Citation:
Isabella Miller, Muhammadu Sathik Raja, "Securing IoT-Based Backup Systems: A Comprehensive Approach with MFA, RBAC, and Encryption", International Journal of Multidisciplinary on Science and Management, pp. 282-287, 2024.
Abstract:
The rapid proliferation of Internet of Things (IoT) devices has led to an increasing demand for efficient and secure backup systems. Traditional backup solutions are inadequate due to the dynamic nature of IoT ecosystems and their security vulnerabilities. This study explores a robust security framework for IoT-based backup systems incorporating Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC), and encryption mechanisms. The proposed framework ensures data integrity, confidentiality, and availability while mitigating unauthorized access risks. This paper presents a comprehensive analysis of the security challenges in IoT-based backup systems, followed by a detailed discussion of MFA, RBAC, and encryption techniques. A systematic methodology is developed to implement these security measures in IoT-based backup infrastructures. The results validate the effectiveness of the proposed model in enhancing security, reducing latency, and improving reliability. Various performance metrics, including encryption efficiency, access control overhead, and authentication time, are evaluated. The findings demonstrate a significant improvement in security without compromising backup performance.
Keywords:
IoT Security, Backup Systems, Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC), Encryption, Data Integrity, Cybersecurity, Cloud Backup, Data Protection, Secure Authentication.
References:
1. Ferreira, J. D., & Soares, L. A. (2019).IoT security: A survey on current challenges and solutions. Journal of Computer Networks and Communications, 2019, 1-12. https://doi.org/10.1155/2019/7103781
2. Khan, R., & Mollah, M. (2021).Role-based access control for IoT: A survey on implementation and techniques. Journal of IoT and Security, 7(3), 45-58. https://doi.org/10.1016/j.iotsec.2021.100395
3. Wang, L., & Li, W. (2020).A survey of encryption techniques for IoT: Challenges and solutions. International Journal of Computer Science and Engineering, 11(4), 121-132. https://doi.org/10.1109/ICASEW.2020.9125489
4. Zhao, Y., & Zhang, X. (2018).Multi-factor authentication in IoT environments: An overview. Security and Privacy in Communication Networks, 2018, 1-14. https://doi.org/10.1155/2018/1073512
5. Taresh Mehra, 2024. “Fortifying Data and Infrastructure: A Strategic Approach to Modern Security”, International Journal of Management, IT & Engineering (IJMRA), Vol. 14 Issue 8, August 2024.
6. Zhang, Q., & Hu, J. (2022).Backup security for IoT devices: Combining encryption and access control models. Journal of Cloud Computing and Security, 10(1), 13-25. https://doi.org/10.1007/s12069-022-01123-6
7. Cheng, Y., & Zhang, Y. (2020).Securing cloud-based backup systems with role-based access control and encryption. International Journal of Cloud Computing and Services Science, 9(2), 91-101. https://doi.org/10.1016/j.jcse.2020.06.004
8. Sharma, S., & Kumar, D. (2021).IoT security challenges and multi-factor authentication approaches for backup systems. IoT Security Journal, 4(2), 33-46. https://doi.org/10.1007/s43162-021-00023-w
9. Taresh Mehra . “The Critical Role of Role-Based Access Control (RBAC) in Securing Backup, Recovery, and Storage Systems”, International Journal of Science and Research Archive, 2024, 13(01), 1192–1194.
10. Nouri, K., & Hassan, A. (2019).Securing backup systems with advanced encryption techniques in IoT-based networks. International Journal of Information Security, 18(3), 271-283. https://doi.org/10.1007/s10207-019-0466-9
11. Yang, M., & Wang, F. (2021).Implementing multi-layered security in backup systems for IoT networks. Journal of Computer Security, 29(6), 1175-1189. https://doi.org/10.3233/JCS-200761
12. Taresh Mehra, “A Systematic Approach to Implementing Two-Factor Authentication for Backup and Recovery Systems”, International Research Journal of Modernization in Engineering Technology and Science, Volume:06/Issue:09/September-2024.
13. Geetesh Sanodia, “Framework for Efficient Data Management in Salesforce Using APIS”, International Journal of Computer Applications (IJCA), 2(2), 2021. pp. 29-38.
14. Amrish Solanki, Kshitiz Jain, Shrikaa Jadiga, "Building a Data-Driven Culture: Empowering Organizations with Business Intelligence," International Journal of Computer Trends and Technology, 2024; 72, 2: 46-55.
15. Sunil Kumar Suvvari & DR. VIMAL DEEP SAXENA. (2024). Innovative Approaches to Project Scheduling: Techniques and Tools. Innovative Research Thoughts, 10(2), 133–143. https://doi.org/10.36676/irt.v10.i2.1481
16. Kanagarla, Krishna Prasanth Brahmaji, Edge Computing and Analytics for IoT Devices: Enhancing Real-Time Decision Making in Smart Environments. Available at SSRN: https://ssrn.com/abstract=5012466 or http://dx.doi.org/10.2139/ssrn.5012466
17. Sunil Kumar Suvvari, "Measuring Agile Success: Metrics and Indicators for Agile Project Management", Stochastic Modelling and Computational Sciences, Vol. 1 No.2, (December, 2021).
18. SUNIL KUMAR SUVVARI, DR. ROHINI SAWALKAR. (2024). The Role of Leadership in Project Success: A Quantitative Analysis. International Journal of Communication Networks and Information Security (IJCNIS), 16(4), 1146–1157. Retrieved from https://ijcnis.org/index.php/ijcnis/article/view/7319
19. Suman, Chintala (2024) Evolving BI Architectures: Integrating Big Data for Smarter Decision-Making. American Journal of Engineering, Mechanics and Architecture, 2 (8). pp. 72-79. ISSN 2993-2637
20. Giridhar Kankanala, Sudheer Amgothu, "SAP Migration Strategies", International Journal of Science and Research (IJSR), Volume 12 Issue 12, December 2023, pp. 2168-2171, https://www.ijsr.net/getabstract.php?paperid=SR23128151813, DOI: https://www.doi.org/10.21275/SR23128151813
21. N. R. Palakurti, “Machine Learning Mastery: Practical Insights for Data Processing”, Practical Applications of Data Processing, Algorithms, and Modeling, p. 16-29, 2024.
22. Sarangkumar Radadia Kumar Mahendrabhai Shukla ,Nimeshkumar Patel ,Hirenkumar Mistry,Keyur Dodiya 2024.” CYBER SECURITY DETECTING AND ALERTING DEVICE”, 412409-001,
23. Naga Lalitha Sree Thatavarthi, “Design and Development of a Furniture Application using Dot Net and Angular”, Journal of Technological Innovations, vol. 4, no. 4, Oct. 2023, doi: 10.93153/gmcag042.
24. Rajarao Tadimety Akbar Doctor, 2015.” A Method and System for Analysing Electronic Circuit Schematic” Patent office IN, Patent number 6529/CHE/2014, Application number 201641001890,
25. Dixit, A., Sabnis, A. and Shetty, A., 2022. Antimicrobial edible films and coatings based on N, O-carboxymethyl chitosan incorporated with ferula asafoetida (Hing) and adhatodavasica (Adulsa) extract. Advances in Materials and Processing Technologies, 8(3), pp.2699-2715.
26. Sateesh Reddy Adavelli. (2023). Future Proofing Insurance Operations: A Guidewire-Centric Approach to Cloud, Cybersecurity, and Generative AI. International Journal of Computer Science and Information Technology Research, 4(2), 29-52. https://ijcsitr.com/index.php/home/article/view/IJCSITR_2023_04_02_005
27. Rajeshwari Hegde, 2014. “Comprehensive Analysis of Acoustic Echo Cancellation Algorithms on DSP Processor”, International Journal of Advance Computational Engineering and Networking (IJACEN), volume 2, Issue 9, pp.6-11.
28. Apurva Kumar, "Building Autonomous AI Agents based AI Infrastructure," International Journal of Computer Trends and Technology, vol. 72, no. 11, pp. 116-125, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I11P112
29. Dasaratha, D. A., A. Prasad, M. Kumar, P. Kamal, S. V., S. (2024). Strategizing IoT Network Layer Security through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis. Journal of Intelligent Systems and Internet of Things, (), 195-207. DOI: https://doi.org/10.54216/JISIoT.120215
30. Dhameliya, N. (2023). Revolutionizing PLC Systems with AI: A New Era of Industrial Automation. American Digits: Journal of Computing and Digital Technologies, 1(1), 33-48.
31. Karthik Hosavaranchi Puttaraju, "Harnessing Disruptive Technologies: Strategic Approach to Retail Product Innovation", International Journal of Scientific Research in Engineering and Management (IJSREM), VOLUME: 08 ISSUE: 01 | JAN - 2024.
32. Bhat, A., & Gojanur, V. (2015). Evolution of 4g: A Study. International Journal of Innovative Research in ComputerScience & Engineering (IJIRCSE). Booth, K. (2020, December 4). How 5G is breaking new ground in the construction industry. BDC Magazine.https://bdcmagazine.com/2020/12/how-5g-is-breaking-new-ground-in-the-constructionindustry/.
33. Dhamotharan Seenivasan, Muthukumaran Vaithianathan, 2023. "Real-Time Adaptation: Change Data Capture in Modern Computer Architecture", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 1, Issue 2: 49-61.
34. Chanthati, Sasibhushan Rao. (2024). How the power of machine -machine learning, data science and NLP can be used to prevent spoofing and reduce financial risks. 100-119. 10.30574/gjeta.2024.20.2.0149.Sasibhushan Rao Chanthati. https://doi.org/10.30574/gjeta.2024.20.2.0149, https://gjeta.com/sites/default/files/GJETA-2024-0149.pdf
35. Dixit, A.S., Nagula, K.N., Patwardhan, A.V. and Pandit, A.B., 2020. Alternative and remunerative solid culture media for pigment-producing serratia marcescens NCIM 5246. J Text Assoc, 81(2), pp.99-103.
36. Karthik Chowdary Tsaliki, "Leveraging Large Language Models for Fraud Prevention in E-commerce", International Journal of Innovative Research in Science, Engineering and Technology, Volume 13, Issue 8, August 2024.
37. Artificial Intelligence-Based Cloud Planning and Migration to Cut the Cost of Cloud SR Chanthati - Authorea Preprints, 2024 http://dx.doi.org/10.22541/au.172115306.64736660/v1 Sasi-Rao: SR Chanthati will pick up the Google scholar and Chanthati, S. R. (2024).
38. Palakurti, N. R. (2024). Bridging the Gap: Frameworks and Methods for Collaborative Business Rules Management Solutions. International Scientific Journal for Research, 6(6), 1–22. Retrieved from https://isjr.co.in/index.php/ISJR/article/view/207
39. Sateesh Reddy Adavelli, "AI and Cloud Synergy in Insurance: AWS, Snowflake, and Guidewire’s Role in DataDriven Transformation", International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), Volume 12, Issue 6, June 2023.
40. Bhat, V. Gojanur, and R. Hegde. 2015. “4G protocol and architecture for BYOD over Cloud Computing”. In Communications and Signal Processing (ICCSP), 2015 International Conference on. 0308-0313.
41. Bhat, A., Gojanur, V., & Hegde, R. (2014). 5G evolution and need: A study. In International conference on electrical, electronics, signals, communication and optimization (EESCO)—2015.
42. Chandrakanth Lekkala 2022. “Automating Infrastructure Management with Terraform: Strategies and Impact on Business Efficiency”, European Journal of Advances in Engineering and Technology, 2022, 9(11): 82-88.
43. Chanthati, Sasibhushan Rao. (2021). A segmented approach to encouragement of entrepreneurship using data science. World Journal of Advanced Engineering Technology and Sciences. https://doi.org/10.30574/wjaets.2024.12.2.0330,
44. Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2024. "Low-Power FPGA Design Techniques for Next-Generation Mobile Devices", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 2: 82-93.
45. Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2024. "Integrating AI and Machine Learning with UVM in Semiconductor Design", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 3: 37-51.
46. Nimeshkumar Patel, 2021. ”Sustainable Smart Cities: Leveraging Iot and Data Analytics for Energy Efficiency and Urban Development”, Journal of Emerging Technologies and Innovative Research, volume 8, Issue 3, pp.313-319.
47. Vinay Panchal, 2025. “Designing for Longer Battery Life: Power Optimization Strategies in Modern Mobile SOCS”, International Journal of Electrical Engineering and Technology (IJEET) Volume 16, Issue 1, January-February 2025, pp. 1-17, Article ID: IJEET_16_01_001 Available online at https://iaeme.com/Home/issue/IJEET?Volume=16&Issue=1
48. Kumar Shukla, Nimeshkumar Patel, Hirenkumar Mistry, 2024. “Transforming Incident Responses, Automating Security Measures, and Revolutionizing Defence Strategies through AI-Powered Cyber security", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN: 2349-5162, Vol.11, Issue 3, page no.h38-h45, March-2024, Available: http://www.jetir.org/papers/JETIR2403708.pdf
49. Arnab Dey, "Innovative Approach to Mitigate Man-in-the-Middle Attacks i Secure Communication Channels", International Journal of Science and Research (IJSR), Volume 11 Issue 8, August 2022, pp. 1497-1500. https://www.ijsr.net/getabstract.php?paperid=SR24320191712
50. Chandrakanth Lekkala (2023) Deploying and Managing Containerized Data Workloads on Amazon EKS. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-342. DOI: doi.org/10.47363/JAICC/2023 (2)324.
51. Muvva S. Optimizing Spark Data Pipelines: A Comprehensive Study of Techniques for Enhancing Performance and Efficiency in Big Data Processing, Journal of Artificial Intelligence, Machine Learning and Data Science, 2023, 1 (4), 1862-1865. Doi: doi.org/10.51219/JAIMLD/sainath-muvva/412
52. Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2024. "Energy-Efficient FPGA Design for Wearable and Implantable Devices", ESP International Journal of Advancements in Science & Technology (ESP-IJAST), Volume 2, Issue 2: 37-51.
53. Chandrakanth Lekkala, “Utilizing Cloud – Based Data Warehouses for Advanced Analytics: A Comparative Study”, International Journal of Science and Research (IJSR), Volume 11 Issue 1, January 2022, pp. 1639-1643, https://www.ijsr.net/getabstract.php?paperid=SR24628182046
54. Dixit, A.S., Patwardhan, A.V. and Pandit, A.B., 2021. PARAMETER OPTIMIZATION OF PRODIGIOSIN BASEDDYE-SENSITIZED SOLAR CELL. International Journal of Pharmaceutical, Chemical & Biological Sciences, 11(1), pp.19-29.
55. Dixit, A., Sabnis, A., Balgude, D., Kale, S., Gada, A., Kudu, B., Mehta, K., Kasar, S., Handa, D., Mehta, R. and Kshirsagar, S., 2023. Synthesis and characterization of citric acid and itaconic acid-based two-pack polyurethane antimicrobial coatings. Polymer Bulletin, 80(2), pp.2187-2216.
56. Sainath Muvva (2023). Standardizing Open Table Formats for Big Data Analysis: Implications for Machine Learning and AI Applications. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-E241. DOI: doi.org/10.47363/JAICC/2023(2)E241
57. Chandrakanth Lekkala 2022. “Integration of Real-Time Data Streaming Technologies in Hybrid Cloud Environments: Kafka, Spark, and Kubernetes”, European Journal of Advances in Engineering and Technology, 2022, 9(10):38-43.
58. Vinay Panchal, 2024. “Thermal and Power Management Challenges in High-Performance Mobile Processors”, International Journal of Innovative Research of Science, Engineering and Technology (IJIRSET), Volume 13, Issue 11, November 2024 |DOI: 10.15680/IJIRSET.2024.1311014.
6B New Colony, Edamalaipatti Pudur, Tiruchirappalli.
International Journal of Multidisciplinary on Science and Management [IJMSM] is a scholarly double-blind peer-reviewed journal published by Golden Sun-Rise.
2024 © Golden Sun-Rise.