Secure Sensor Cloud

Secure Sensor Cloud PDF Author: Vimal Kumar
Publisher: Morgan & Claypool Publishers
ISBN: 1681734699
Category : Computers
Languages : en
Pages : 142

Get Book Here

Book Description
The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned. The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hash-based Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.

Secure Sensor Cloud

Secure Sensor Cloud PDF Author: Vimal Kumar
Publisher: Springer Nature
ISBN: 3031015274
Category : Technology & Engineering
Languages : en
Pages : 126

Get Book Here

Book Description
The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned. The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hash-based Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.

Energy Efficient Security and Privacy Management in Sensor Clouds

Energy Efficient Security and Privacy Management in Sensor Clouds PDF Author: Vimal Kumar
Publisher:
ISBN:
Category : Aggregation operators
Languages : en
Pages : 154

Get Book Here

Book Description
"Sensor Cloud is a new model of computing for Wireless Sensor Networks, which facilitates resource sharing and enables large scale sensor networks. A multi-user distributed system, however, where resources are shared, has inherent challenges in security and privacy. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly the code which is disseminated to the sensors by the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex, energy intensive measures, the security and privacy of the data and the code have to be attained by way of lightweight algorithms. In this work, we first present two data aggregation algorithms, one based on an Elliptic Curve Cryptosystem (ECC) and the other based on symmetric key system, which provide confidentiality and integrity of data against an outside adversary and privacy against an in network adversary. A fine grained access control scheme which works on the securely aggregated data is presented next. This scheme uses Attribute Based Encryption (ABE) to achieve this objective. Finally, to securely and efficiently disseminate code in the sensor cloud, we present a code dissemination algorithm which first reduces the amount of code to be transmitted from the base station. It then uses Symmetric Proxy Re-encryption along with Bloom filters and HMACs to protect the code against eavesdropping and false code injection attacks."--Abstract, page iv.

Design of Energy Efficient and Secure Algorithms for Sensor Cloud

Design of Energy Efficient and Secure Algorithms for Sensor Cloud PDF Author: Rajendra Kumar Dwivedi
Publisher: Rajendra Kumar Dwivedi
ISBN: 9781805458425
Category :
Languages : en
Pages : 0

Get Book Here

Book Description
Sensor cloud is an integration of sensor networks with the cloud to offer a variety of services to the end-users. Applications of this architecture can be seen in various fields such as healthcare information systems, forest fire monitoring systems, smart city, and other Internet-of-Things (IoT) applications. This technology is based on sensor networks; so, energy efficiency becomes one of the prime concerns. The sensed data that are stored in the cloud for further processing in order to get some insights are crucial in many applications; so, security also becomes another important challenge. This motivated us to design some energy-efficient and secure algorithms for the sensor cloud. Security can be implemented in many ways viz., access control, outlier detection, and security against various attacks. In the thesis, we are targeting access control and outlier detection to implement security concerns. We designed one scheme for energy efficiency, one for access control, and two for outlier detection using different approaches. Chapter 3 proposes an energy efficient and fault tolerant scheme for sensor cloud. Wireless Sensor Networks (WSN) find several applications in hard-to-reach areas. As sensors have limited battery power, so, many energy-aware protocols based on negotiation, clustering, and agents have been developed to increase the lifetime of the network. This thesis finds limitations with some multi-agent-based protocols as they place the sink node at the center of the monitoring region which is quite difficult in hard-toreach areas. Therefore, a multi-agent-based energy and fault aware protocol for hard-toreach territories (MAHT) is proposed which uses the technique of Impact Factor to identify a central node with high power capability and dynamic itinerary planning is done to make the protocol fault-tolerant. Its agent migration technique results in improvement of energy efficiency, task completion time, and network lifetime. MAHT is simulated using Castalia simulator, and the impact of payload size, network size, node failures, etc on various performance metrics is analyzed. The proposed protocol outperforms the existing schemes viz., Tree Based Itinerary Design (TBID) and Multiple Mobile Agents with Dynamic Itineraries based Data Dissemination (MMADIDD).

Secure Data Managment

Secure Data Managment PDF Author: Willem Jonker
Publisher: Springer Science & Business Media
ISBN: 3642235557
Category : Computers
Languages : en
Pages : 177

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle,WA, USA in September 2, 2011 as a satellite workshop of the VLDB 2011 Conference . The 10 revised full papers presented were carefully reviewed and selected from 19 submissions. The papers are organized in topical sections on privacy protection and quantification, security in cloud and sensor networks and secure data managment technologies.

Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT

Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT PDF Author: Yushu Zhang
Publisher: Springer
ISBN: 9811325235
Category : Technology & Engineering
Languages : en
Pages : 124

Get Book Here

Book Description
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.

Intelligent Internet of Things

Intelligent Internet of Things PDF Author: Farshad Firouzi
Publisher: Springer Nature
ISBN: 3030303675
Category : Technology & Engineering
Languages : en
Pages : 647

Get Book Here

Book Description
This holistic book is an invaluable reference for addressing various practical challenges in architecting and engineering Intelligent IoT and eHealth solutions for industry practitioners, academic and researchers, as well as for engineers involved in product development. The first part provides a comprehensive guide to fundamentals, applications, challenges, technical and economic benefits, and promises of the Internet of Things using examples of real-world applications. It also addresses all important aspects of designing and engineering cutting-edge IoT solutions using a cross-layer approach from device to fog, and cloud covering standards, protocols, design principles, reference architectures, as well as all the underlying technologies, pillars, and components such as embedded systems, network, cloud computing, data storage, data processing, big data analytics, machine learning, distributed ledger technologies, and security. In addition, it discusses the effects of Intelligent IoT, which are reflected in new business models and digital transformation. The second part provides an insightful guide to the design and deployment of IoT solutions for smart healthcare as one of the most important applications of IoT. Therefore, the second part targets smart healthcare-wearable sensors, body area sensors, advanced pervasive healthcare systems, and big data analytics that are aimed at providing connected health interventions to individuals for healthier lifestyles.

Ubiquitous Security

Ubiquitous Security PDF Author: Guojun Wang
Publisher: Springer Nature
ISBN: 981990272X
Category : Computers
Languages : en
Pages : 571

Get Book Here

Book Description
This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28–31, 2022. The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.

Cloud Security

Cloud Security PDF Author: Brij B. Gupta
Publisher: CRC Press
ISBN: 1000357309
Category : Computers
Languages : en
Pages : 258

Get Book Here

Book Description
Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them. Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain. This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.

Securecsocial: Secure Cloud-based Social Network

Securecsocial: Secure Cloud-based Social Network PDF Author: Atrey Pradeep
Publisher: World Scientific
ISBN: 9811205930
Category : Computers
Languages : en
Pages : 160

Get Book Here

Book Description
The use of online social networks (OSNs) has grown exponentially in recent years, and these OSNs continue to have an ever-increasing impact on human lives. There are many concerns regarding the privacy of users in these environments, such as how trustworthy the social network operators (SNOs) are.This book presents a way to tackle the security and privacy issues in current OSNs through a new framework for online social networking, based on distributed cloud-based datacenters (CDCs) and using Shamir's secret sharing (SSS) as the method of encrypting user profile data. The framework aims to fulfill two contradictory goals: maintaining the utility of an OSN and preserving privacy of its users. The key feature of the framework lies in relinquishing control of a central authority over user's data (which is what usually happens in the current OSNs, e.g. Facebook keeps all our data) and distributing it to multiple CDCs in encrypted form. The use of SSS ensures perfect security, which means that the security of data does not rely on any unproven computational assumptions.In this unique book, SNOs are considered as an adversary instead of external adversary. This paves the way for researchers to think beyond the privacy setting mechanism within an OSN to protect users' data.

Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing

Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799853403
Category : Computers
Languages : en
Pages : 2700

Get Book Here

Book Description
Distributed systems intertwine with our everyday lives. The benefits and current shortcomings of the underpinning technologies are experienced by a wide range of people and their smart devices. With the rise of large-scale IoT and similar distributed systems, cloud bursting technologies, and partial outsourcing solutions, private entities are encouraged to increase their efficiency and offer unparalleled availability and reliability to their users. The Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing is a vital reference source that provides valuable insight into current and emergent research occurring within the field of distributed computing. It also presents architectures and service frameworks to achieve highly integrated distributed systems and solutions to integration and efficient management challenges faced by current and future distributed systems. Highlighting a range of topics such as data sharing, wireless sensor networks, and scalability, this multi-volume book is ideally designed for system administrators, integrators, designers, developers, researchers, academicians, and students.