Skip to main content

Big Data Stream Security Classification for IoT Applications

Abstract

Internet of Things (IoT) becomes a key source to big sensing data streams. Big data streams become a key research issue to process in a resource-constrained IoT devices, but security concerns in big sensing data streams are still an open research problem. This paper presents an overview of the big data stream security classifications in the context of IoT infrastructure. The basics toward the cybersecurity threats and potential solution for big data stream environment are highlighted. Finally the paper classified the security threats based on CIA (confidentiality, integrity, and availability) triad classifications.

Keywords

  • Internet of Things
  • Big data streams
  • Security
  • Security threats
  • Quality of service

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-77525-8_236
  • Chapter length: 6 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   899.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-77525-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Big Data Stream Security Classification for IoT Applications, Fig. 1

References

  • Bella G, Paulson L (1998) Kerberos version IV: inductive analysis of the secrecy goals. In: Computer security – ESORICS 98, Louvain-la-Neuve, pp 361–375

    Google Scholar 

  • Chen P, Wang X, Wu Y, Su J, Zhou H (2015) POSTER: iPKI: identity-based private key infrastructure for securing BGP protocol. In: 22nd ACM SIGSAC conference on computer and communications security, Colorado, pp 1632–1634

    Google Scholar 

  • El-Sayed H, Sankar S, Prasad M, Puthal D, Gupta A, Mohanty M, Lin C (2017) Edge of things: the big picture on the integration of edge, IoT and the cloud in a distributed computing environment. IEEE Access 6:1706–1717

    CrossRef  Google Scholar 

  • Fox G, Gadgil H, Pallickara S, Pierce M, Grossman R, Gu Y, Hanley D, Hong X (2004) High performance data streaming in service architecture. Technical report, Indiana University and University of Illinois at Chicago

    Google Scholar 

  • Granjal J, Monteiro E, Sá Silva J (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17(3):1294–1312

    CrossRef  Google Scholar 

  • Medaglia C, Serbanati A (2010) An overview of privacy and security issues in the internet of things. In: The internet of things. Springer, New York, pp 389–395

    CrossRef  Google Scholar 

  • Nehme R, Lim H, Bertino E, Rundensteiner E (2009) StreamShield: a stream-centric approach towards security and privacy in data stream environments. In: ACM SIGMOD international conference on management of data, Rhode Island, pp 1027–1030

    Google Scholar 

  • Puthal D, Nepal S, Ranjan R, Chen J (2015a) DPBSV- An efficient and secure scheme for big sensing data stream. In: 14th IEEE international conference on trust, security and privacy in computing and communications, Helsinki, pp 246–253

    Google Scholar 

  • Puthal D, Nepal S, Ranjan R, Chen J (2015b) A dynamic key length based approach for real-time security verification of big sensing data stream. In: 16th international conference on web information system engineering, Miami, pp 93–108

    Google Scholar 

  • Puthal D, Nepal S, Ranjan R, Chen J (2016a) Threats to networking cloud and edge datacenters in the Internet of Things. IEEE Cloud Computing 3(3):64–71

    CrossRef  Google Scholar 

  • Puthal D, Nepal S, Ranjan R, Chen J (2016b) DLSeF: A dynamic key length based efficient real-time security verification model for big data stream. ACM Trans Embed Comput Syst 16(2):51

    CrossRef  Google Scholar 

  • Puthal D, Mohanty S, Nanda P, Choppali U (2017a) Building security perimeters to protect network systems against cyber threats. IEEE Consum Electron Mag 6(4):24–27

    CrossRef  Google Scholar 

  • Puthal D, Ranjan R, Nepal S, Chen J (2017b) IoT and Big Data: an architecture with data flow and security issues. In: Cloud infrastructures, services, and IoT systems for smart cities, Brindisi, pp 243–252

    Google Scholar 

  • Puthal D, Nepal S, Ranjan R, Chen J (2017c) A dynamic prime number based efficient security mechanism for big sensing data streams. J Comput Syst Sci 83(1):22–42

    MathSciNet  MATH  CrossRef  Google Scholar 

  • Puthal D, Wu X, Nepal S, Ranjan R, Chen J (2017d, in press) SEEN: a selective encryption method to ensure confidentiality for big sensing data streams. IEEE Trans Big Data

    Google Scholar 

  • Puthal D, Obaidat M, Nanda, P, Prasad M, Mohanty S, Zomaya A (2017e, in press) Secure and sustainable load balancing of edge datacenters in fog computing. IEEE Communs Mag

    Google Scholar 

  • Sharma S, Puthal D, Tazeen S, Prasad M, Zomaya AY (2017) MSGR: a mode-switched grid-based sustainable routing protocol for wireless sensor networks. IEEE Access 5:19864–19875

    CrossRef  Google Scholar 

  • Weber R (2010) Internet of things–new security and privacy challenges. Comput Law Secur Rev 26(1):23–30

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepak Puthal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Verify currency and authenticity via CrossMark

Cite this entry

Puthal, D., Ranjan, R., Chen, J. (2019). Big Data Stream Security Classification for IoT Applications. In: Sakr, S., Zomaya, A.Y. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-77525-8_236

Download citation