Secure Sensor Cloud

Secure Sensor Cloud
Title Secure Sensor Cloud PDF eBook
Author Vimal Kumar
Publisher Springer Nature
Pages 126
Release 2022-05-31
Genre Technology & Engineering
ISBN 3031015274

Download Secure Sensor Cloud Book in PDF, Epub and Kindle

The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned. The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hash-based Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.

Intelligent Internet of Things

Intelligent Internet of Things
Title Intelligent Internet of Things PDF eBook
Author Farshad Firouzi
Publisher Springer Nature
Pages 647
Release 2020-01-21
Genre Technology & Engineering
ISBN 3030303675

Download Intelligent Internet of Things Book in PDF, Epub and Kindle

This holistic book is an invaluable reference for addressing various practical challenges in architecting and engineering Intelligent IoT and eHealth solutions for industry practitioners, academic and researchers, as well as for engineers involved in product development. The first part provides a comprehensive guide to fundamentals, applications, challenges, technical and economic benefits, and promises of the Internet of Things using examples of real-world applications. It also addresses all important aspects of designing and engineering cutting-edge IoT solutions using a cross-layer approach from device to fog, and cloud covering standards, protocols, design principles, reference architectures, as well as all the underlying technologies, pillars, and components such as embedded systems, network, cloud computing, data storage, data processing, big data analytics, machine learning, distributed ledger technologies, and security. In addition, it discusses the effects of Intelligent IoT, which are reflected in new business models and digital transformation. The second part provides an insightful guide to the design and deployment of IoT solutions for smart healthcare as one of the most important applications of IoT. Therefore, the second part targets smart healthcare-wearable sensors, body area sensors, advanced pervasive healthcare systems, and big data analytics that are aimed at providing connected health interventions to individuals for healthier lifestyles.

Energy Efficient Security and Privacy Management in Sensor Clouds

Energy Efficient Security and Privacy Management in Sensor Clouds
Title Energy Efficient Security and Privacy Management in Sensor Clouds PDF eBook
Author Vimal Kumar
Publisher
Pages 154
Release 2014
Genre Aggregation operators
ISBN

Download Energy Efficient Security and Privacy Management in Sensor Clouds Book in PDF, Epub and Kindle

"Sensor Cloud is a new model of computing for Wireless Sensor Networks, which facilitates resource sharing and enables large scale sensor networks. A multi-user distributed system, however, where resources are shared, has inherent challenges in security and privacy. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly the code which is disseminated to the sensors by the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex, energy intensive measures, the security and privacy of the data and the code have to be attained by way of lightweight algorithms. In this work, we first present two data aggregation algorithms, one based on an Elliptic Curve Cryptosystem (ECC) and the other based on symmetric key system, which provide confidentiality and integrity of data against an outside adversary and privacy against an in network adversary. A fine grained access control scheme which works on the securely aggregated data is presented next. This scheme uses Attribute Based Encryption (ABE) to achieve this objective. Finally, to securely and efficiently disseminate code in the sensor cloud, we present a code dissemination algorithm which first reduces the amount of code to be transmitted from the base station. It then uses Symmetric Proxy Re-encryption along with Bloom filters and HMACs to protect the code against eavesdropping and false code injection attacks."--Abstract, page iv.

Design of Energy Efficient and Secure Algorithms for Sensor Cloud

Design of Energy Efficient and Secure Algorithms for Sensor Cloud
Title Design of Energy Efficient and Secure Algorithms for Sensor Cloud PDF eBook
Author Rajendra Kumar Dwivedi
Publisher Rajendra Kumar Dwivedi
Pages 0
Release 2022-11-20
Genre
ISBN 9781805458425

Download Design of Energy Efficient and Secure Algorithms for Sensor Cloud Book in PDF, Epub and Kindle

Sensor cloud is an integration of sensor networks with the cloud to offer a variety of services to the end-users. Applications of this architecture can be seen in various fields such as healthcare information systems, forest fire monitoring systems, smart city, and other Internet-of-Things (IoT) applications. This technology is based on sensor networks; so, energy efficiency becomes one of the prime concerns. The sensed data that are stored in the cloud for further processing in order to get some insights are crucial in many applications; so, security also becomes another important challenge. This motivated us to design some energy-efficient and secure algorithms for the sensor cloud. Security can be implemented in many ways viz., access control, outlier detection, and security against various attacks. In the thesis, we are targeting access control and outlier detection to implement security concerns. We designed one scheme for energy efficiency, one for access control, and two for outlier detection using different approaches. Chapter 3 proposes an energy efficient and fault tolerant scheme for sensor cloud. Wireless Sensor Networks (WSN) find several applications in hard-to-reach areas. As sensors have limited battery power, so, many energy-aware protocols based on negotiation, clustering, and agents have been developed to increase the lifetime of the network. This thesis finds limitations with some multi-agent-based protocols as they place the sink node at the center of the monitoring region which is quite difficult in hard-toreach areas. Therefore, a multi-agent-based energy and fault aware protocol for hard-toreach territories (MAHT) is proposed which uses the technique of Impact Factor to identify a central node with high power capability and dynamic itinerary planning is done to make the protocol fault-tolerant. Its agent migration technique results in improvement of energy efficiency, task completion time, and network lifetime. MAHT is simulated using Castalia simulator, and the impact of payload size, network size, node failures, etc on various performance metrics is analyzed. The proposed protocol outperforms the existing schemes viz., Tree Based Itinerary Design (TBID) and Multiple Mobile Agents with Dynamic Itineraries based Data Dissemination (MMADIDD).

Secure Data Managment

Secure Data Managment
Title Secure Data Managment PDF eBook
Author Willem Jonker
Publisher Springer Science & Business Media
Pages 177
Release 2011-08-19
Genre Computers
ISBN 3642235557

Download Secure Data Managment Book in PDF, Epub and Kindle

This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle,WA, USA in September 2, 2011 as a satellite workshop of the VLDB 2011 Conference . The 10 revised full papers presented were carefully reviewed and selected from 19 submissions. The papers are organized in topical sections on privacy protection and quantification, security in cloud and sensor networks and secure data managment technologies.

Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT

Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
Title Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT PDF eBook
Author Yushu Zhang
Publisher Springer
Pages 124
Release 2018-09-01
Genre Technology & Engineering
ISBN 9811325235

Download Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT Book in PDF, Epub and Kindle

This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.

Ubiquitous Security

Ubiquitous Security
Title Ubiquitous Security PDF eBook
Author Guojun Wang
Publisher Springer Nature
Pages 571
Release 2023-02-15
Genre Computers
ISBN 981990272X

Download Ubiquitous Security Book in PDF, Epub and Kindle

This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28–31, 2022. The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.