we can unlock the data file. Here we test the numerical sensor data in a cloud array using a hybrid data obfuscation technique. Algorithm 2 shows the hybrid data obfuscation process for security purposes.
Algorithm 2: Algorithm for Hybrid Data Obfuscation for Security Purposes.
Input:Pt- plaintext, C_T ☐cipher Text
Output:data is Obfuscated
Initially, Pt- plaintext with n size
Get k1
 For eachk, j = 1,2… <=m
   findsquare (Sq)
   Nt(k) = Pt (k)*k1        // value Nt(k)
   Sq(k) = pow (Nt(k),2)     //Rotate the Sq(k)
   Get k2           //Rotate the RTN at K2 several times
   Rt(k) = rotate (Sq(k), k2+j) //Find mod for RTN by 256
   mod(k) = Rt(k)%256   //Convert mod into ASCII code
 C_T (k) ☐ASCII (mod(k))
 C_T☐ cipher text
End for
Using these two keys, the hybrid data obfuscation technique conceives the numerical data to ensure data in the cloud server. These techniques use (mul), (pow), (pivot), (mod), and (ASCII) as coherent activities for data. In the cloud, private keys are created and sent to the users [3]. It retains the service in the company’s Key Management (Km). Initially, consider the sensor resulting from numerical data as plaintext with the size of the plain text. Then, the fair value of an Sq(k) and Nt(k) = are computed. The given plaintext is multiplied with the k1 model calculation and stored as Nt. Then calculate a value for k1, assign a value equal to the m, and multiply plaintext with the k1.
Nt(k) = Pt (k)∗k1
The model k2 is used for the qualities of the square. For k2 times, the k2 route also increased, and the fair value is rotated from right to left as Rotate the Sq(k). for upcoming values in Sq(k), k2 + j, where j, k = 1,2, 3... N.
Rt(k) = rotate (Sq(k), k2 + j)
Every time, attributes are released to clear for k2 by adding the mod value. Find Rt(k) mod by 256. Rt(k) mod value is computed by dividing the rotate value by 256. Every mod-value the Creating an ASCII character. The original numerical plaintext and ciphertext are represented by those ASCII letters. To create the ciphertext C T, convert mod(k) into ASCII code. A way to encrypt data without compromising its privacy is via cipher text [2]. The obfuscation creates the ciphertext by blending a variety of ASCII character codes. Each numerical value has a unique cipher text based on the ASCII characteristics code. Each character in the cipher text has an identical plaintext. The plain text and CipherText data sizes may differ [30,31,32].

3.4. Proposed Cryptosystem for Data Management

A cryptosystem uses cryptographic methods and the infrastructure that supports them to offer information security services. A cipher system is another name for a cryptosystem. Plaintext, ciphertext, decryption key, and encryption key are the different parts of a fundamental cryptosystem. The data are encrypted using plaintext during the ciphertext storage procedure. When retrieved, the decryption technique is used to restore the original data [33,34,35,36]. Symmetric Key Encryption and Asymmetric Key Encryption are the two categories of encryption-decryption-based cryptosystems [20]. Asymmetric Key Encryption is the name given to the encryption technique when distinct keys are used to both encrypt and decode the data. It is possible to recover the plaintext by decrypting the ciphertext even though the keys are distinct yet mathematically linked. It makes use of separate private and public keys. For encryption and decryption, public and private keys are utilized [6]. The private key is meant to be private, as suggested by the name, so that only the receiver who has been verified may decode the message. To create a key pair, this technique employs a key generation protocol. Mathematically speaking, both keys are related. The way the keys are related varies depending on the algorithm [17]. Asymmetric encryption has benefits when storing data since it uses a public key that is widely available to encrypt data and a private key that is linked to a public key to decode data using the appropriate algorithms. Additionally, it includes the Parallel Server system’s SELECT-APSL command [29].

SELECT-APSL

SELECT-APSL: this is only applicable to Parallel Servers. The best join technique could be determined by the value of the? Parameter while the criteria are given with one. The value of the? The parameter cannot be known during pre-processing. Hence the best join technique cannot be chosen. The hit rate during SQL execution is calculated to select a joining technique [17]. The SELECT-APSL data retrieval method obtains the obfuscated hybrid data from a big-data database in a cloud server. The SELECT-APSL is only applicable for the Parallel Server (PS), which contains the results of obfuscated hybrid data. We consider the input as pre-processed data (PPd) and read the input of the Parallel Server as PSin. This input is selected and retrieved using a SELECT-APSL method [6]. Algorithm 3 shows the data retrieval process using SELECT-ASPL.
Algorithm 3: Algorithm for Data Retrieval Using SELECT-ASPL.
Initially, the Parallel Server (PS) contains obfuscated hybrid data(O-Hd), PPd- pre-processed data, input (Parallel Server)- PSin
Input:PSin, PPd
Foreach input
 Select ☐input (PSin)  // find PSin using APSL
If(specified big data DB = O-Hd)
select ☐ (Join method. (O-Hd))
 O(O-Hd)☐( O-Hd)
Whilepre-processing
 pre-processing_data count ≠ select optimum join method
return, specified big data DB ≠ O-Hd
End while
End if
If (PPd ≠ (O-Hd)) // Compute hit rate
If (hit rate data count ≥ no. of O(O-Hd) + no. of PPd)
 Else     // data retrieving rate positively high
check no. of PPd
End if End if
Repeat
If no. of PPd> no. of (PSin)
   execute: Compute the hit rate
Else if (no. of PPd < no. of (PSin)
   continue (data retrieving rate positively low)
Else rechecks no. of PPd
End if (Until termination criterion met)
End for
Return accurate data retrieving rate && retrieve data as PSin
This retrieval method only obtains the data when the specified condition is satisfied. When the specified big-data database containing the obfuscated hybrid data condition is valid, we can select and perform a join method that depends on the count of obfuscated hybrid data. Then we can optimize the obfuscated hybrid data and obtain an optimum join method. During the pre-processing process, we cannot determine the count of obfuscated hybrid data, so the specified big-data database does not contain the obfuscated hybrid data. When the pre-processed data is not similar to the obfuscated hybrid data, we select the join method for computing the hit rate. This computation leads to the rate of the data retrieving process [13].
When the count of hit rate is more significant than equal to the addition of the count of optimized [37] obfuscated hybrid data and pre-processed data, the possibility of data retrieving rate increases positively; otherwise, we need to check the count of pre-processed data [18]. When the count of pre-processed data is greater than the count of the parallel server, then we re-execute the computation process of hit rate. If the count of pre-processed data is lesser than the count of the parallel server, the time taken to retrieve the data rate is positively low. Otherwise, we recheck the count of pre-processed data [25].
The above process is repeated until we retrieve the final output as a parallel server input. This process finally retrieves the accurate hit rate as retrieving rate. We can easily retrieve the required data as an output [12]. At first, data is masked using a supplementation method. Then an asymmetric key is used to encrypt data using a private key [19]. This makes data more secure [38,39]. Thus, hybrid data obfuscation uses a cryptography system and obfuscation.

4. Result Comparison Discussion with Data Modules

This section presents the simulation results showing the effectiveness of the proposed algorithm. This performance simulation is executed using CloudSim Plus, a framework for modelling and simulating extensible clouds. It is a good research tool that can manage the complications coming from simulated environments since it is a fully configurable tool that allows the expansion and formulation of rules in every software stack component. The proposed Averaged One-Dependence Estimators (AODE) and SELECT Applicable Only To Parallel Server (ASA) compare with the Beyond fifth Generation (B5G), Fully Automated Unmanned Aerial Vehicles (FAUAV) [2], Maximum Correlation Criterion, And Minimum Dependence Criterion (MCCMDC) [40], Multi Independent Latent Component Naive Bayes Classifier (MILC-NB) [3] and Correlation-Augmented Naïve Bayes (CAN) [28] Algorithm. The analyze results are then shown in Table 1 and Figure 4.
The database storage and retrieval issue are resolved by this research’s proposed Secure Cloud and Crowd Computing for Smart City Data Obfuscation. According to the results, the proposed method for data obfuscation increases total packet delivery by about 47.55%, CAN [28] delivery by about 50.55%, MILC-NB [3] delivery by about 52.73%, MCCMDC [38] delivery by about 55.80%, FAUAV [2] delivery by about 58.35%, and B5G [7] delivery by about 60.23% in comparison with the proposed algorithm.
The ASA increases the total packet delivered by about CAN [28] in Figure 5. Packet delivery ratio after data obfuscation: MCCMDC [38] has 79.1%, FAUAV [2] has 83.7%, B5G [7] has 78.8%, and ASA has 81.3%, respectively.
Table 2, Figure 6 and Figure 7 of this research deal with the obfuscation of data which renders sensitive information worthless to harmful actors by replacing it with data that seems to be actual production data. In this era, the Energy Consumption was calculated on the proposed Averaged One-Dependence Estimators (AODE) and SELECT Applicable Only to Parallel Server (ASA). This might be compared with the existing system of Energy Consumption. The Energy Consumption before data obfuscation is 1.18% lower than the CAN [28], 1.08% lower than the MILC-NB [3], 1.80% lower than the MCCMDC [38], 1.05% lower than the FAUAV [2], 4.02% lower than the B5G [7] algorithm, respectively. Meanwhile, the Average Energy Consumption after data obfuscation has 4.74%, decreased on CAN [28], 4.31%, decreased on MILC-NB [3], 7.18% decreased on MCCMDC [38], 4.21% decreased on FAUAV [2], 16.08% decreased on B5G [7] compared to the proposed Averaged One-Dependence Estimators (AODE) and SELECT Applicable Only to Parallel Server (ASA) algorithm.
Table 3 and Figure 8 of this research: In terms of data classification improvement percentage in the proposed scenario, the proposed method has improved Data classification by about 3.48% compared with the MILC-NB algorithm, 5.66% compared with the MCCMDC algorithm, 14.48% compared with the FAUAV algorithm, and about 17.62% compared with the CAN approximately 69.34% compared with the Data classification improvement percentage Analysis on ASA algorithm.
The Analysis of Make Span Time (ms) before data obfuscation has been reduced by about CAN [28] 32.15%, MILC-NB [3] 33.20%, MCCMDC [38] 34.35%, FAUAV [2] 35.40%, B5G [7] 36.50%, and ASA 30.65%, which are shown in Table 4, Figure 9 and Figure 10. The overall throughput has dropped by about CAN [28] 1.27%, MILC-NB [3] 1.31%, MCCMDC [38] 1.36%, FAUAV [2] 1.41%, B5G [7] 1.44%, and ASA 1.21%, respectively, following Cryptosystem Assumption after data obfuscation.
From Table 5, results in Analysis (Figure 11a–f) of Energy Consumption Before Cryptosystem Assumption show that the proposed method in Cryptosystem Assumption increases the Total packet delivered by about 79.25%, 84.25%, 87.88%, 93.00%, 97.25%, and 98.38% in comparison to MILC-NB, MCCMDC, FAUAV, CAN and B5G algorithm respectively. In terms of Energy Consumption improvement percentage in the proposed scenario, the proposed method has improved Energy Consumption by about 5.00% compared with the MILC-NB algorithm, 8.63% compared with the MCCMDC algorithm, 13.75% compared with the FAUAV algorithm, and about 18.00% compared with the CAN approximately 21.13% compared with the Data classification improvement percentage Analysis ASA algorithm.
The proposed method, assuming the use of a Cryptosystem, increases the Total packet delivered by approximately CAN [28] 6.43%, MILC-NB [3] 50.55%, MCCMDC [38] 52.73%, FAUAV [2] 5.80%, B5G [7] 58.35%, and ASA 60.23% improved, according to Table 6’s results of the analysis (Figure 12a–f) of Energy Consumption assuming the use of a Cryptosystem. In terms of the proposed scenario’s Data classification improvement percentage, the proposed method outperformed the MILC-NB algorithm by about 6.43%, the MCCMDC algorithm by about 50.55%, the FAUAV algorithm by about 52.73%, the CAN algorithm by about 55.80%, and the Data classification improvement percentage Analysis ASA algorithm by about 60.23%.

5. Conclusions

This research work primarily focuses on data maintenance collected from IoT sensors in smart cities being managed by cloud computing. The three methods are data obfuscation, classification, and crowd computing for efficient data handling on the cloud using a cryptosystem. The introduced crowd computing is useful for data classification when using IoT sensors. The algorithm for collecting data from sensors improved data management with the help of hybrid data obfuscation. The AODE classifier helps to classify the data. The hybrid data obfuscation used data masking to maintain data management. SELECT-APSL was employed for data retrieving from the cloud. Finally, secure data was created in the presence of tracing data behaviour. The analysis results on energy consumption before and after cryptosystem use show that the proposed method increases total packet delivery by 79.25%, 84.25%, 87.88%, 93.00%, 97.25%, and 98.38% in comparison with MILC-NB, MCCMDC, FAUAV, CAN and B5G algorithm, respectively. The proposed method improved data classification by 6.43% compared with the MILC-NB algorithm, 50.55% compared with the MCCMDC algorithm, 52.73% compared with the FAUAV, 55.80% compared with CAN, and finally, 60.23% compared with the Data classification improvement percentage Analysis ASA algorithm. The analysis of makespan time (in milliseconds) after data obfuscation has decreased by 1.27%, 1.31%, 1.36%, 1.41%, 1.44%, and 1.21%, compared with CAN, MILC-NB, MCCMDC, FAUAV, and B5G algorithm, respectively.

Author Contributions

Data curation: S.A.A., F.A.; Writing original draft: M.T. and S.B.; Supervision: S.S.; Project administration: S.S.; Conceptualization: M.T. and S.B.; Methodology: M.T. and S.B.; Validation: S.A.A. and F.A.; Visualization: S.A.A. and F.A.; Resources: S.S.; Review and Editing: G.S. and J.C.-W.L.; Funding acquisition: G.S. and J.C.-W.L. All authors have read and agreed to the published version of the manuscript.

Funding

This paper is partially supported by the Western Norway University of Applied Sciences, Bergen, Norway.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Acknowledgments

The authors would like to thank Western Norway University of Applied Sciences, Bergen, Norway for supporting this research.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Khadidos, A.O.; Shitharth, S.; Khadidos, A.O.; Sangeetha, K.; Alyoubi, K.H. Sangeetha, and Khaled H. Alyoubi. Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism. J. Sens. 2022, 2022, 8457116. [Google Scholar] [CrossRef]
  2. Kuru, K. Planning the future of smart cities with swarms of fully autonomous unmanned aerial vehicles using a novel framework. IEEE Access 2021, 9, 6571–6595. [Google Scholar] [CrossRef]
  3. Alizadeh, S.H.; Hediehloo, A.; Harzevili, N.S. Multi independent latent component extension of naive bayes classifier. Knowl. Based Syst. 2021, 213, 106646. [Google Scholar] [CrossRef]
  4. Shitharth, S.; Sangeetha, K.; Mohammed, G.B. Enhanced SCADA IDS Security by using MSOM Hybrid Unsupervised Algorithm. Int. J. Web Based Learn. Teach. Technol. (IJWLTT) 2021, 17, 1–9. [Google Scholar] [CrossRef]
  5. Cao, B.-B.; You, T.-H.; Ou, C.X.; Zhu, H.; Liu, C.-Y. Optimizing payment schemes in a decentralized supply chain: A Stackelberg game with quality investment and bank credit. Comput. Ind. Eng. 2022, 168, 108077. [Google Scholar] [CrossRef]
  6. Arora, S.; Bal, J.S. Data obfuscation for security in cloud computing: An analytical study. J. Crit. Rev. 2021, 8, 593–603. [Google Scholar]
  7. Alsamhi, S.H.; Almalki, F.A.; Afghah, F.; Hawbani, A.; Shvetsov, A.V.; Lee, B.; Song, H. Drones’ Edge Intelligence Over Smart Environments in B5G: Blockchain and Federated Learning Synergy. IEEE Trans. Green Commun. Netw. 2021, 6, 295–312. [Google Scholar] [CrossRef]
  8. Longo, F.; Puliafito, A.; Rana, O. Guest editors’ introduction to the special issue on fog, edge, and cloud integration for smart environments. ACM Trans. Internet Technol. (TOIT) 2019, 19, 1–4. [Google Scholar] [CrossRef]
  9. Correia, A.; Schneider, D.; Paredes, H.; Fonseca, B. SciCrowd: Towards a hybrid, crowd-computing system for supporting research groups in academic settings. In International Conference on Collaboration and Technology; Springer: Cham, Switzerland, 2018; pp. 34–41. [Google Scholar]
  10. Dong, J.; Metternicht, G.; Hostert, P.; Fensholt, R.; Chowdhury, R.R. Remote sensing and geospatial technologies in support of a normative land system science: Status and prospects. Curr. Opin. Environ. Sustain. 2019, 38, 44–52. [Google Scholar] [CrossRef]
  11. Ezzat, M.A.; Abd El Ghany, M.A.; Almotairi, S.; Salem, M.A.M. Horizontal Review on Video Surveillance for Smart Cities: Edge Devices, Applications, Datasets, and Future Trends. Sensors 2021, 21, 3222. [Google Scholar] [CrossRef]
  12. Mukherjee, P.; Barik, R.K.; Pradhan, C. A comprehensive proposal for blockchain-oriented smart city. In Security and Privacy Applications for Smart City Development; Springer: Cham, Switzerland, 2021; pp. 55–87. [Google Scholar]
  13. Ketu, S.; Mishra, P.K. A Contemporary Survey on IoT Based Smart Cities: Architecture, Applications, and Open Issues. Wirel. Pers. Commun. 2022, 112, 2319–2367. [Google Scholar] [CrossRef]
  14. Tian, C.; Yuan, Y.; Zhang, S.; Lin, C.W.; Zuo, W.; Zhang, D. Image Super-resolution with An Enhanced Group Convolutional Neural Network. arXiv 2022, arXiv:2205.14548. [Google Scholar] [CrossRef] [PubMed]
  15. Liu, X.; Zhang, G.; Li, J.; Shi, G.; Zhou, M.; Huang, B.; Tang, Y.; Song, X.; Yang, W. Deep Learning for Feynman’s Path Integral in Strong-Field Time-Dependent Dynamics. Phys. Rev. Lett. 2020, 124, 113202. [Google Scholar] [CrossRef] [PubMed]
  16. Lv, Z.; Chen, D.; Feng, H.; Zhu, H.; Lv, H. Digital Twins in Unmanned Aerial Vehicles for Rapid Medical Resource Delivery in Epidemics. IEEE Trans. Intell. Transp. Syst. 2021, 1, 1–9. [Google Scholar] [CrossRef]
  17. Wang, L.; Chen, P.; Chen, S.; Sun, M. A novel approach to fully representing the diversity in conditional dependencies for learning Bayesian network classifier. Intell. Data Anal. 2021, 25, 35–55. [Google Scholar] [CrossRef]
  18. Aarthi, V.; Vijayarangan, V. Machine Learning Based Early Prediction of Rainfall Induced Landslide–A Detailed Review. In Soft Computing for Intelligent Systems; Springer: Singapore, 2021; pp. 467–488. [Google Scholar]
  19. Enireddy, V.; Somasundaram, K.; Prabhu, M.R.; Babu, D.V. Data Obfuscation Technique in Cloud Security. In Proceedings of the 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 7–9 October 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 358–362. [Google Scholar]
  20. Zhou, R.; Yang, Y.; Chen, P. An RSS Transform-Based WKNN for Indoor Positioning. Sensors 2021, 21, 5685. [Google Scholar] [CrossRef]
  21. Schneider, C.G.; Fey, J.; Zou, X.; Gerbasi, V.; Savransky, T.; Batt, C.; Bergmann-Leitner, E.; Angov, E. Norovirus-VLPs expressing pre-erythrocytic malaria antigens induce functional immunity against sporozoite infection. Vaccine 2022, 40, 4270–4280. [Google Scholar] [CrossRef]
  22. Cao, K.; Ding, H.; Wang, B.; Lv, L.; Tian, J.; Wei, Q.; Gong, F. Enhancing Physical Layer Security for IoT with Non-Orthogonal Multiple Access Assisted Semi-Grant-Free Transmission. IEEE Internet Things J. 2022, 1–10. [Google Scholar] [CrossRef]
  23. Khalilpour Darzi, M.R.; Khedmati, M.; Niaki, S.T.A. Correlation-augmented Naïve Bayes (CAN) Algorithm: A Novel Bayesian Method Adjusted for Direct Marketing. Appl. Artif. Intell. 2021, 35, 2013–2036. [Google Scholar] [CrossRef]
  24. Wang, L.; Xie, Y.; Pang, M.; Wei, J. Alleviating the attribute conditional independence and IID assumptions of averaged one-dependence estimator by double weighting. Knowl. Based Syst. 2022, 250, 109078. [Google Scholar] [CrossRef]
  25. Khwaja, A.S.; Erkucuk, S.; Anpalagan, A.; Venkatesh, B. Evaluation of Noise Distributions for Additive and Multiplicative Smart Meter Data Obfuscation. IEEE Access 2022, 10, 27717–27735. [Google Scholar] [CrossRef]
  26. Khadidos, A.O.; Shitharth, S.; Manoharan, H.; Yafoz, A.; Khadidos, A.O.; Alyoubi, K.H. An Intelligent Security Framework based on Collaborative Mutual Authentication Model for Smart City Networks. IEEE Access 2022, 10, 85289–85304. [Google Scholar] [CrossRef]
  27. Kshirsagar, P.R.; Manoharan, H.; Alterazi, H.A.; Alhebaishi, N.; Rabie, O.B.J.; Shitharth, S. Construal Attacks on Wireless Data Storage Applications and Unraveling Using Machine Learning Algorithm. J. Sens. 2022, 2022, 8457116. [Google Scholar] [CrossRef]
  28. Alterazi, H.A.; Kshirsagar, P.R.; Manoharan, H.; Shitharth, S.; Alhebaishi, N.; Srivastava, G.; Lin, J.C.-W. Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization. Sensors 2022, 22, 6117. [Google Scholar] [CrossRef]
  29. Li, H.; Qian, Z.; Liu, G.; Wang, X. NQRELoc: AP Selection via Nonuniform Quantization RSSI Entropy for Indoor Localization. IEEE Sens. J. 2022, 22, 9724–9732. [Google Scholar] [CrossRef]
  30. Zheng, W.; Yin, L. Characterization inference based on joint-optimization of multi-layer semantics and deep fusion matching network. PeerJ Comput. Sci. 2022, 8, e908. [Google Scholar] [CrossRef] [PubMed]
  31. Hong, T.; Guo, S.; Jiang, W.; Gong, S. Highly Selective Frequency Selective Surface with Ultrawideband Rejection. IEEE Trans. Antennas Propag. 2022, 70, 3459–3468. [Google Scholar] [CrossRef]
  32. Xu, K.-D.; Weng, X.; Li, J.; Guo, Y.-J.; Wu, R.; Cui, J.; Chen, Q. 60-GHz third-order on-chip bandpass filter using GaAs pHEMT technology. Semicond. Sci. Technol. 2022, 37, 055004. [Google Scholar] [CrossRef]
  33. Sun, Q.; Lin, K.; Si, C.; Xu, Y.; Li, S.; Gope, P. A Secure and Anonymous Communicate Scheme over the Internet of Things. ACM Trans. Sens. Netw. 2022, 18, 1–21. [Google Scholar] [CrossRef]
  34. Zhang, Y.; Liu, F.; Fang, Z.; Yuan, B.; Zhang, G.; Lu, J. Learning from a Complementary-Label Source Domain: Theory and Algorithms. IEEE Trans. Neural Netw. Learn. Syst. 2021, 1, 1–15. [Google Scholar] [CrossRef]
  35. Zhong, L.; Fang, Z.; Liu, F.; Yuan, B.; Zhang, G.; Lu, J. Bridging the Theoretical Bound and Deep Algorithms for Open Set Domain Adaptation. IEEE Trans. Neural Netw. Learn. Syst. 2021, 1, 1–15. [Google Scholar] [CrossRef] [PubMed]
  36. Qin, X.; Zhang, L.; Yang, L.; Cao, S. Heuristics to sift extraneous factors in Dixon resultants. J. Symb. Comput. 2022, 112, 105–121. [Google Scholar] [CrossRef]
  37. Cao, B.; Zhao, J.; Lv, Z.; Yang, P. Diversified Personalized Recommendation Optimization Based on Mobile Data. IEEE Trans. Intell. Transp. Syst. 2021, 22, 2133–2139. [Google Scholar] [CrossRef]
  38. Majid, M.; Habib, S.; Javed, A.R.; Rizwan, M.; Srivastava, G.; Gadekallu, T.R.; Lin, J.C.-W. Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review. Sensors 2022, 22, 2087. [Google Scholar] [CrossRef] [PubMed]
  39. Mohammadi, M.; Noghabi, H.S.; Hodtani, G.A.; Mashhadi, H.R. Robust and stable gene selection via maximum–minimum correntropy criterion. Genomics 2016, 107, 83–87. [Google Scholar] [CrossRef]
  40. Pouriyeh, S.; Shahid, O.; Parizi, R.M.; Sheng, Q.Z.; Srivastava, G.; Zhao, L.; Nasajpour, M. Secure Smart Communication Efficiency in Federated Learning: Achievements and Challenges. Appl. Sci. 2022, 12, 8980. [Google Scholar] [CrossRef]
Figure 1. Data collection and storage in smart cities.
Figure 1. Data collection and storage in smart cities.
Sensors 22 07169 g001
Figure 2. Crowd Computing with the Cloud for a smart city.
Figure 2. Crowd Computing with the Cloud for a smart city.
Sensors 22 07169 g002
Figure 3. Hybrid data obfuscation for security.
Figure 3. Hybrid data obfuscation for security.
Sensors 22 07169 g003
Figure 4. Packet delivery ratio before data obfuscation.
Figure 4. Packet delivery ratio before data obfuscation.
Sensors 22 07169 g004
Figure 5. Packet delivery ratios before data obfuscation.
Figure 5. Packet delivery ratios before data obfuscation.
Sensors 22 07169 g005
Figure 6. The average energy consumption before data obfuscation.
Figure 6. The average energy consumption before data obfuscation.
Sensors 22 07169 g006
Figure 7. The power energy consumption after data obfuscation.
Figure 7. The power energy consumption after data obfuscation.
Sensors 22 07169 g007
Figure 8. The improvement of Data classification improvement percentage for the ASA compared to other methods.
Figure 8. The improvement of Data classification improvement percentage for the ASA compared to other methods.
Sensors 22 07169 g008
Figure 9. The Make span Before Cryptosystem Assumption.
Figure 9. The Make span Before Cryptosystem Assumption.
Sensors 22 07169 g009
Figure 10. The total throughput after Cryptosystem Assumption.
Figure 10. The total throughput after Cryptosystem Assumption.
Sensors 22 07169 g010
Figure 11. The energy consumption after cryptosystem assumption. (a) Energy Consumption In Before Cryptosystem (ASA), (b) Energy Consumption In Before Cryptosystem (MILC-NB), (c) Energy Consumption In Before Cryptosystem (MCCMDC), (d) Energy Consumption In Before Cryptosystem (FAUAV), (e) Energy Consumption In Before Cryptosystem (CAN), (f) Energy Consumption In Before Cryptosystem (B5G).
Figure 11. The energy consumption after cryptosystem assumption. (a) Energy Consumption In Before Cryptosystem (ASA), (b) Energy Consumption In Before Cryptosystem (MILC-NB), (c) Energy Consumption In Before Cryptosystem (MCCMDC), (d) Energy Consumption In Before Cryptosystem (FAUAV), (e) Energy Consumption In Before Cryptosystem (CAN), (f) Energy Consumption In Before Cryptosystem (B5G).
Sensors 22 07169 g011
Figure 12. The energy consumption after cryptosystem assumption. (a) Energy Consumption After Cryptosystem (ASA), (b) Energy Consumption After Cryptosystem (MILC-NB), (c) Energy Consumption After Cryptosystem (MCCMDC), (d) Energy Consumption After Cryptosystem (FAUAV), (e) Energy Consumption After Cryptosystem (CAN), (f) Energy Consumption After Cryptosystem (B5G).
Figure 12. The energy consumption after cryptosystem assumption. (a) Energy Consumption After Cryptosystem (ASA), (b) Energy Consumption After Cryptosystem (MILC-NB), (c) Energy Consumption After Cryptosystem (MCCMDC), (d) Energy Consumption After Cryptosystem (FAUAV), (e) Energy Consumption After Cryptosystem (CAN), (f) Energy Consumption After Cryptosystem (B5G).
Sensors 22 07169 g012
Table 1. Analysis of Total packet delivered (pkt/s).
Table 1. Analysis of Total packet delivered (pkt/s).
No. of DataTotal Packet Delivered (PKT/sec)
ASACAN [13]MILC-NB [10]MCCMDC [26]FAUAV [5]B5G [4]
15018.517.516.0415.6710.087.98
20042.5438.7925.4528.6518.4012.45
25052.8546.9240.8643.8732.713.82
30062.4557.4645.1459.7432.10414.44
35078.8765.3666.9174.7022.8420.71
40092.1778.1570.2769.4736.7523.27
45098.7182.7375.8980.7940.2128.89
50096.2782.2778.3582.9430.4223.35
55099.7882.4982.4988.6718.2811.36
600118.345101.35118.36106.5322.5113.09
Table 2. Analysis of Average Energy Consumption.
Table 2. Analysis of Average Energy Consumption.
No. of DataAverage Energy Consumption (J/sec)
ASACANMILC-NBMCCMDCFAUAVB5G
1501.0231.0242.0050.0015.7828.246
2002.6821.2644.6022.4309.21315.825
2503.2571.6233.9211.92311.07818.023
3002.2132.8917.2184.13216.05720.021
3504.6215.6528.2106.02018.02521.925
4006.6237.7329.9245.21320.02323.651
4506.6235.59211.2535.58220.02327.365
5006.6037.0178.1836.61217.03228.721
5506.6134.6438.3594.60320.06231.254
6007.1265.6218.1295.62123.45733.521
Table 3. Data classification improvement percentage Analysis.
Table 3. Data classification improvement percentage Analysis.
No. of DataData Classification Improvement Percentage (%)
ASAMILC-NBMCCMDCFAUAVCAN
10024.62321159.9
15012.877.57.55.54.8
2001612.512.58.45
2501917.51486
3002321191210
3503028.524133
4003629.626.211.310
45038323010.49.8
Table 4. Analysis of Make Span Time (ms).
Table 4. Analysis of Make Span Time (ms).
No. of DataMake Span Time (ms)
B5GCANMILC-NBMCCMDCFAUAVASA
100116512651362140314821000
150172518531892192119891672
200241824932513261427152381
250295130023210335133702815
300341735823624372538163316
350418342714521461246313852
400472348265041526253814504
450531954125632573459825201
Table 5. Analysis of Energy Consumption before Cryptosystem Assumption.
Table 5. Analysis of Energy Consumption before Cryptosystem Assumption.
No. of DataEnergy Consumption before Cryptosystem
ASAMILC-NBMCCMDCFAUAVCANB5G
1000.290.310.340.360.370.38
1500.490.510.520.530.550.57
2000.610.630.660.690.710.72
2500.780.80.820.840.860.92
3000.910.971.021.021.061.09
3500.991.021.121.21.241.28
4001.081.171.21.341.41.45
4501.191.331.351.461.591.62
Table 6. Analysis of Energy Consumption after Cryptosystem Assumption.
Table 6. Analysis of Energy Consumption after Cryptosystem Assumption.
No. of DataEnergy Consumption after Cryptosystem
ASAMILC-NBMCCMDCFAUAVCANB5G
1000.0740.1860.2040.2160.2220.228
1500.0940.3060.3120.3180.330.342
2000.0660.3780.3960.4140.4260.432
2500.0680.480.4920.5040.5160.552
3000.0460.5820.6120.6120.6360.654
3500.0940.6120.6720.720.7440.768
4000.0480.7020.720.8040.840.87
4500.0240.7980.810.8760.9540.972
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Thirumalaisamy, M.; Basheer, S.; Selvarajan, S.; Althubiti, S.A.; Alenezi, F.; Srivastava, G.; Lin, J.C.-W. Interaction of Secure Cloud Network and Crowd Computing for Smart City Data Obfuscation. Sensors 2022, 22, 7169. https://doi.org/10.3390/s22197169

AMA Style

Thirumalaisamy M, Basheer S, Selvarajan S, Althubiti SA, Alenezi F, Srivastava G, Lin JC-W. Interaction of Secure Cloud Network and Crowd Computing for Smart City Data Obfuscation. Sensors. 2022; 22(19):7169. https://doi.org/10.3390/s22197169

Chicago/Turabian Style

Thirumalaisamy, Manikandan, Shajahan Basheer, Shitharth Selvarajan, Sara A. Althubiti, Fayadh Alenezi, Gautam Srivastava, and Jerry Chun-Wei Lin. 2022. "Interaction of Secure Cloud Network and Crowd Computing for Smart City Data Obfuscation" Sensors 22, no. 19: 7169. https://doi.org/10.3390/s22197169

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop