Secure sensor cloud

被引:0
|
作者
Kumar, Vimal [1 ]
Sen, Amartya [2 ]
Madria, Sanjay [3 ]
机构
[1] University of Waikato, New Zealand
[2] Oakland University, United States
[3] Missouri University of Science and Technology, United States
关键词
Risk assessment - Access control - Internet of things - Network security - Embedded systems - Sensor nodes - Cybersecurity - Privacy-preserving techniques - Codes (symbols) - Risk perception;
D O I
10.2200/S00886ED1V01Y201811ASE018
中图分类号
学科分类号
摘要
The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energyintensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned. The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hashbased Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks. Copyright © 2019 by Morgan & Claypool.
引用
收藏
页码:1 / 140
相关论文
共 50 条
  • [31] A secure and energy-efficient platform for the integration of Wireless Sensor Networks and Mobile Cloud Computing
    Abed, Sa'ed
    Al-Shayeji, Mohammad
    Ebrahim, Fahad
    COMPUTER NETWORKS, 2019, 165
  • [32] A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud
    Liu, Jianhua
    Shen, Shigen
    Yue, Guangxue
    Han, Risheng
    Li, Hongjie
    APPLIED SOFT COMPUTING, 2015, 30 : 123 - 135
  • [33] Achieving Secure and Efficient Data Access Control for Cloud-Integrated Body Sensor Networks
    Guan, Zhitao
    Yang, Tingting
    Du, Xiaojiang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [34] Secure and intelligent architecture for cloud-based healthcare applications in wireless body sensor networks
    Rani, A. Antony Viswasa
    Baburaj, E.
    INTERNATIONAL JOURNAL OF BIOMEDICAL ENGINEERING AND TECHNOLOGY, 2019, 29 (02) : 186 - 199
  • [35] Secure and Scalable Cloud-based Architecture for e-Health Wireless sensor networks
    Lounis, Ahmed
    Hadjidj, Abdelkrim
    Bouabdallah, Abdelmadjid
    Challal, Yacine
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [36] Secure Cryptography Infrastructures in the Cloud
    Chu, Dawei
    Zhu, Kaijie
    Cai, Quanwei
    Lin, Jingqiang
    Li, Fengjun
    Guan, Le
    Zhang, Lingchen
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [37] Towards Efficient and Secure Cloud
    Radwan, Tarek
    Azer, Marianne
    Abdelbaki, Nashwa
    2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC 2013), 2013, : 134 - 140
  • [38] Secure virtualization for cloud computing
    Lombardi, Flavio
    Di Pietro, Roberto
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1113 - 1122
  • [39] Secure Personal Cloud Storage
    Mar, Kheng Kok
    Law, Chee Yong
    Chin, Victoria
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 108 - 113
  • [40] Secure mobile cloud computing
    Kolodziej, Joanna
    Jaatun, Martin Gilje
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (18):