Secure Sensor Cloud

Secure Sensor Cloud

The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned. The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hash-based Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.


Author
Publisher Springer Nature
Release Date
ISBN 3031015274
Pages 126 pages
Rating 4/5 (74 users)

More Books:

Secure Sensor Cloud
Language: en
Pages: 126
Authors: Vimal Kumar
Categories: Technology & Engineering
Type: BOOK - Published: 2022-05-31 - Publisher: Springer Nature

The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integra
Secure Sensor Cloud
Language: en
Pages: 142
Authors: Vimal Kumar
Categories: Computers
Type: BOOK - Published: 2018-12-17 - Publisher: Morgan & Claypool Publishers

The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integra
Secure Data Managment
Language: en
Pages: 177
Authors: Willem Jonker
Categories: Computers
Type: BOOK - Published: 2011-08-19 - Publisher: Springer Science & Business Media

This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle,WA, USA in September 2, 2011 as a satellite wo
Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
Language: en
Pages: 434
Authors: Deka, Ganesh Chandra
Categories: Computers
Type: BOOK - Published: 2014-10-31 - Publisher: IGI Global

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to se
Cloud Computing
Language: en
Pages: 298
Authors: Victor C.M. Leung
Categories: Computers
Type: BOOK - Published: 2014-04-29 - Publisher: Springer

This book constitutes the thoroughly refereed post conference proceedings of the 4th International Conference on Cloud Computing, Cloud Comp 2013, held in Wuhan
Advanced Computing and Systems for Security
Language: en
Pages: 171
Authors: Rituparna Chaki
Categories: Technology & Engineering
Type: BOOK - Published: 2018-12-08 - Publisher: Springer

The book includes extended versions of selected papers discussed and presented at the 5th International Doctoral Symposium on Applied Computation and Security S
Security, Privacy, and Anonymity in Computation, Communication, and Storage
Language: en
Pages: 855
Authors: Guojun Wang
Categories: Computers
Type: BOOK - Published: 2017-12-11 - Publisher: Springer

This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Comp
Proceedings of International Symposium on Sensor Networks, Systems and Security
Language: en
Pages: 309
Authors: Nageswara S.V. Rao
Categories: Technology & Engineering
Type: BOOK - Published: 2018-05-23 - Publisher: Springer

This book presents current trends that are dominating technology and society, including privacy, high performance computing in the cloud, networking and IoT, an
Research Anthology on Securing Medical Systems and Records
Language: en
Pages: 1060
Authors: Management Association, Information Resources
Categories: Computers
Type: BOOK - Published: 2022-06-03 - Publisher: IGI Global

With the influx of internet and mobile technology usage, many medical institutions—from doctor’s offices to hospitals—have implemented new online technolo
Recent Trends in Computational Intelligence Enabled Research
Language: en
Pages: 418
Authors: Siddhartha Bhattacharyya
Categories: Computers
Type: BOOK - Published: 2021-07-31 - Publisher: Academic Press

The field of computational intelligence has grown tremendously over that past five years, thanks to evolving soft computing and artificial intelligent methodolo