A Secured Frame Work for Searching and Sharing of Datain Cloud Based Services using IoT

— The internet technologies evolved many new innovations in communication technologies for searching and sharing data over the IoT. The importance of both software and hardware technologies became an important for the service providers and users as well. Searching and data sharing is contemporary task for the services providers because security aspects. Efficient searching and secured data sharing is an open issue till now. Information leakage costs more for the organizations. In this paper we proposes an efficient frame work for secured cloud based services where the data can shared among multiple devices of IoT. Our scheme allows all smart devices interact and share data among users in Internet of Things securely. We also attempted to develop a useful searching mechanism for having required data by the users over distributed storage domains to share. We conducted an abundant survey and study them in depth for better improvement of our work.


INTRODUCTION
The Internet of Things is one of the internet revolutions which provide a platform for all real world s mart devices to connect and use the internet for searching and data sharing among various users. Various studies tell that by the end of the 2020 there would be great improvement in the usage of internet through smart devices. One of the studies of the CISCO 1 reveals that more than 50 billion smart devices are going to share the internet through various smart devices. The challenge for th is act is to provide co mpatible environ ment by the t ime with capable searching and secured mechanism. It further extends to smart grids, smart technologies in the domains of ho mes, cities, med icine, healthcare systems, transport systems etc. These heterogeneous smart devices will establish a platform for generating large volu mes of data. The generated data will be stored in cloud. To access the cloud data highly co mputational techniques are required for searching, processing the data in shared platform with an efficiency and security. There will be a contradiction, smart devices have limited capacity but cloud services are virtual i.e unlimited capabilit ies hence by using IoT this can be resolved some extent.IoT services required low latency, high data rate, fast data access, and real-t ime dataanalytics/processing with decis ion-making and mobility support of smart devices. It is one more gap for efficient searching and data sharing in cloud based services.

II.
RELATED WORK The objective of this paper is to provide proper searching and sharing data among users over cloud based services using IoT. Many smart devices are available in the market and easy to connect internet to access required data fro m cloud. The main focus is sharing of data among mult iple smart devices which leads compatibility and extensibility of their services for efficient searching techniques. The generation of internet technologies crossing rapidly like 2G to 5G etc there may be expected phenomenon for device technologies. In this paper we tried to give some possible solutions for efficient searching and with secured data sharing over the smart devices in cloud based services using IoT. The existed encrypted and decrypted security mechanis ms performed well and the same we are extending for the problem like symmetric, public key and homo morphic encryptions used. For the controlling of access control used control list and dynamic attributes are used. Key encryptions are used for searching data for IoT. This is an extra burden to the s mart devices hence heavy computational process is required. By considering all the mentioned limitations there may be a need of an alternative solution is required. Hence we proposed a lightweight cryptographic mechanism for  [2] given a health monitoring system fo r v ital signs using IoT, this article presents the design of a real-time health monitoring system which can store apatient's basic health parameters. Panagiotis I. Radoglou Grammatikis in [3] given few measures for securing the Internet of Things: Challenges, threats and solutions. Sahitya.Roy ,Dr Rajarshi. Ray,IoT in [4]  We conducted an intensive survey fro m which we drafted the required things to use and modify technologies to improve our wo rk. The survey is useful us to take make and decisions about our work to select things required. All the existed works exp lained well in many aspects but little back on explanation of searching and security aspects. The rest of the paper is organized as follows. Inthe fourth section, we present the proposed work, section five explains data sharing and searching, section six given the performance analysis of the work, section seven describes various cryptographic mechanis ms that are used in our proposedscheme. Wethen analyse the performance and compare it to related works. Finally, we conclude our paper by drafting the conclusion.

IV.
PROPSED WORK AND SECURITY ASPECTS The proposed work concentrates various cryptographic techniques used and how they contributed to perform an efficient searching with security for shared data over the smart devices of IoT.
Cryptographic Technique It is a t wo key mechanis m, public key and a secret key.
Public key can be used before sending data and secret key is used for decrypting the data. Searchable Secret Key Encryption It uses secret key by using trapdoor for authorized user devices only. One Way Hash Algorithms It is used for integrity check with hash functions i.e. if any data is modified between sender and receiver. Digital Signature Public and secret key are operated by the authorized users with digital signatures.
Our proposed work also exp lains the required overall architecture of the system for efficient searching and secured data sharing for cloud based services for IoT. The architecture is made up with the following entities shown the below Technologies connect to the servers must be located comfortably. Self oriented secured encryption and decryption can be done by the smart devices.

Cert ificate Authority
The certificate authority is fully trusted and is responsible for issuing certificates to edge servers.

Key Generation Mechanism
The public and secret keys can be generated by the third party servers to have security.
Here we focus on the various threats while sharing data among s mart devices of IoT. Imp licit threats generated by the system itself because of malicious functioning and explicit threats are generated by the unauthorized users using devices and is one more issues.

V. SECURE DATA SHARING AND SEARCHING FOR IoT
Here we perform efficient searching and secured data sharing for s mart device o f cloud based services via IoT by using our proposed scheme.

Algorithm Design Steps
Step1: All users must register and will be g iven user name and password Step2: Allow the devices to download required data Step3: Efficient searching for required relevant data Step4: Then key generation for security aspects i.e encryption/decryption Step5: Uploading of data and keywords for efficient searching Step6: Allow devices to share and download data Step7: Perform data retrieval and searching Step8: Use digital signatures for data integrity Step9: Safe searching and down load for good performance by the authorized users Step10: Controlling threats generations Key Generation:The server will generates two secret keys first one is randomly generated secret key (256b it) and second one is Sec.Key (fo r data sharing) and S.Sec.Key (for data searching) from devices side uniquely. Data and Keywords Up loading: Every s mart device is given user name and password to login into the server then data searching, sharing and transferring data among devices and servers is possible. List uploaded keywords are useful to the authorized users to search easily. While uploading data into the server storages devices must be encrypted with respective keys for data integrity. Then works based on the table 1. Data Sharing and Downloading: Authorized users are allo wed to access the data from cloud to reduce the bottleneck and increase the performance. Authorized user can be given user name and passwords through which they connect to the server through their smart devices fro m various locations. Then the server checks the user authentication using it digital signatures. Then using keys data can had by performing encrypted and decrypted techniques and unauthorized users will get rejected. It is compulsory to perform an integrity action for checking received data. If data was found or matched then users can download or share it. Data searching and retrieval will also follow the above steps but use trapdoors for generating keys to an efficient search for ever device.

VI.
PERFORMANCE ANALYSIS We usedvarious encryption (AES,RSAand SHA-256) and decryption algorithms to generate secret key, public key and hash function development along with cipher chaining mode with respect to the processing time. The processing time was estimated for data decryption and encryption for various memory sizes of data (10 to 500M B) and calculated time p rocess for key generation, data uploading, data down loading and searching and retrieval was given in the table 1. Data integrity was done in terms of valuation and verification o f the transferred data in smart devices.

VII. RELATED WORKS AND COMPARATIVE ANALYSIS
This section we performed co mparative study with respect to the other works. We have gone through the various papers related this work in terms of consumption of time processing in [6,7]developed a certificate less proxy re encryption using symmetric and public key techniques.  [10] used certificateless scheme for data sharing butwithout bilinear pairing Mohamed Kheir in [7] The cloud isresponsible for both secure data storage and publicprivate key pair generation. BaqerMollah In [13] The data can encrypted with the secret key and then secret keyis further encrypted with public key finally send to cloud server. Khan in [6] Utilized an incremental cryptographybaseddatasharing scheme where the data are div ided intoseveral blocks and these blocks are then incrementally encrypted. Jasmin Guth in [14] A trusted third party is used as aproxy for key generation, re -encryption, and accesscontrol purposes. Ali in [15] A secret key-based encryptionand access control list for secure data sharing wherea trusted thirst party is engaged in encryption/decryption, key management, and access control ratheruser's device itself is utilized. VIII. CONCLUSION Our work presents a novel approach for d efficient data sharing and searching scheme for cloud based services using IoT. We have gone through the various encryption and decryption techniques used in our work. When we compared the work feel that our work g iven better performance than others. The processing time can be calculated based on the searching, data sharing and other parameters of the work. It is observed that when all the smart devices connected to the server will get bottleneck gradually performance will decreases where as the performance analysis in section six and demonstrated results are tabulated in table 2 and table 3. We fell some reformat ions are required related to authentication and access control challenges in this area to achieve data integrity. We hope that our proposedscheme is deployed an efficient performance and opens a new era to cloud based service using IoT secured applications.