Abstract
Smart water resource is the advanced stage of the development of water resources informatization. The following construction conceptions of it can meet the development requirements of water resources informatization under the new situation well, such as resource sharing, business collaboration, intelligent applications, etc. The emergence of Internet of Things, Big Data and Cloud Computing has profoundly changed the technical environment of water resources informatization, and brings new challenges in security assurance. On the basis of analysing the current situation and existing problems of water resource informatization and its security assurance system construction, the conception of smart water resource is defined exactly, the overall architecture design scheme of smart water resource is proposed, the main security threats to smart water resource are analyzed in detail, the security architecture of smart water resource is put forward, and also the key technologies of security assurance under the new situation are discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ma, W.Z.: Top Level Design of Water Affairs and Marine Information Technology Architecture (in Chinese). Shanghai Scientific and Technical Publishers, Shanghai (2015)
Liu, L.: Study on the construction of urban smart water resource (in Chinese). In: 3rd Water Conservancy Informatization and Digital Water Resources Technology Forum of China, pp. 335–341. Hohai University Press, Nanjing (2015)
Zhan, Q.Z.: Ministry of water resources issued “The basic technical requirements of the internet of water and information security system” (in Chinese). Netinfo Security. 6, 85–86 (2010)
Liu, M., Yan, J.Z., Yu, Y.C.: Research on data resources system under Beijing’s smart water framework (in Chinese). Water Resour. Informatization 4, 5–10 (2014)
Uckelmann, D., Harrison, M., Michahelles, F.: The Framework of IoT-Internet of Things Technology and Its Impact on Society. Science Press, Beijing (2013)
Feng, D.G., Zhang, M., Zhang, Y.: Study on cloud computing security (in Chinese). J. Softw. 22, 71–83 (2011)
Li, W., Gu, D.W., Zhao, C.: Security analysis of the LED lightweight cipher in the internet of things (in Chinese). Chin. J. Comput. 35, 434–445 (2012)
Gong, Z.: Survey on lightweight hash functions (in Chinese). J. Cryptologic Res. 3, 1–11 (2016)
Hou, C.D., Li, D., Qui, J.F., Cui, L.: EasiDEF: a horizontal lightweight data exchange protocol for internet of things (in Chinese). Chin. J. Comput. 38, 602–613 (2015)
Shankarwar, M.U., Pawar, A.V.: Security and privacy in cloud computing: a survey. In: Satapathy, S.C., Biswal, B.N., Udgata, S.K., Mandal, J.K. (eds.) Proc. of the 3rd Int. Conf. on Front. of Intell. Comput. (FICTA) 2014. AISC, vol. 328, pp. 105–112. Springer International Publishing, Switzerland (2015)
Feng, D.G., Zhang, M., Li, H.: Big data security and privacy protection (in Chinese). Chin. J. Comput. 37, 246–258 (2014)
Tankard, C.: Big Data Security. Netw Secur. 2012, 5–8 (2012)
Wu, C.K.: An overview on the security techniques and challenges of the internet of things (in Chinese). J. Cryptologic Res. 2, 40–53 (2015)
Guo, Y.M., Li, S.D., Chen, Z.H.: A lightweight privacy-preserving grouping proof protocol for RFID systems (in Chinese). Acta Electronica Sinica 43, 289–292 (2015)
Templeman, R., Korayem, M., Crandall, D., Kapadia, A.: PlaceAvoider: steering first-person cameras away from sensitive spaces. In: 1st Annual Network and Distributed System Security Symposium, San Diego (2014)
Roesner, F., Molnar, D., Moshchuk, A., Kohno, T., Wang, H.J.: World-driven access control for continuous sensing. In: 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, pp. 1169–1181 (2014)
Michalevsky, Y., Boneh, D., Nakibly, G.: Gyrophone: recognizing speech from gyroscope signals. In: 23rd USENIX Security Symposium, San Diego, pp. 1053–1067 (2014)
Dey, S., Roy, N., Xu, W.Y., Choudhury, R.R., Nelakuditi, S.: AccelPrint: imperfections of accelerometers make smartphones trackable. In: 21st Annual Network and Distributed System Security Symposium, San Diego (2014)
Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Jean Camp, L., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust and Trustworthy Computing. LNCS, vol. 7344, pp. 291–307. Springer, Heidelberg (2012)
Fritz, C.: FlowDroid: a precise and scalable data flow analysis for Android. Master’s thesis, TU Darmstadt (2013)
Enck, W., Gilbert, P., Han, S., et al.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32, 393–407 (2010)
Xu, R.B., Saïdi, H., Anderson, R.: Aurasium: practical policy enforcement for Android applications. In: 21st USENIX Conference on Security Symposium, pp. 27–27. USENIX Association Berkeley, California (2012)
Yang, Z., Yang, M., Zhang, Y., Gu, G., Ning, P., Wang. X.S.: Appintent: analyzing sensitive data transmission in Android for privacy leakage detection. In: 20th ACM Conference on Computer and Communications Security, pp. 1043–1054. ACM, New York (2013)
Zhang, X., Ahlawat, A., Du, W.: A frame: isolating advertisements from mobile applications in Android. In: 29th Annual Computer Security Applications Conference, pp. 9–18. ACM Press, New York (2013)
Pearce, P., Felt, A.P., Nunez, G., Wagner, D.: AdDroid: privilege separation for applications and advertisers in Android. In: 7th ACM Symposium on Information, Computer and Communications Security, pp. 71–72. ACM, New York (2012)
Shekhar, S., Dietz, M., Wallach D.S.: AdSplit: separating smartphone advertising from applications. In: 21th USENIX Conference on Security Symposium, pp. 28–28. USENIX Association Berkeley, California (2012)
CCF Task Force on Big Data: Predictions and interpretations about the development trend of big data in 2016 (in Chinese). Commun. CCF 12, 40–44 (2016)
Acknowledgments
This study is supported by the National Natural Science Foundation of China (grant No. 61472343).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Liu, P., Wang, YY., Shi, WZ., Yin, XC. (2016). The Security Architecture and Key Technologies Research of Smart Water Resource. In: Yin, H., et al. Intelligent Data Engineering and Automated Learning – IDEAL 2016. IDEAL 2016. Lecture Notes in Computer Science(), vol 9937. Springer, Cham. https://doi.org/10.1007/978-3-319-46257-8_52
Download citation
DOI: https://doi.org/10.1007/978-3-319-46257-8_52
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46256-1
Online ISBN: 978-3-319-46257-8
eBook Packages: Computer ScienceComputer Science (R0)