Fog computing is an important paradigm in the current scenario among many sensing application services based on the Internet of Things (IoT). A traditional IoT environment suffers from a significant latency where all ...
详细信息
Fog computing is an important paradigm in the current scenario among many sensing application services based on the Internet of Things (IoT). A traditional IoT environment suffers from a significant latency where all the devices access data from the cloud. To overcome this problem, fog computing is introduced to reduce the latency. However, several security limitations associated with fog computing have not been addressed. This research proposed the secure Data query and Storage processing (SURETY-fog) method, which overcomes the security limitation. The proposed work has different processes to enhance security and efficiency including IoT device and user registration based on the Naor Reingold generator and Prince algorithm, Authentication by using a Multi-Factor Authentication model, secure optimized fog node selection and secure sensed data storage by using Deer Hunting Optimization (DHO) algorithm, Deep Q learning based secure data storage with improved trust in fog, and Lightweight based secure data transmission in fog layer by using bliss signature. The simulation is conducted by using iFogSim and evaluating the performance based on the following metrics, response time, attack detection rate, resource utilization, number of queries processed, transmission latency, and processing latency.
A smart meter is an automation technology that sends real-time power consumption of electric appliances to the outsourced cloud through the aggregator node. An outsourced cloud is used by the Utility providers to rele...
详细信息
A smart meter is an automation technology that sends real-time power consumption of electric appliances to the outsourced cloud through the aggregator node. An outsourced cloud is used by the Utility providers to release computation and storage overhead. The real-time smart meter data helps in the management of demand and supply in the smart grid. However, the real-time smart meter data exposes the privacy of smart meter customers and inefficient aggregated smart meter data results in unbalanced power management decisions in the smart grid. Therefore, a smart meter data storage (SMDS) model is proposed that aggregates the encrypted smart meter data at the fog node with the property of homomorphic encryption and stores it on the outsourced cloud. Two clouds are used to process the smart meter data and only the utility provider is able to retrieve the actual power consumption of the smart meter. Additionally, a secure query processing model is designed to retrieve the smart meter data on the outsourced cloud. Experimental results show the effectiveness of the proposed work and the feature comparison demonstrates the superiority of the proposed over the existing works.
This paper addresses volume leakage (i.e., leakage of the number of records in the answer set) when processing keyword queries in encrypted key-value (KV) datasets. Volume leakage, coupled with prior knowledge about d...
详细信息
This paper addresses volume leakage (i.e., leakage of the number of records in the answer set) when processing keyword queries in encrypted key-value (KV) datasets. Volume leakage, coupled with prior knowledge about data distribution and/or previously executed queries, can reveal both ciphertexts and current user queries. We develop a solution to prevent volume leakage, entitled Veil, that partitions the dataset by randomly mapping keys to a set of equi-sized buckets. Veil provides a tunable mechanism for data owners to explore a trade-off between storage and communication overheads. To make buckets indistinguishable to the adversary, Veil uses a novel padding strategy that allow buckets to overlap, reducing the need to add fake records. Both theoretical and experimental results show Veil to significantly outperform existing state-of-the-art.
Privacy sensitive applications that store confidential information such as personal identifiable data or medical records have strict security concerns. These concerns hinder the adoption of the cloud. With cloud provi...
详细信息
ISBN:
(纸本)9781728142227
Privacy sensitive applications that store confidential information such as personal identifiable data or medical records have strict security concerns. These concerns hinder the adoption of the cloud. With cloud providers under the constant threat of malicious attacks, a single successful breach is sufficient to exploit any valuable information and disclose sensitive data. Existing privacy-aware databases mitigate some of these concerns, but sill leak critical information that can potently compromise the entire system's security. This paper proposes d'Artagnan, the first privacy-aware multi-cloud NoSQL database framework that renders database leaks worthless. The framework stores data as encrypted secrets in multiple clouds such that i) a single data breach cannot break the database's confidentiality and ii) queries are processed on the server-side without leaking any sensitive information. d'Artagnan is evaluated with industry-standard benchmark on marketleading cloud providers.
With the evolution of lightweight hand-held devices and successful deployment of wired and wireless networks for day-to-day operations, organizations are producing massive data aka big data with 4Vs: volume, variety, ...
详细信息
ISBN:
(纸本)9781538645864
With the evolution of lightweight hand-held devices and successful deployment of wired and wireless networks for day-to-day operations, organizations are producing massive data aka big data with 4Vs: volume, variety, velocity, and veracity. Many organizations have taken advantage of their big data and developed data-driven applications for their businesses using distributed computing and storage. However, it is challenging to process such massive data in near real-time without using distributed computing such as cloud computing platforms. When organizations use public cloud platform for processing and storing their data, data must leave the organization which can invite security and privacy risks. In this paper, we investigate how organizations can take benefit of hybrid (public and private) cloud platform for distributed storage and processing for improving security and the overall performance. Further, we investigate how query process can be secured while sending data to and retrieving the data from the public cloud. Overall goal of this work is to protect sensitive data at all stages (when data is stored, traveling, processing, and retrieving) in hybrid cloud by designing secure context-aware load balancer for distributed storage and queryprocessing (secureCASH, for short). Performance of the proposed approach is evaluated using numerical results obtained from simulations.
Web warehouse (WWh) has overcome the geographical dependencies of data warehouse. With the rapid development of WWh, decision makers (humans) and intelligent devices are able to remotely retrieve the information for s...
详细信息
Web warehouse (WWh) has overcome the geographical dependencies of data warehouse. With the rapid development of WWh, decision makers (humans) and intelligent devices are able to remotely retrieve the information for supporting the effective decision-making process. This paper presents a secure Web service-oriented architecture of the WWh. The proposed architecture provides the better scalability, availability of WWh, and secure analytical service for human and Internet of Things for effective decision making. In addition, the service-oriented architecture of WWh integrates intelligent devices for the process of decision making. The proposed architecture uses XML-based Web services to provide authentication, authorization, and data confidentiality and integrity. Experiments show that the proposed architecture is more reliable, scalable, and secure.
Web Warehouse has conquered the limitation of data warehouse geographical dependencies. With the advent of web warehouse, now decision makers of an organization can retrieve decisions related knowledge through interne...
详细信息
ISBN:
(纸本)9781479980031
Web Warehouse has conquered the limitation of data warehouse geographical dependencies. With the advent of web warehouse, now decision makers of an organization can retrieve decisions related knowledge through internet. When data is fetched from a web warehouse located on web server the data security, Integrity and confidentiality problems rise up. To overcome security threats and availability issues a secure enhance web warehouse model is developed. This model uses XML based web services to cope with the platform and environment dependencies with multi-knowledge confidentiality and users authentication techniques.
Web Warehouse has conquered the limitation of data warehouse geographical *** the advent of web warehouse,now decision makers of an organization can retrieve decisions related knowledge through *** data is fetched fro...
详细信息
Web Warehouse has conquered the limitation of data warehouse geographical *** the advent of web warehouse,now decision makers of an organization can retrieve decisions related knowledge through *** data is fetched from a web warehouse located on web server the data security,Integrity and confidentiality problems rise *** overcome security threats and availability issues a secure enhance web warehouse model is *** model uses XML based web services to cope with the platform and environment dependencies with multi-knowledge confidentiality and users authentication techniques.
We present a unified declarative platform for specifying, implementing, and analyzing secure networked information systems. Our work builds upon techniques from logic-based trust management systems and declarative net...
详细信息
We present a unified declarative platform for specifying, implementing, and analyzing secure networked information systems. Our work builds upon techniques from logic-based trust management systems and declarative networking. We make the following contributions. First, we propose the secure Network Datalog (SeNDlog) language that unifies Binder, a logic-based language for access control in distributed systems, and Network Datalog, a distributed recursive query language for declarative networks. SeNDlog enables network routing, information systems, and their security policies to be specified and implemented within a common declarative framework. Second, we extend existing distributed recursive queryprocessing techniques to execute SeNDlog-programs that incorporate secure communication via authentication and encryption among untrusted nodes. Third, we demonstrate the use of user-defined cryptographic functions for customizing the authentication and encryption mechanisms used for securing protocols. Finally, using a local cluster and the PlanetLab testbed, we perform a detailed performance study of a variety of secure networked systems implemented using our platform. (c) 2012 Elsevier Ltd. All rights reserved.
暂无评论