Data storage security for the Internet of Things


In the present era, secure data storage for any Internet of Things (IoT) platform is plagued by poor performance of secure read and write operations, which limits the use of data storage security on any IoT platform. Therefore, in this paper, a data storage security method based on double secret key encryption and Hadoop suitable for any IoT platform is proposed. First, the Hadoop deep learning architecture and implementation process are analyzed, and the process of client Kerberos identity authentication in the Hadoop framework is discussed. From this, the current shortcomings of data storage security based on the Hadoop framework are analyzed. The elements of data storage security are also determined. Furthermore, a novel double secret key encryption method for data storage security and to improve the security of stored data itself is introduced. Simultaneously, hash computing is used to improve the read and write performance of data after secure storage. Experimental results clearly show that our proposed method can effectively improve read and write performance of data, and that the performance of data security operations is improved from current standard implementations.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9


  1. 1.

    Liu S, Liu G, Zhou H (2019) A robust parallel object tracking method for illumination variations. Mob Netw Appl 24(1):5–17

    Article  Google Scholar 

  2. 2.

    Liu JK, Liang K, Susilo W, Liu J, Xiang Y (2015) Two-factor data security protection mechanism for cloud storage system. IEEE Trans Comput 65(6):1992–2004

    MathSciNet  Article  Google Scholar 

  3. 3.

    Suthar K, Patel J (2017) Encryscation: an secure approach for data security using encryption and obfuscation techniques for iaas and daas services in cloud environment. Astrophys J 663(2):799–807

    Google Scholar 

  4. 4.

    Shin Y, Koo D, Hur J (2017) A survey of secure data deduplication schemes for cloud storage systems. ACM Comput Surv 49(4):74.

    Article  Google Scholar 

  5. 5.

    Liu C, Ranjan R, Yang C, Zhang X, Wang L, Chen J (2014) MuR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans Comput 64(9):2609–2622

    MathSciNet  Article  Google Scholar 

  6. 6.

    Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115

    Article  Google Scholar 

  7. 7.

    Cui B, Liu Z, Wang L (2016) Key-aggregate searchable encryption (kase) for group data sharing via cloud storage. IEEE Trans Comput 65(8):2374–2385.

    MathSciNet  Article  MATH  Google Scholar 

  8. 8.

    Zhang L, Fong X, Chang CH, Kong ZH, Roy K (2015) Optimizating emerging nonvolatile memories for dual-mode applications: data storage and key generator. IEEE Trans Comput Aided Design Integr Circuits Syst 34(7):1176–1187

    Article  Google Scholar 

  9. 9.

    Huang X, Liu JK, Tang S, Xiang Y, Liang K, Xu L, Zhou J (2014) Cost-effective authentic and anonymous data sharing with forward security. IEEE Trans Comput 64(4):971–983

    MathSciNet  Article  Google Scholar 

  10. 10.

    Pan Z, Liu S, Sangaiah AK, Muhammad K (2018) Visual attention feature (VAF): a novel strategy for visual tracking based on cloud platform in intelligent surveillance systems. J Parallel Distrib Comput 120:182–194

    Article  Google Scholar 

  11. 11.

    Zhang LM (2015) Low cost safety data storage and processing framework under cloud environment. Telecommun Sci 31(2):46–51.

    Article  Google Scholar 

  12. 12.

    Lu X, Liu Y (2016) Cloud storage backup and recovery strategy based on erasure codes. Comput Eng Appl 52(4):56–60.

    Article  Google Scholar 

  13. 13.

    Guo C, Shen QN, Wu ZH (2016) Cloud storage data distribution optimization model preventing data leakage. J Univ Electr Sci Technol China 45(1):118–122.

    Article  MATH  Google Scholar 

  14. 14.

    Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the Internet of Things. Future Gener Comput Syst 1(49):104–12

    Article  Google Scholar 

  15. 15.

    Qiao R, Zhu S, Wang Q, Qin J (2018) Optimization of dynamic data traceability mechanism in Internet of Things based on consortium blockchain. Int J Distrib Sensor Netw 14(12):1550147718819072

    Article  Google Scholar 

  16. 16.

    Bhatia T, Verma AK (2017) Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues. J Supercomput 73(6):1–74.

    Article  Google Scholar 

  17. 17.

    Gopikrishnan S, Priakanth P (2015) Hsda: hybrid communication for secure data aggregation in wireless sensor network. Wirel Netw 22(3):1–18.

    Article  Google Scholar 

  18. 18.

    Zhang A, Chen J, Hu RQ, Qian Y (2015) SeDS: Secure data sharing strategy for D2D communication in LTE-advanced networks. IEEE Trans Veh Technol 65(4):2659–2672

    Article  Google Scholar 

  19. 19.

    Dwivedi AD, Srivastava G, Dhar S, Singh R (2019) A decentralized privacy-preserving healthcare blockchain for iot. Sensors 19(2):326

    Article  Google Scholar 

  20. 20.

    Dwivedi AD, Morawiecki P, Srivastava G (2019) Differential cryptanalysis of round-reduced speck suitable for internet of things devices. IEEE Access 7:16476–16486

    Article  Google Scholar 

  21. 21.

    Dwivedi AD, Malina L, Dzurenda P, & Srivastava G (2019) Optimized blockchain model for internet of things based healthcare applications. arXiv preprint arXiv:1906.06517

  22. 22.

    Lukas M, Gautam S, Petr D, Jan H, Radek F (2019) A secure publish/subscribe protocol for Internet of Things, Cryptology ePrint Archive, Report 2019/740

  23. 23.

    Ryan PY (2008) Prâtà voter with Paillier encryption. Math Comput Modell 48(9–10):1646–1662

    Article  Google Scholar 

  24. 24.

    Srivastava G, Fisher A, Bryce R, Crichigno J (2019) Green Communication Protocol with Geolocation. In: IEEE 89th Vehicular Technology Conference (VTC2019-Spring). Kuala Lumpur, Malaysia, 2019, pp 1–6.

Download references


The authors would like to thank Logan Praznik for his efforts proofreading and editing this manuscript.


The APC was funded by Yuntao Duan.

Author information




Gautam Srivastava and Jyh-Haw Yeh contributed to conceptualization; Gautam Srivastava and Jyh-Haw Yeh contributed to methodology; Jiangdai Li contributed to software; Yuntao Duan and Jiangdai Li contributed to validation; Yuntao Duan and Jiangdai Li contributed to writing—original draft preparation; Gautam Srivastava and Jyh-Haw YehJerry Chun-Wei Lin contributed to writing—review and editing.

Corresponding author

Correspondence to Gautam Srivastava.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Duan, Y., Li, J., Srivastava, G. et al. Data storage security for the Internet of Things. J Supercomput 76, 8529–8547 (2020).

Download citation


  • Big data
  • Database design
  • Double secret key
  • Hadoop
  • Deep learning
  • Internet of Things
  • Encryption
  • Data storage security