Skip to main content

ASSIST: Access Controlled Ship Identification Streams

  • Chapter

Part of the book series: Lecture Notes in Computer Science ((TLDKS,volume 8290))

Abstract

The International Maritime Organization (IMO) requires a majority of cargo and passenger ships to use the Automatic Identification System (AIS) for navigation safety and traffic control. Distributing live AIS data on the Internet can offer a global view for both operational and analytical purposes to port authorities, shipping and insurance companies, cargo owners and ship captains and other stakeholders. Yet, uncontrolled, this distribution can seriously undermine navigation safety and security and the privacy of the various stakeholders. In this paper we present ASSIST, an application system based on our recently proposed access control framework, to protect streaming data from unauthorized access. Furthermore, we have implemented ASSIST on top of StreamInsight, a commercial stream engine. The extensive experimental results show that our solution is effective and efficient.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. International Telecommunications Union: Technical characteristics for an automatic identification system using time-division multiple access in the vhf maritime mobile band

    Google Scholar 

  2. IMO: International maritime organization, http://www.imo.org/ourwork/safety/navigation/pages/ais.aspx

  3. Knezo, G.J.: Sensitive but unclassified and other federal security controls on scientific and technical information: History and current controversy. USA’s Congressional Research Service (2003)

    Google Scholar 

  4. Lane, R.O., Nevell, D.A., Hayward, S.D., Beaney, T.W.: Maritime anomaly detection and threat assessment. In: Proc. of the Int. Conf. on Information Fusion, pp. 1–8 (2010)

    Google Scholar 

  5. Piciarelli, C., Foresti, G.L.: On-line trajectory clustering for anomalous events detection. Pattern Recognition Letters, 1835–1842 (2006)

    Google Scholar 

  6. de Vries, G., van Someren, M.: Clustering vessel trajectories with alignment kernels under trajectory compression. In: Balcázar, J.L., Bonchi, F., Gionis, A., Sebag, M. (eds.) ECML PKDD 2010, Part I. LNCS, vol. 6321, pp. 296–311. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. Carminati, B., Ferrari, E., Cao, J., Tan, K.L.: A framework to enforce access control over data streams. ACM Trans. on Information and System Security 13(3) (2010)

    Google Scholar 

  8. Lindner, W., Meier, J.: Securing the borealis data stream engine, 137–147 (2006)

    Google Scholar 

  9. Nehme, R.V., Rundensteiner, E.A., Bertino, E.: A security punctuation framework for enforcing access control on streaming data. In: Proc. of ICDE, pp. 406–415 (2008)

    Google Scholar 

  10. Nehme, R.V., Lim, H.S., Bertino, E.: Fence: Continuous access control enforcement in dynamic data stream environments. In: Proc. of ICDE, pp. 940–943 (2010)

    Google Scholar 

  11. Microsoft StreamInsight, http://msdn.microsoft.com/en-us/library/ee362541.aspx

  12. Arasu, A., Babcock, B., Babu, S., Datar, M., Ito, K., Nishizawa, I., Rosenstein, J., Widom, J.: Stream: The stanford stream data manager. In: Proc. of SIGMOD (2003)

    Google Scholar 

  13. Law, Y.N., Wang, H., Zaniolo, C.: Query languages and data models for database sequences and data streams. In: Proc. of VLDB, pp. 492–503 (2004)

    Google Scholar 

  14. Babcock, B., Babu, S., Datar, M., Motwani, R., Thomas, D.: Operator scheduling in data stream systems. VLDB Journal 13(4), 333–353 (2004)

    Article  Google Scholar 

  15. Domingos, P., Hulten, G.: Mining high-speed data streams. In: Proc. of KDD, pp. 71–80 (2000)

    Google Scholar 

  16. Zhang, P., Zhu, X., Shi, Y.: Categorizing and mining concept drifting data streams. In: Proc. of KDD, pp. 812–820 (2008)

    Google Scholar 

  17. Luo, C., Thakkar, H., Wang, H., Zaniolo, C.: A native extension of sql for mining data streams. In: Proc. of SIGMOD, pp. 873–875 (2005)

    Google Scholar 

  18. Abadi, D.J., Ahmad, Y., Balazinska, M., Çetintemel, U., Cherniack, M., Hwang, J.H., Lindner, W., Maskey, A., Rasin, A., Ryvkina, E., Tatbul, N., Xing, Y., Zdonik, S.B.: The design of the borealis stream processing engine. In: Proc. of CIDR, pp. 277–289 (2005)

    Google Scholar 

  19. Abadi, D.J., Carney, D., Çetintemel, U., Cherniack, M., Convey, C., Lee, S., Stonebraker, M., Tatbul, N., Zdonik, S.B.: Aurora: a new model and architecture for data stream management. VLDB Journal 12(2), 120–139 (2003)

    Article  Google Scholar 

  20. Zdonik, S.B., Stonebraker, M., Cherniack, M., Çetintemel, U., Balazinska, M., Balakrishnan, H.: The aurora and medusa projects. IEEE Data Eng. Bull. 26(1), 3–10 (2003)

    Google Scholar 

  21. Chandrasekaran, S., Cooper, O., Deshpande, A., Franklin, M.J., Hellerstein, J.M., Hong, W., Krishnamurthy, S., Madden, S., Raman, V., Reiss, F., Shah, M.A.: Telegraphcq: Continuous dataflow processing for an uncertain world. In: Proc. of CIDR (2003)

    Google Scholar 

  22. Schreier, U., Pirahesh, H., Agrawal, R., Mohan, C.: Alert: An architecture for transforming a passive dbms into an active dbms. In: Proc. of VLDB, pp. 469–478 (1991)

    Google Scholar 

  23. Sullivan, M.: Tribeca: A stream database manager for network traffic analysis. In: Proc. of VLDB., p. 594 (1996)

    Google Scholar 

  24. Liu, L., Pu, C., Tang, W.: Continual queries for internet scale event-driven information delivery. TKDE 11(4), 610–628 (1999)

    Google Scholar 

  25. Chen, J., DeWitt, D.J., Tian, F., Wang, Y.: Niagaracq: a scalable continuous query system for internet databases. In: Proc. of SIGMOD, pp. 379–390 (2000)

    Google Scholar 

  26. Zhu, Y., Rundensteiner, E.A., Heineman, G.T.: Dynamic plan migration for continuous queries over data streams. In: Proc. of SIGMOD, pp. 431–442 (2004)

    Google Scholar 

  27. Esper, http://esper.codehaus.org/

  28. Barga, R.S., Goldstein, J., Ali, M.H., Hong, M.: Consistent streaming through time: A vision for event stream processing. In: Biennial Conf. on Innovative Data Systems Research, pp. 363–374 (2007)

    Google Scholar 

  29. LINQ (Language-Integrated Query): http://msdn.microsoft.com/en-us/library/vstudio/bb397926.aspx

  30. Ali, M.H., Chandramouli, B., Raman, B.S., Katibah, E.: Real-time spatio-temporal analytics using microsoft streaminsight. In: Proc. of ACM GIS, pp. 542–543 (2010)

    Google Scholar 

  31. Kazemitabar, S.J., Demiryurek, U., Ali, M.H., Akdogan, A., Shahabi, C.: Geospatial stream query processing using microsoft sql server streaminsight. Proc. of VLDB Endow. 3, 1537–1540 (2010)

    Google Scholar 

  32. Cao, J., Carminati, B., Ferrari, E., Tan, K.L.: Acstream: Enforcing access control over data streams. In: Proc. of ICDE, pp. 1495–1498 (2009)

    Google Scholar 

  33. Carminati, B., Tan, K.-L.: Specifying access control policies on data streams. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 410–421. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  34. Abadi, D.J., Carney, D., Çetintemel, U., Cherniack, M., Convey, C., Lee, S., Stonebraker, M., Tatbul, N., Zdonik, S.B.: Aurora: a new model and architecture for data stream management. VLDB Journal 12(2), 120–139 (2003)

    Google Scholar 

  35. Cao, J., Kister, T., Xiang, S., Malhotra, B., Tan, W.J., Tan, K.L., Bressan, S.: Assist: Access controlled ship identification streams. Technical Report TRA2/13, School of Computing, National University of Singapore (February 2013), http://hdl.handle.net/1900.100/3883

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Cao, J. et al. (2013). ASSIST: Access Controlled Ship Identification Streams. In: Hameurlain, A., Küng, J., Wagner, R., Amann, B., Lamarre, P. (eds) Transactions on Large-Scale Data- and Knowledge-Centered Systems XI. Lecture Notes in Computer Science, vol 8290. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45269-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-45269-7_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-45268-0

  • Online ISBN: 978-3-642-45269-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics