Collaborative task execution with originator data security for weak devices

被引:0
|
作者
Thapa, Sobit Bahadur [1 ]
Gu, Qijun [1 ]
机构
[1] Texas State Univ, San Marcos, TX 78666 USA
关键词
collaborative computing; data security; weak device; sensor network; remote execution; COMPILER;
D O I
10.1504/IJSNET.2016.10000139
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a secure framework for dispatching and completing tasks in a network of weak embedded devices, such as sensors. The framework allows a device to dispatch tasks to other remote devices so that the remote devices can utilise their idle resources to help the execution of the tasks. The framework also ensures that the secure data of the originating devices will not be disclosed with the tasks that are dispatched to the helping devices. The framework is implemented with TinyOS and MICAz motes for evaluation. The results show that the framework achieves the desired security with little overhead and is feasible to weak devices.
引用
收藏
页码:67 / 81
页数:15
相关论文
共 50 条
  • [31] Dynamic Bandwidth Allocation for Collaborative Multi-Robot Systems Based on Task Execution Measures
    Slim, Malak
    Daher, Naseem
    Elhajj, Imad H.
    [J]. JOURNAL OF INTELLIGENT & ROBOTIC SYSTEMS, 2024, 110 (03)
  • [32] Data Security Evaluation for Mobile Android Devices
    Khokhlov, Igor
    Reznik, Leon
    [J]. PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 154 - 160
  • [33] Research and Application of Data Security for Mobile Devices
    Zhang, Xiandi
    Yang, Feng
    Liu, Zhongqiang
    Wang, Zhenzhi
    Wang, Kaiyi
    [J]. COMPUTER AND COMPUTING TECHNOLOGIES IN AGRICULTURE IV, PT 3, 2011, 346 : 46 - 56
  • [34] Security Perspectives for Collaborative Data Acquisition in the Internet of Things
    Gazis, Vangelis
    Cordero, Carlos Garcia
    Vasilomanolakis, Emmanouil
    Kikiras, Panayotis
    Wiesmaier, Alex
    [J]. INTERNET OF THINGS: IOT INFRASTRUCTURES, PT II, 2015, 151 : 271 - 282
  • [35] Collaborative Detection of Cyber Security Threats in Big Data
    Zhang, Jiange
    Guo, Yuanbo
    Chen, Yue
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (02) : 186 - 193
  • [36] Big Data: Towards a Collaborative Security System at the Service of Data Quality
    Talha, Mohamed
    Kalam, Anas Abou El
    [J]. HYBRID INTELLIGENT SYSTEMS, HIS 2021, 2022, 420 : 595 - 606
  • [37] Enhancing Big Data Security with Collaborative Intrusion Detection
    Tan, zhiyuan
    Nagar, Upasana T.
    He, Xiangjian
    Nanda, Priyadarsi
    Liu, Ren Ping
    Wang, Song
    Hu, Jiankun
    [J]. IEEE CLOUD COMPUTING, 2014, 1 (03): : 27 - 33
  • [38] Personal data anonymization for security and privacy in collaborative environments
    El Kalam, AA
    Deswarte, Y
    Trouessin, G
    Cordonnier, E
    [J]. 2005 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, PROCEEDINGS, 2005, : 56 - 61
  • [39] How to Protect Data Privacy in Collaborative Network Security
    Burkhart, Martin
    Dimitropoulos, Xenofontas
    [J]. ERCIM NEWS, 2012, (90): : 38 - 39
  • [40] Framework for Sharing Security Related Data in Collaborative Organizations
    Ghiran, Ana-Maria
    [J]. VISION 2020: INNOVATION MANAGEMENT, DEVELOPMENT SUSTAINABILITY, AND COMPETITIVE ECONOMIC GROWTH, 2016, VOLS I - VII, 2016, : 3360 - 3371