Abstract
Cloud computing is a concept that has received significant attention lately. With advances in virtualization, coupled with the demand for services, many initiatives are underway in the environment of cloud computing. At this point, most of the services in cloud Computing are broadly in the paradigm of computing and storage, and in the traditional Client Server mode. With the recent explosion of wireless sensor networks and their applicability in civilian and military applications, there is an emerging vision for integrating sensor networks into the cloud. Practical systems like Microsoft’s SensorMap and Asia Pacific Environmental Sensor Grid are attestations to the enormous potential for sensor networks to be integrated into the cloud. In this framework users need not own sensor networks. Sensor Network owners after a mission need not disband the networks. There is a symbiotic relationship wherein sensor network owners can provide a variety of services to customers for profit. Customers also benefit from a variety of remote services without being physically close to the environment of interest. However, despite the benefits of sensor-clouds, security issues are largely open. A variety of new threats and attacks are possible, and existing solutions in standalone sensor networks will not be applicable in the cloud. The vision of this article is to introduce the sensor-cloud computing and overview the research challenges from the security perspective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Beng, L.H.: Sensor cloud:towards sensor-enabled cloud services, intelligent systems center, nanyang technological university (April 13, 2009)
Backhouse, J., Halperin, R.: Approaching interoperability for identity management systems. The Future of Identity in the Information Society, 245–268 (2009)
Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization (2005)
Bhargav-Spantzel, A., Squicciarini, A., Bertino, E.: Trust negotiation in identity management. IEEE Security & Privacy 5(2), 55–63 (2007)
Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)
Boukerche, A., Li, X.: An agent-based trust and reputation management scheme for wireless sensor networks. In: IEEE Global Telecommunications Conference, GLOBECOM 2005, vol. 3, p. 5. IEEE, Los Alamitos (2006)
Dantu, R., Loper, K., Kolan, P.: Risk management using behavior based attack graphs. In: Proceedings of International Conference on Information Technology: Coding and Computing, ITCC 2004, vol. 1, pp. 445–449. IEEE, Los Alamitos (2005)
Dewri, R., Poolsappasit, N., Ray, I., Whitley, D.: Optimal security hardening using multi-objective optimization on attack tree models of networks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 204–213. ACM, New York (2007)
Domingo-Ferrer, J., Torra, V.: Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Mining and Knowledge Discovery 11(2), 195–212 (2005)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS (November 2002)
Fung, B., Wang, K., Yu, P.: Top-down specialization for information and privacy preservation. In: 21st International Conference on Data Engineering, ICDE 2005, pp. 205–216. IEEE, Los Alamitos (2005)
Gu, W., Bai, X., Chellappan, S.: Scaling laws of key pre-distribution protocols in wireless sensor networks. Technical report, Technical Report, The Department of Computer Science, Missouri University of Science and Technology (2010), http://web.mst.edu/chellaps/papers/gu_scaling_techrep10.pdf
Kapadia, A., Myers, S., Wang, X., Fox, G.: Secure cloud computing with brokered trusted sensor networks. In: International Symposium on Collaborative Technologies and Systems (CTS) 2010, pp. 581–592. IEEE, Los Alamitos (2010)
Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146–162. Springer, Heidelberg (2008)
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 49–60. ACM, New York (2005)
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, p. 25. IEEE, Los Alamitos (2006)
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 106–115. IEEE, Los Alamitos (2007)
Lim, H., Iqbal, M., Ng, T.: A virtualization framework for heterogeneous sensor network platforms. In: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, pp. 319–320. ACM, New York (2009)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD)Â 1(1), 3 (2007)
Mahalle, P., Babar, S., Prasad, N., Prasad, R.: Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges. Recent Trends in Network Security and Applications, 430–439 (2010)
Messmer, E.: Cloud-based identity management gets a boost Network World (May 19, 2010)
Nergiz, M., Clifton, C., Nergiz, A.: Multirelational k-anonymity. IEEE Transactions on Knowledge and Data Engineering 21(8), 1104–1117 (2009)
Probst, M., Kasera, S.: Statistical trust establishment in wireless sensor networks. In: International Conference on Parallel and Distributed Systems 2007, vol. 2, pp. 1–8. IEEE, Los Alamitos (2009)
Ray, I., Poolsappasit, N., Dewri, R.: An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems. In: Atluri, V. (ed.) DAS 2008. LNCS, vol. 5094, pp. 297–312. Springer, Heidelberg (2008)
Recordon, D., Reed, D.: OpenID 2.0: a platform for user-centric identity management. In: Proceedings of the Second ACM Workshop on Digital Identity Management, pp. 11–16. ACM, New York (2006)
Sorniotti, A., Gomez, L., Wrona, K., Odorico, L.: Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey. Journal of Information Assurance and Security 2(3), 189–199 (2007)
Sweeney, L.: Achieving k-anonymity Privacy Protection using Generalization and Suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 571–588 (2002)
S. URIs. Security Assertion Markup Language (SAML) V2. 0 Technical Overview (2008)
Vilcinskas, M., Craw, L., Brekkan, B.: Understanding Forefront Identity Manager 2010 Microsoft Corporation (October 2009)
Wang, L., Noel, S., Jajodia, S.: Minimum-cost network hardening using attack graphs. Computer Communications 29(18), 3812–3824 (2006)
Yuriyama, M., Kushida, T.: Sensor-cloud infrastructure-physical sensor management with virtualized sensors on cloud computing (2010)
Zhang, W., Das, S., Liu, Y.: A trust based framework for secure data aggregation in wireless sensor networks. In: 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, SECON 2006, vol. 1, pp. 60–69. IEEE, Los Alamitos (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Poolsappasit, N., Kumar, V., Madria, S., Chellappan, S. (2011). Challenges in Secure Sensor-Cloud Computing. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2011. Lecture Notes in Computer Science, vol 6933. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23556-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-23556-6_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23555-9
Online ISBN: 978-3-642-23556-6
eBook Packages: Computer ScienceComputer Science (R0)