Secure sensor cloud

被引:0
|
作者
Kumar, Vimal [1 ]
Sen, Amartya [2 ]
Madria, Sanjay [3 ]
机构
[1] University of Waikato, New Zealand
[2] Oakland University, United States
[3] Missouri University of Science and Technology, United States
关键词
Risk assessment - Access control - Internet of things - Network security - Embedded systems - Sensor nodes - Cybersecurity - Privacy-preserving techniques - Codes (symbols) - Risk perception;
D O I
10.2200/S00886ED1V01Y201811ASE018
中图分类号
学科分类号
摘要
The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energyintensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned. The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hashbased Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks. Copyright © 2019 by Morgan & Claypool.
引用
收藏
页码:1 / 140
相关论文
共 50 条
  • [21] A Secure Data Assimilation for Large-Scale Sensor Networks Using an Untrusted Cloud
    Xu, Zhiheng
    Zhu, Quanyan
    IFAC PAPERSONLINE, 2017, 50 (01): : 2609 - 2614
  • [22] A Cloud-based Architecture for Secure and Reliable Service Provisioning in Wireless Sensor Network
    Banaie, Fatemeh
    Seno, Seyed Amin Hosseini
    2014 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2014, : 96 - 101
  • [23] A Secure Mobile Wireless Sensor Networks based Protocol for Smart Data Gathering with Cloud
    Haseeb, Khalid
    Jan, Zahoor
    Alzahrani, Fahad A.
    Jeon, Gwanggil
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 97
  • [24] An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing
    Hu, Jin-Xin
    Chen, Chin-Ling
    Fan, Chun-Long
    Wang, Kun-Hao
    JOURNAL OF SENSORS, 2017, 2017
  • [25] Secure Healthcare Monitoring Sensor Cloud With Attribute-Based Elliptical Curve Cryptography
    Dwivedi, Rajendra Kumar
    Kumar, Rakesh
    Buyya, Rajkumar
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2021, 11 (03) : 1 - 18
  • [26] Sensor Cloud: A Cloud of Sensor Networks (Tutorial)
    Madria, Sanjay K.
    2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, : 2660 - 2661
  • [27] Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology
    Oppermann, Alexander
    Esche, Marko
    Thiel, Florian
    Seifert, Jean-Pierre
    PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 593 - 602
  • [28] Secure Cloud Storage Meets with Secure Network Coding
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    Chow, Sherman S. M.
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 673 - 681
  • [29] Secure Cloud Storage Meets with Secure Network Coding
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    Chow, Sherman S. M.
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) : 1936 - 1948
  • [30] Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City
    Zhu, Chunsheng
    Shu, Lei
    Leung, Victor C. M.
    Guo, Song
    Zhang, Yan
    Yang, Laurence T.
    IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (12) : 24 - 30