=Paper= {{Paper |id=Vol-3774/Paper7 |storemode=property |title=Next-Generation Advanced Security Systems for Communities Using Integrated IoT and Blockchain Over Cloud Computing |pdfUrl=https://ceur-ws.org/Vol-3774/Paper7.pdf |volume=Vol-3774 |authors=Aadam Quraishi,Maher Ali Rusho,Faisal Yousef Alghayadh,V. Mahalakshmi,Mukesh Soni,Mohammed Wasim Bhatt |dblpUrl=https://dblp.org/rec/conf/snsfait/QuraishiRAMSB24 }} ==Next-Generation Advanced Security Systems for Communities Using Integrated IoT and Blockchain Over Cloud Computing== https://ceur-ws.org/Vol-3774/Paper7.pdf
                                Next-Generation Advanced Security systems for
                                Communities Using Integrated IoT and Blockchain Over
                                Cloud Computing
                                Aadam Quraishi1, Maher Ali Rusho2, Faisal Yousef Alghayadh3, V. Mahalakshmi4, Mukesh
                                Soni5, and Mohammed Wasim Bhatt6,*


                                1M.D. Research, Intervention Treatment Institute, Houston Texas, USA
                                2
                                  Department of Lockheed Martin Engineering Management, University of Colorado, Boulder, Boulder, Colorado
                                3
                                  Computer Science and Information Systems Department, College of Applied Sciences, AlMaarefa University, Riyadh, Saudi
                                Arabia
                                4
                                  Department of Computer Science, College of Engineering and computer science, Jazan University, Jazan 45142, Saudi Arabia
                                5
                                  Dr. D. Y. Patil Vidyapeeth, Pune, Dr. D. Y. Patil School of Science & Technology, Tathawade, Pune, India
                                6
                                  Model Institute of Engineering and Technology, Jammu, J&K, India


                                           Abstract
                                            According to human requirements, various structures are being constructed and require some protection
                                            from fire accidents, floods, earthquakes, any gas leaks, and any other concerns that may arise in the
                                            neighborhood. So far, their security goal is to propose a system integrated with blockchain and an IoT
                                            system. We structure the system in different steps in our proposal to process the alarm rung by IoT devices.
                                            This IoT gadget may be used in either a private or public setting. To do this, we must process the various
                                            settings for checking and responding to the devices. Data centers that interact between sender and recipient
                                            will verify blockchain data. Finally, we provide a security solution to avoid reply assaults, transmission
                                            interruptions, and data integrity. This entire system may work together to promote community safety and
                                            eliminate avoidable disputes.
                                            Keywords
                                            Blockchain, Internet of Things, Cloud Computing, Community Safety, Data encryption.


                                1. Introduction
                                IoT is one of the best technologies that will integrate many components. IoT can gather data
                                from the existing parts; each member may unique IoT have the ability to transfer the data to
                                the cloud. Various incidents have happened in the system; using a standard IoT system was
                                to make attention to the incident. IoT systems ensure the safety of the network with the
                                different components connected to the system [1]. IoT will include various techniques, step-
                                by-step processes and actions/reactions that concentrate on increasing safety by using IoT
                                [2].
                                IoT security refers method to be used by internet-connected devices. IoT is a very wast
                                technology; in our work, it becomes broader. IoT security is used to protect the private/ public
                                community. By using IoT technology, there is 30-35% growth in every field [3].
                                IoT will collect data in real-time, which will be used to make a decision. It may be accurate/
                                predicted. The IoT can also understand the security strategies to protect the corresponding field
                                [4].


                                Proceedings of SNSFAIT 2024: International Symposium on Securing Next-Generation Systems using Future
                                Artificial Intelligence Technologies, Delhi, India, August 08-09th, 2024
                                ∗
                                  Corresponding author : wasimmohammad71@gmail.com (M.W. Bhatt)
                                †
                                  These authors contributed equally.
                                    aadamquraishi@yahoo.com (A. Quraishi); maher.rusho@colorado.edu (M.A. Rusho);
                                basavadeepthihm@gmail.com (F.Y. Alghayadh); mlakshmi@jazanu.edu.sa (V. Mahalakshmi);
                                mukesh.research24@gmail.com (M. Soni); wasimmohammad71@gmail.com (M.W. Bhatt)
                                              © 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).




CEUR
                  ceur-ws.org
Workshop      ISSN 1613-0073
Proceedings
Blockchain technology is one of the easy to decentralize and distribute the record with digital
assistance without proper acceptance/approval; nobody can change the data from the records [5].
A blockchain stores the data in the blocks of data chains. By using the appropriate acceptance/
approval by the admin/ digital program, data cannot be modified/deleted/transferred [6]. The
blockchain maintains the proper transparency between the admin and the public; The clarity will
increase the trust now blockchain is one of the prime technologies in safety part [7].

2. Methodology
This research work proposes a methodology by integrating the IoT and blockchain technology
for community safety and security purpose. In proposed method have a different practice.
Figure 1 shows the methodology by integrating the IoT and blockchain technology for
community safety and security purpose for smart cities.
Blockchain centers
Blockchain centers receive the information from IoT related devices and store/record the received
data in the different device nodes [8]. This recorded/stored data can monitor by the community
member who wants to verify the recorded/ stored data by the blockchain centers. They can view by
security guards.
Community
Community members may belong to residential, commercial and mixed according to the type of
community needed to install the IoT device and security guard.




     Figure 1. Methodology by integrating the IoT and blockchain technology for
                      community safety and security purpose
Occupants
All the occupants living in the community have an option to install the IoT device in the
private domain because they need the safety of their belongings [9]. If they are installed IoT
devices, they should have mobile with the application. This application requires login through
the blockchain centers. Using their login, we monitor all private domains by IoT devices.
Security guard
The security guard will work under the admin. The security guard should mentor the committee at
all times. If any unknown or dangerous event occurs, the security guard should react immediately to
save the community or community members [10].

Supervisor
Supervisor appointed by community management. The Supervisor should manage all the security
guards. The Supervisor will give all types of permissions to the security guard to monitor
community safety [11].
IoT Devices
IoT devices are cameras and sensors.

Cameras: Cameras take the images of the community. Cameras are fitted in the community, public
or private domains [12]. Cameras are installed in public and private realms but need to determine
how many cameras must be installed.

Sensors:
Sensors can find a dangerous moment like smoke detection, pathfinder, emergency button and other
devices to identify the hazardous moment [13].
Log service:
Every camera recorded video is saved in a log server, and the server may use a physical component
or cloud-based server [14] . The log server needs to read all the recorders.

2.1. Process flow of the proposed methodology

Step1: Every community member needs to require the IoT device through proper technology.
Step2: The IoT device records/monitors every unsymmetric event and send the information to the security
guard and registered community members.
Step 3: The security guard will check the received event information through the IoT based Surveillance
system.
Step 4: After verification, the security guard will solve the problem/ received issue, update the log server,
and mark it as information in the blockchain centre.
Step 5: If the IoT device is relevant to the private community, the alarm will ring/ information will pass to
the appropriate community member via the installed application.
Step 6: The community member will verify the situation via the application and update the same event
information to the blockchain centers.
Step 7: The community member will need a security guard to help them. He can have an option to choose.

2.2. Installation of application

In the particular installation of the application, In the device is major concerned with the
blockchain center to initiate the mutual communication to the community. All the community
members need to register their data with the application in online mode with the application.
The blockchain center will add the registered community member through his application with
a registered address and broad cast with the community as a hash-aundro-DSDV routing
scheme. The community area will connect with the blockchain center of a concerned security
guard. Before passing the information, an authentication process should verify the received/
sender information verified by the registered address [15]. The device/ system should match
the address respectively. Figure 2 below shows the algorithm for install the application.




                          Figure 2. Algorithm for install the application
2.3. Authentication phase

Figure 3 represents the step-by-step process for authentication for a registered community
member. This entire phase will work under the community to the blockchain. IoT devices are
interconnected in the whole system to exchange the data inside the design only [16]. For that
purpose, authentication is needed to exchange the data in the system for security purposes.
Every data/ message is assigned the ID and aundro address for that authentication [17]. This
information is verified by the blockchain centers and matched with the ID and address of the
registered community member. Then, only data will transfer authentically if any
data/information is needed from the community member [18]. Then also, the system will verify
the ID and address. If all are matched with the design, then data will exchange.
 Device to the device authentication process, all blockchain centers broadcast all the aundro
addresses. The IoT devices pass the information to the blockchain center and the community
members to the advised information [19]. The IoT device follows a communication path, neat
by community members or processes/collects data through the blockchain centers.

2.4. Alarm trigged phase

The two different coding schemes will trigger the alarm. i.e., local and global versions applied
to hierarchical clustering.

Encoding and decoding:
First, introduce the encoding and decoding with the local version applied to hierarchal
clustering. In this system, we should get the data structure by a searching agent [20]. Data
structure decoding in binary form, shown in the figure 4, we can find the location by the binary
encoded in the hierarchical tree shown in the figure 5.

2.3. Notification Phase

The figure 5 shows that the IoT blockchain platform structure contains many IoT device data
storing sets. Community members, linked with one to one around the blockchain centers to
provide a large amount of data by the community member, commands needed to perform some
operations like enquire data, storing the data in the storage through the blockchain centers.
 Data can be stored in the blockchain's physical device or the cloud. The community member
anytime can access the data through the registered account [21]. Nowadays, embedded devices
or android devices directly work as the transfer application interface. Finally, the data is
directly communicated with the community member during the notification phase [22]. Figure
6 shows the IoT security guard system and Figure 7 shows the IoT Block chain platform.
                                      Figure 3. Authentication flow chart
   01        011    001             0110
                        0110
(A) Coding scheme of the cluster

        A1     B3         C5         D6


(B) Cluster center
                           Figure 4: Data structure decoding- Cluster center

                                      B0

                                                                            C0
                               B1             B2
                                                                 C1         C2          C3

                                      B3                                          C4

                                                                                  C5
                                      B4

                                                                             D0

                                      A0                          D1         D2          D3

                           A1         A2          A3                   D4          D5

                                             A4                              D6

                                             A5                              D7



                                           Figure 5: Hierarchical tree structure
                                                                            Security
                Code instructor                  Data collector
                                                                             service




                                                                  App execution
             IoT app        IoT instruction
                               services



                                                             IoT device           Action Platform




                                  Figure 6: IoT security guard system
2.6. Response phase- Security guard with public domain IoT

IoT security guard is a dynamic controller, and it should work with good policy, which will
protect the hazardous activities inside the community [23]. As per research work, IoT security
guards act as a mediator between IoT devices and society. A developed system in blockchain
centers; this center should be closed source, and it should not be cloud because it removes the
need to believe the cloud providers.
 IoT security guard verifies all events/actions inside the community; if any event/ action is
against the policies, the security guard should respond [24]. IoT security guards need some part
1. Code instructor unit 2. data collecting processing unit 3. security server unit
Code instructor unit, instruct code as per security policies to the security guard. Code
instructors always need updates like user instruction status and configuration settings.
The data collecting unit stores the information from the IoT devices/ collected data behavior
observed so far; the data collector should work as an interface between IoT devices [25]. The
data should be checked and responded to within a specified run time as per the community's
policy.
The security guard services will provide two types of outputs. 1. Security guards should
instruct every predicted condition, according to that need to take some actions [26]. If that
action fails, then we need to pass the policy. 2. security guards work like an interface for
accepting the policy by promoting the run time.



                                              Data storage


               IoT Server                                                         Community

                                              Block chain
                                                 center




              IoT                      IoT                         IoT                      IoT

            Device 1                Device 2                  Device 3                   Device n
                                Figure 7: IoT Block chain platform
2.4. Check for history record phase

The system having two history records i.e.: stored/ recorded videos developed by IoT devices
history records are stored by physical or cloud domain. Figure 8 shows the authentication to
watch the videos and records.
step 1: Community member need to request to view the stored/ recorded videos and recodes of
the private space through the security guard.
step 2: Security guard will wither requested data (i.e.: starting and ending date/ time and
domain of his request). Then forwarded blockchain center release the data to security again he
will check data.
step 3: Blockchain center will check the community member registered ID and address and
permitted to security guard to release the information to the community member.
step 4: Security guard will release the information to the community member.
step 5: If block chain center could not verify/ community member is not in records then
information should not permit to release.




          Figure 8: Authentication for viewing the information by community member


3. Analysis- Security
This work is essential because security analysis will present the attack. In this analysis, data
integrity non-reputational massage, unforgettable data, traceability of recorder, main-in-the-
middle attack, reply attach.

3.1. Data Integrity
Blockchain is one of the most influential technologies to protect data. Blockchain stored the data in
different boxes/storages. A chain connects these storages [27]. So due to this reason, hackers
cannot hack the blockchain system is problematic because it needs more time to crack the different
blocks/ storage and is also very costly.
It is essential to feature in blockchain any activity cannot perform without the notice of the
security guard/admin. A very compact monitoring system is needed.
It is challenging to secure the data from IoT devices because IoT devices directly connect and
transfer many data from the different connectors. But blockchain is supported is support the IoT
device in the security purpose. Hear blockchain work like a protector of IoT devices.
Another problem with increasing innovative houses/communities. If we expand the smart homes/
community, we must also develop the blockchain algorithm. Due to this reason, data will protect
safely. Table 1 below shows the summery of the attack on the smart things that have effected/
protected by something.

           Table 1. Summery of the attack on the smart have effected/ protected by
         Attack Name                   Effect               effected/ protected by
        Malicious block          Hackers Produce                   Algorithm
        Denial-Service        Unavailability of data       Admin/ Security Guard
        Access control            Basic problem                    Algorithm

3.2. Unforgeable data and Traceability:

In the developed system, hyper edger fabric-based blockchain technology is used, so it is stored in
the blockchain center. In every step blockchain system is connected and updated from time to time
[28]. When an IoT device is transferring or receiving data, the IoT device is triggered.

3.3. Man-in-the-middle attack:

In this developed system, a description for every command/communication/message defines every
attack. Every message or communication/command is encrypted by the public key. After receiving
the answer, the receiver can decode it by the private key to describe the communication.

4. Conclusion
This research is directly linked to the issues of safety in the community. To resolve the safety
issue, developed a security system by integrating the blockchain and IoT devices. In our
fundamental research, we create an architecture and flow of the work in multiple phases.
In this research, all the community members install the app with a blockchain system for
feature communication. This communication will adequately transfer to the alarm for the ring
as well, as the respective community member and relative community member can report
through the log server record, and the community will notice the unsafe situations. During the
entire communication process, all the updates will transfer/received by the community with
the security.
This work is divided into many phases for managing personal and public IoT devices. Any
community member can check these history records from their installed application as the
security guard and admin permitted. In all the cases, the developed system can raise the
community members' security from the third-party/hackers. The blockchain center will
identify the hazardous activity if hackers try to hack the blockchain.

References
[1]. Atlam, Hany & Alenezi, Ahmed & Alassafi, Madini & Wills, Gary. (2018). Blockchain with
     Internet of Things: Benefits, Challenges and Future Directions. International Journal of
     Intelligent Systems and Applications. 10. 10.5815/ijisa.2018.06.05.
[2]. Alkhateeb, A.; Catal, C.; Kar, G.; Mishra, A. Hybrid Blockchain Platforms for the Internet of
     Things (IoT): A Systematic Literature Review. Sensors 2022, 22, 1304.
[3]. Elva Leka and Besnik Selimi, “Development and Evaluation of Blockchain based Secure
     Application for Verification and Validation of Academic Certificates”, Annals of Emerging
     Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp.
     22-36, Vol. 5, No. 2, 1st April 2021, Published by International A ssociation of Educators and
     Researchers,          (IAER),        DOI:        10.33166/AETiC.2021.02.003,         Available:
     http://aetic.theiaer.org/archive/v5/v5n2/p3.html
[4]. Ana Reyna, Cristian Martín, Jaime Chen, Enrique Soler, Manuel Díaz, On blockchain and
     its integration with IoT. Challenges and opportunities, Future Generation Computer
     Systems,       Volume         88,     2018,      Pages      173-190,     ISSN       0167-739X,
     https://doi.org/10.1016/j.future.2018.05.046.
[5]. rnab Banerjee, Chapter Nine - Blockchain with IOT: Applications and use cases for a new
     paradigm of supply chain driving efficiency and cost, Editor(s): Shiho Kim, Ganesh
     Chandra Deka, Peng Zhang,Advances in Computers,Elsevier,Volume 115,2019,Pages 259-
     292,ISSN 0065-2458,ISBN 9780128171899,https://doi.org/10.1016/bs.adcom.2019.07.007.
[6]. Chen, C.-L.; Lim, Z.-Y.; Liao, H.-C. Blockchain-Based Community Safety Security System
     with IoT Secure Devices. Sustainability 2021, 13, 13994. https://doi.org/10.3390/su132413994
[7]. Panarello A, Tapas N, Merlino G, Longo F, Puliafito A. Blockchain and IoT Integration: A
     Systematic Survey. Sensors (Basel). 2018 Aug 6;18(8):2575. doi: 10.3390/s18082575. PMID:
     30082633; PMCID: PMC6111515.
[8]. Singh S, Ra I-H, Meng W, Kaur M, Cho GH. SH-BlockCC: A secure and efficient Internet of
     things smart home architecture based on cloud computing and blockchain technology.
     International     Journal     of    Distributed      Sensor     Networks.      April    2019.
     doi:10.1177/1550147719844159
[9]. Exploring the Integration of Blockchain Technology and IoT in a Smart University
     Application Architecture. (n.d.). Exploring the Integration of Blockchain Technology and
     IoT in a Smart University Application Architecture; dl.acm.org. Retrieved July 4, 2022, from
     https://dl.acm.org/doi/fullHtml/10.1145/3459104.3459153
[10]. Hasan, R. T. H. (2021, 0 0). Security Enhancement of IoT and Fog Computing Via
     Blockchain Applications. JOURNAL OF SOFT COMPUTING AND DATA MINING;
     www.google.com.
     https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&
     ved=2ahUKEwj9_5j57N_4AhXN1jgGHcQeBP44HhAWegQIBBAB&url=https%3A%2F%2Fpu
     blisher.uthm.edu.my%2Fojs%2Findex.php%2Fjscdm%2Farticle%2Fdownload%2F8943%2F4557
     %2F&usg=AOvVaw3HB2ZFN0wVp2LI5M1IVKGi
[11]. Shivlal Mewada, Anil Saroliya, N. Chandramouli, T. Rajasanthosh Kumar, M. Lakshmi,
     S. Suma Christal Mary, Mani Jayakumar, "Smart Diagnostic Expert System for Defect in
     Forging Process by Using Machine Learning Process", Journal of Nanomaterials, vol. 2022,
     Article ID 2567194, 8 pages, 2022. https://doi.org/10.1155/2022/2567194
[12]. Shivlal Mewada, Anil Saroliya, N. Chandramouli, T. Rajasanthosh Kumar, M. Lakshmi,
     S. Suma Christal Mary, Mani Jayakumar, "Smart Diagnostic Expert System for Defect in
     Forging Process by Using Machine Learning Process", Journal of Nanomaterials, vol. 2022,
     Article ID 2567194, 8 pages, 2022. https://doi.org/10.1155/2022/2567194
[13]. Li, W., Wu, J., Cao, J. et al. Blockchain-based trust management in cloud computing
     systems: a taxonomy, review and future directions. J Cloud Comp 10, 35 (2021).
     https://doi.org/10.1186/s13677-021-00247-5
[14]. Shobanadevi, A., Tharewal, S., Soni, M. et al. Novel identity management system using
     smart blockchain technology. Int J Syst Assur Eng Manag (2021).
     https://doi.org/10.1007/s13198-021-01494-0
[15]. M. Soni and D. K. Singh, "Blockchain Implementation for Privacy preserving and
     securing the Healthcare data," 2021 10th IEEE International Conference on Communication
     Systems      and    Network      Technologies      (CSNT),    2021,     pp.   729-734,   doi:
     10.1109/CSNT51715.2021.9509722.
[16]. Soni, M., & Singh, D. K. (2023). A key exchange system for secure data coordination in
     healthcare systems. In Healthcare Analytics (Vol. 3, p. 100138). Elsevier BV.
    https://doi.org/10.1016/j.health.2023.100138
[17]. Jagota, V., Luthra, M., Bhola, J., Sharma, A., & Shabaz, M. (2022). A Secure Energy-
    Aware Game Theory (SEGaT) Mechanism for Coordination in WSANs. In International
    Journal of Swarm Intelligence Research (Vol. 13, Issue 2, pp. 1–16). IGI Global.
    https://doi.org/10.4018/ijsir.287549
[18]. Huaqun Guo, Xingjie Yu, A survey on blockchain technology and its
    security,Blockchain: Research and Applications, Volume 3, Issue 2, 2022,100067, ISSN 2096-
    7209, https://doi.org/10.1016/j.bcra.2022.100067.
[19]. Yao, Q., Shabaz, M., Lohani, T. K., Wasim Bhatt, M., Panesar, G. S., & Singh, R. K.
    (2021). 3D modelling and visualization for Vision-based Vibration Signal Processing and
    Measurement. In Journal of Intelligent Systems (Vol. 30, Issue 1, pp. 541–553). Walter de
    Gruyter GmbH. https://doi.org/10.1515/jisys-2020-0123
[20]. Li, Xiaoqi & Jiang, Peng & Chen, Ting & Luo, Xiapu & Wen, Qiaoyan. (2017). A Survey
    on the Security of Blockchain Systems. Future Generation Computer Systems. 107.
    10.1016/j.future.2017.08.020.
[21]. Zhang, X., Rane, K. P., Kakaravada, I., & Shabaz, M. (2021). Research on vibration
    monitoring and fault diagnosis of rotating machinery based on internet of things
    technology. In Nonlinear Engineering (Vol. 10, Issue 1, pp. 245–254). Walter de Gruyter
    GmbH. https://doi.org/10.1515/nleng-2021-0019
[22]. Samuel, O.; Almogren, A.; Javaid, A.; Zuair, M.; Ullah, I.; Javaid, N. Leveraging
    Blockchain Technology for Secure Energy Trading and Least-Cost Evaluation of
    Decentralized Contributions to Electrification in Sub-Saharan Africa. Entropy 2020, 22, 226.
    https://doi.org/10.3390/e22020226
[23]. K. Meenakshi and K. Sashi Rekha, "An enhanced security system using blockchain
    technology for strong fmc relationship," Intelligent Automation & Soft Computing, vol. 35,
    no.1, pp. 111–128, 2023.
[24]. Soni, M., & Singh, D. K. (2022). Privacy-preserving secure and low-cost medical data
    communication scheme for smart healthcare. In Computer Communications (Vol. 194, pp.
    292–300). Elsevier BV. https://doi.org/10.1016/j.comcom.2022.07.046
[25]. Chen, Z., Cong, B., Hua, Z., Cengiz, K., & Shabaz, M. (2021). Application of clustering
    algorithm in complex landscape farmland synthetic aperture radar image segmentation. In
    Journal of Intelligent Systems (Vol. 30, Issue 1, pp. 1014–1025). Walter de Gruyter GmbH.
    https://doi.org/10.1515/jisys-2021-0096
[26]. Kurnia, R.I., Girsang, A.S.,”Classification of user comment using word2vec and deep
    learning”,(2021) International Journal of Emerging Technology and Advanced Engineering,
    11 (5), pp. 1-8. DOI: 10.46338/IJETAE0521_01
[27]. Liu, Y., & Shabaz, M. (2021). Design and research of computer network micro-course
    management system based on JSP technology. In International Journal of System
    Assurance Engineering and Management. Springer Science and Business Media LLC.
    https://doi.org/10.1007/s13198-021-01368-5
[28]. Fayaz, S. A. ., Zaman, M. ., & Butt, M. A. . (2022). Numerical and Experimental
    Investigation of Meteorological Data Using Adaptive Linear M5 Model Tree for the
    Prediction of Rainfall . Review of Computer Engineering Research, 9(1), 1–12.
    https://doi.org/10.18488/76.v9i1.2961.