Secure Sensor Cloud

Secure Sensor Cloud
Author: Vimal Kumar,Amartya Sen,Sanjay Madria
Publsiher: Springer Nature
Total Pages: 126
Release: 2022-05-31
Genre: Technology & Engineering
ISBN: 9783031015274

Download Secure Sensor Cloud Book in PDF, Epub and Kindle

The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned. The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hash-based Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.

Energy Efficient Security and Privacy Management in Sensor Clouds

Energy Efficient Security and Privacy Management in Sensor Clouds
Author: Vimal Kumar
Publsiher: Unknown
Total Pages: 154
Release: 2014
Genre: Aggregation operators
ISBN: OCLC:882480315

Download Energy Efficient Security and Privacy Management in Sensor Clouds Book in PDF, Epub and Kindle

"Sensor Cloud is a new model of computing for Wireless Sensor Networks, which facilitates resource sharing and enables large scale sensor networks. A multi-user distributed system, however, where resources are shared, has inherent challenges in security and privacy. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly the code which is disseminated to the sensors by the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex, energy intensive measures, the security and privacy of the data and the code have to be attained by way of lightweight algorithms. In this work, we first present two data aggregation algorithms, one based on an Elliptic Curve Cryptosystem (ECC) and the other based on symmetric key system, which provide confidentiality and integrity of data against an outside adversary and privacy against an in network adversary. A fine grained access control scheme which works on the securely aggregated data is presented next. This scheme uses Attribute Based Encryption (ABE) to achieve this objective. Finally, to securely and efficiently disseminate code in the sensor cloud, we present a code dissemination algorithm which first reduces the amount of code to be transmitted from the base station. It then uses Symmetric Proxy Re-encryption along with Bloom filters and HMACs to protect the code against eavesdropping and false code injection attacks."--Abstract, page iv.

Secure Data Managment

Secure Data Managment
Author: Willem Jonker,Milan Petkovic
Publsiher: Springer
Total Pages: 170
Release: 2011-08-19
Genre: Computers
ISBN: 9783642235566

Download Secure Data Managment Book in PDF, Epub and Kindle

This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle,WA, USA in September 2, 2011 as a satellite workshop of the VLDB 2011 Conference . The 10 revised full papers presented were carefully reviewed and selected from 19 submissions. The papers are organized in topical sections on privacy protection and quantification, security in cloud and sensor networks and secure data managment technologies.

Intelligent Internet of Things

Intelligent Internet of Things
Author: Farshad Firouzi,Krishnendu Chakrabarty,Sani Nassif
Publsiher: Springer Nature
Total Pages: 647
Release: 2020-01-21
Genre: Technology & Engineering
ISBN: 9783030303679

Download Intelligent Internet of Things Book in PDF, Epub and Kindle

This holistic book is an invaluable reference for addressing various practical challenges in architecting and engineering Intelligent IoT and eHealth solutions for industry practitioners, academic and researchers, as well as for engineers involved in product development. The first part provides a comprehensive guide to fundamentals, applications, challenges, technical and economic benefits, and promises of the Internet of Things using examples of real-world applications. It also addresses all important aspects of designing and engineering cutting-edge IoT solutions using a cross-layer approach from device to fog, and cloud covering standards, protocols, design principles, reference architectures, as well as all the underlying technologies, pillars, and components such as embedded systems, network, cloud computing, data storage, data processing, big data analytics, machine learning, distributed ledger technologies, and security. In addition, it discusses the effects of Intelligent IoT, which are reflected in new business models and digital transformation. The second part provides an insightful guide to the design and deployment of IoT solutions for smart healthcare as one of the most important applications of IoT. Therefore, the second part targets smart healthcare-wearable sensors, body area sensors, advanced pervasive healthcare systems, and big data analytics that are aimed at providing connected health interventions to individuals for healthier lifestyles.

Handbook of Research on Securing Cloud Based Databases with Biometric Applications

Handbook of Research on Securing Cloud Based Databases with Biometric Applications
Author: Deka, Ganesh Chandra
Publsiher: IGI Global
Total Pages: 434
Release: 2014-10-31
Genre: Computers
ISBN: 9781466665606

Download Handbook of Research on Securing Cloud Based Databases with Biometric Applications Book in PDF, Epub and Kindle

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.

Ubiquitous Security

Ubiquitous Security
Author: Guojun Wang,Kim-Kwang Raymond Choo,Jie Wu,Ernesto Damiani
Publsiher: Springer Nature
Total Pages: 571
Release: 2023-02-15
Genre: Computers
ISBN: 9789819902729

Download Ubiquitous Security Book in PDF, Epub and Kindle

This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28–31, 2022. The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.

Cloud Security

Cloud Security
Author: Brij B. Gupta
Publsiher: CRC Press
Total Pages: 258
Release: 2021-05-25
Genre: Computers
ISBN: 9781000357301

Download Cloud Security Book in PDF, Epub and Kindle

Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them. Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain. This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.

Advanced Computing and Systems for Security

Advanced Computing and Systems for Security
Author: Rituparna Chaki,Agostino Cortesi,Khalid Saeed,Nabendu Chaki
Publsiher: Springer
Total Pages: 171
Release: 2018-12-08
Genre: Technology & Engineering
ISBN: 9789811332500

Download Advanced Computing and Systems for Security Book in PDF, Epub and Kindle

The book includes extended versions of selected papers discussed and presented at the 5th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2018) held in Kolkata, India on February 9–11, 2018. The symposium was organized by the University of Calcutta’s Department of Computer Science & Engineering and A. K. Choudhury School of Information Technology, and the International partners were Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. Reflect the symposium’s sessions, the book discusses topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.