Skip to main content

Challenges in Secure Sensor-Cloud Computing

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6933))

Abstract

Cloud computing is a concept that has received significant attention lately. With advances in virtualization, coupled with the demand for services, many initiatives are underway in the environment of cloud computing. At this point, most of the services in cloud Computing are broadly in the paradigm of computing and storage, and in the traditional Client Server mode. With the recent explosion of wireless sensor networks and their applicability in civilian and military applications, there is an emerging vision for integrating sensor networks into the cloud. Practical systems like Microsoft’s SensorMap and Asia Pacific Environmental Sensor Grid are attestations to the enormous potential for sensor networks to be integrated into the cloud. In this framework users need not own sensor networks. Sensor Network owners after a mission need not disband the networks. There is a symbiotic relationship wherein sensor network owners can provide a variety of services to customers for profit. Customers also benefit from a variety of remote services without being physically close to the environment of interest. However, despite the benefits of sensor-clouds, security issues are largely open. A variety of new threats and attacks are possible, and existing solutions in standalone sensor networks will not be applicable in the cloud. The vision of this article is to introduce the sensor-cloud computing and overview the research challenges from the security perspective.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beng, L.H.: Sensor cloud:towards sensor-enabled cloud services, intelligent systems center, nanyang technological university (April 13, 2009)

    Google Scholar 

  2. Backhouse, J., Halperin, R.: Approaching interoperability for identity management systems. The Future of Identity in the Information Society, 245–268 (2009)

    Google Scholar 

  3. Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization (2005)

    Google Scholar 

  4. Bhargav-Spantzel, A., Squicciarini, A., Bertino, E.: Trust negotiation in identity management. IEEE Security & Privacy 5(2), 55–63 (2007)

    Article  Google Scholar 

  5. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Boukerche, A., Li, X.: An agent-based trust and reputation management scheme for wireless sensor networks. In: IEEE Global Telecommunications Conference, GLOBECOM 2005, vol. 3, p. 5. IEEE, Los Alamitos (2006)

    Google Scholar 

  7. Dantu, R., Loper, K., Kolan, P.: Risk management using behavior based attack graphs. In: Proceedings of International Conference on Information Technology: Coding and Computing, ITCC 2004, vol. 1, pp. 445–449. IEEE, Los Alamitos (2005)

    Google Scholar 

  8. Dewri, R., Poolsappasit, N., Ray, I., Whitley, D.: Optimal security hardening using multi-objective optimization on attack tree models of networks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 204–213. ACM, New York (2007)

    Google Scholar 

  9. Domingo-Ferrer, J., Torra, V.: Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Mining and Knowledge Discovery 11(2), 195–212 (2005)

    Article  MathSciNet  Google Scholar 

  10. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS (November 2002)

    Google Scholar 

  11. Fung, B., Wang, K., Yu, P.: Top-down specialization for information and privacy preservation. In: 21st International Conference on Data Engineering, ICDE 2005, pp. 205–216. IEEE, Los Alamitos (2005)

    Google Scholar 

  12. Gu, W., Bai, X., Chellappan, S.: Scaling laws of key pre-distribution protocols in wireless sensor networks. Technical report, Technical Report, The Department of Computer Science, Missouri University of Science and Technology (2010), http://web.mst.edu/chellaps/papers/gu_scaling_techrep10.pdf

  13. Kapadia, A., Myers, S., Wang, X., Fox, G.: Secure cloud computing with brokered trusted sensor networks. In: International Symposium on Collaborative Technologies and Systems (CTS) 2010, pp. 581–592. IEEE, Los Alamitos (2010)

    Chapter  Google Scholar 

  14. Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146–162. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  15. LeFevre, K., DeWitt, D., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 49–60. ACM, New York (2005)

    Chapter  Google Scholar 

  16. LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, p. 25. IEEE, Los Alamitos (2006)

    Google Scholar 

  17. Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 106–115. IEEE, Los Alamitos (2007)

    Chapter  Google Scholar 

  18. Lim, H., Iqbal, M., Ng, T.: A virtualization framework for heterogeneous sensor network platforms. In: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, pp. 319–320. ACM, New York (2009)

    Chapter  Google Scholar 

  19. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD) 1(1), 3 (2007)

    Article  Google Scholar 

  20. Mahalle, P., Babar, S., Prasad, N., Prasad, R.: Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges. Recent Trends in Network Security and Applications, 430–439 (2010)

    Google Scholar 

  21. Messmer, E.: Cloud-based identity management gets a boost Network World (May 19, 2010)

    Google Scholar 

  22. Nergiz, M., Clifton, C., Nergiz, A.: Multirelational k-anonymity. IEEE Transactions on Knowledge and Data Engineering 21(8), 1104–1117 (2009)

    Article  Google Scholar 

  23. Probst, M., Kasera, S.: Statistical trust establishment in wireless sensor networks. In: International Conference on Parallel and Distributed Systems 2007, vol. 2, pp. 1–8. IEEE, Los Alamitos (2009)

    Google Scholar 

  24. Ray, I., Poolsappasit, N., Dewri, R.: An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems. In: Atluri, V. (ed.) DAS 2008. LNCS, vol. 5094, pp. 297–312. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  25. Recordon, D., Reed, D.: OpenID 2.0: a platform for user-centric identity management. In: Proceedings of the Second ACM Workshop on Digital Identity Management, pp. 11–16. ACM, New York (2006)

    Chapter  Google Scholar 

  26. Sorniotti, A., Gomez, L., Wrona, K., Odorico, L.: Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey. Journal of Information Assurance and Security 2(3), 189–199 (2007)

    Google Scholar 

  27. Sweeney, L.: Achieving k-anonymity Privacy Protection using Generalization and Suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 571–588 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  28. S. URIs. Security Assertion Markup Language (SAML) V2. 0 Technical Overview (2008)

    Google Scholar 

  29. Vilcinskas, M., Craw, L., Brekkan, B.: Understanding Forefront Identity Manager 2010 Microsoft Corporation (October 2009)

    Google Scholar 

  30. Wang, L., Noel, S., Jajodia, S.: Minimum-cost network hardening using attack graphs. Computer Communications 29(18), 3812–3824 (2006)

    Article  Google Scholar 

  31. Yuriyama, M., Kushida, T.: Sensor-cloud infrastructure-physical sensor management with virtualized sensors on cloud computing (2010)

    Google Scholar 

  32. Zhang, W., Das, S., Liu, Y.: A trust based framework for secure data aggregation in wireless sensor networks. In: 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, SECON 2006, vol. 1, pp. 60–69. IEEE, Los Alamitos (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Poolsappasit, N., Kumar, V., Madria, S., Chellappan, S. (2011). Challenges in Secure Sensor-Cloud Computing. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2011. Lecture Notes in Computer Science, vol 6933. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23556-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23556-6_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23555-9

  • Online ISBN: 978-3-642-23556-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics