메뉴 건너뛰기




Volumn 5, Issue 3, 2019, Pages 379-392

SEEN: A selective encryption method to ensure confidentiality for big sensing data streams

Author keywords

Big data stream; Data confidentiality; Data integrity; Data security; Selective encryption

Indexed keywords

AGRICULTURAL ROBOTS; BEHAVIORAL RESEARCH; CRYPTOGRAPHY; DECISION MAKING; NETWORK SECURITY; PRECISION AGRICULTURE; WIRELESS SENSOR NETWORKS;

EID: 85092001362     PISSN: None     EISSN: 23327790     Source Type: Journal    
DOI: 10.1109/TBDATA.2017.2702172     Document Type: Article
Times cited : (32)

References (50)
  • 1
    • 1142303663 scopus 로고    scopus 로고
    • STREAM: The Stanford stream data manager (demonstration description)
    • A. Arasu, et al, "STREAM: The Stanford stream data manager (demonstration description)," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2003, pp. 665-665.
    • (2003) Proc. Acm Sigmod Int. Conf. Manage. Data , pp. 665
    • Arasu, A.1
  • 5
    • 84856212536 scopus 로고    scopus 로고
    • A lightweight security scheme for wireless body area networks: Design, energy evaluation and proposed microprocessor design
    • G. Selimis, et al., "A lightweight security scheme for wireless body area networks: Design, energy evaluation and proposed microprocessor design, " J. Med. Syst., vol. 35, no. 5, pp. 1289-1298, 2011.
    • (2011) J. Med. Syst. , vol.35 , Issue.5 , pp. 1289-1298
    • Selimis, G.1
  • 6
    • 79960888516 scopus 로고    scopus 로고
    • Evaluation of 90 nm 6 T-SRAM as physical unclonable function for secure key generation in wireless sensor nodes
    • G. Selimis, et al., "Evaluation of 90 nm 6 T-SRAM as physical unclonable function for secure key generation in wireless sensor nodes," in Proc. IEEE IEEE Int. Symp. Circuits Syst., 2011, pp. 567-570.
    • (2011) Proc. Ieee Ieee Int. Symp. Circuits Syst. , pp. 567-570
    • Selimis, G.1
  • 7
  • 8
    • 84963778729 scopus 로고    scopus 로고
    • LEoNIDS: A low-latency and energy-efficient network-level intrusion detection system
    • Jan.-Mar.
    • N. Tsikoudis, A. Papadogiannakis and E. P. Markatos, "LEoNIDS: A low-latency and energy-efficient network-level intrusion detection system," IEEE Trans. Emerging Topics Comput., vol. 4, no. 1, pp. 142-155, Jan.-Mar. 2016.
    • (2016) Ieee Trans. Emerging Topics Comput. , vol.4 , Issue.1 , pp. 142-155
    • Tsikoudis, N.1    Papadogiannakis, A.2    Markatos, E.P.3
  • 10
    • 84960429448 scopus 로고    scopus 로고
    • Unifying intrusion detection and forensic analysis via provenance awareness
    • Y. Xie, D. Feng, Z. Tan, and J. Zhou, "Unifying intrusion detection and forensic analysis via provenance awareness," Future Generation Comput. Syst., vol. 61, pp. 26-36, 2016.
    • (2016) Future Generation Comput. Syst. , vol.61 , pp. 26-36
    • Xie, Y.1    Feng, D.2    Tan, Z.3    Zhou, J.4
  • 12
    • 85016596484 scopus 로고    scopus 로고
    • LiSP: A lightweight security protocol for wireless sensor networks
    • T. Park and K. G. Shin, "LiSP: A lightweight security protocol for wireless sensor networks," ACM Trans. Embedded Comput. Syst., vol. 3, no. 3, pp. 634-660, 2004.
    • (2004) Acm Trans. Embedded Comput. Syst. , vol.3 , Issue.3 , pp. 634-660
    • Park, T.1    Shin, K.G.2
  • 15
    • 84958967653 scopus 로고    scopus 로고
    • Combining the self-organizing map and k-means clustering for on-line classification of sensor data
    • K. Van Laerhoven, "Combining the self-organizing map and k-means clustering for on-line classification of sensor data," in Proc. Int. Conf. Artif. Neural Netw., 2001, pp. 464-469.
    • (2001) Proc. Int. Conf. Artif. Neural Netw , pp. 464-469
    • Van Laerhoven, K.1
  • 17
    • 20544440223 scopus 로고    scopus 로고
    • DIMENSIONS: Why do we need a new data handling architecture for sensor networks?
    • D. Ganesan, D. Estrin and J. Heidemann, "DIMENSIONS: Why do we need a new data handling architecture for sensor networks?," ACM SIGCOMM Comput. Commun. Rev., vol. 33, no. 1. pp. 143-148, 2003.
    • (2003) Acm Sigcomm Comput. Commun. Rev. , vol.33 , Issue.1 , pp. 143-148
    • Ganesan, D.1    Estrin, D.2    Heidemann, J.3
  • 19
    • 84962052195 scopus 로고    scopus 로고
    • A dynamic prime number based efficient security mechanism for big sensing data streams
    • D. Puthal, S. Nepal, R. Ranjan, and J. Chen, "A dynamic prime number based efficient security mechanism for big sensing data streams," J. Comput. Syst. Sci., vol. 83, no. 1, pp. 22-24, 2017.
    • (2017) J. Comput. Syst. Sci. , vol.83 , Issue.1 , pp. 22-24
    • Puthal, D.1    Nepal, S.2    Ranjan, R.3    Chen, J.4
  • 20
    • 85008884270 scopus 로고    scopus 로고
    • DLSeF: A dynamic key length based efficient real-time security verification model for big data stream
    • Art. no. 51
    • D. Puthal, S. Nepal, R. Ranjan, and J. Chen, "DLSeF: A dynamic key length based efficient real-time security verification model for big data stream," ACM Trans. Embedded Comput. Syst., vol. 16, no. 2, 2017, Art. no. 51.
    • (2017) Acm Trans. Embedded Comput. Syst. , vol.16 , Issue.2
    • Puthal, D.1    Nepal, S.2    Ranjan, R.3    Chen, J.4
  • 21
    • 84961627543 scopus 로고    scopus 로고
    • Streaming big data processing in datacenter clouds
    • May
    • R. Ranjan, "Streaming big data processing in datacenter clouds," IEEE Cloud Comput., vol. 1, no. 1, pp. 78-83, May 2014.
    • (2014) Ieee Cloud Comput. , vol.1 , Issue.1 , pp. 78-83
    • Ranjan, R.1
  • 22
    • 85091965174 scopus 로고    scopus 로고
    • Accessed On: 04.08.2014
    • [Onl ine]. Avai lable: www.cloudflare.com, Accessed On: 04.08.2014
  • 23
    • 0034444066 scopus 로고    scopus 로고
    • Architectural support for fast symmetric-key cryptography
    • J. Burke, J. McDonald, and T. Austin, "Architectural support for fast symmetric-key cryptography," ACM SIGARCH Comput. Archit. News, vol. 28, no. 5, pp. 178-189, 2000.
    • (2000) Acm Sigarch Comput. Archit. News , vol.28 , Issue.5 , pp. 178-189
    • Burke, J.1    McDonald, J.2    Austin, T.3
  • 24
    • 84892446001 scopus 로고    scopus 로고
    • Accessed on: 30.07.2016
    • Crypto- Benchmarks. [Online]. Available: Http://www. cryptopp.com/benchmarks.html, Accessed on: 30.07.2016.
    • Crypto-Benchmarks
  • 25
    • 0016973732 scopus 로고
    • Ethernet: Distributed packet switching for local computer networks
    • R. M. Metcalfe and D. R. Boggs, "Ethernet: Distributed packet switching for local computer networks," Commun. ACM, vol. 19, no. 7, pp. 395-404, 1976.
    • (1976) Commun. Acm , vol.19 , Issue.7 , pp. 395-404
    • Metcalfe, R.M.1    Boggs, D.R.2
  • 26
    • 31444440239 scopus 로고    scopus 로고
    • The 8 requirements of real-time stream processing
    • M. Stonebraker, U. Çetintemel, and S. Zdonik, "The 8 requirements of real-time stream processing," ACM SIGMOD Rec., vol. 34, no. 4, pp. 42-47, 2005.
    • (2005) Acm Sigmod Rec. , vol.34 , Issue.4 , pp. 42-47
    • Stonebraker, M.1    Çetintemel, U.2    Zdonik, S.3
  • 28
    • 85091979004 scopus 로고    scopus 로고
    • Scyther, Accessed on: 30.07.2016.
    • Scyther. [Online]. Available: Http://www.cs.ox.ac.uk/people/cas.cremers/scyther/, Accessed on: 30.07.2016.
  • 30
    • 85091985693 scopus 로고    scopus 로고
    • Matlab, Accessed on: 30.07.2016.
    • Matlab. [Onl ine]. Avai lable: Http://au.mathworks.com/products/matlab/, Accessed on: 30.07.2016.
  • 31
    • 70449496394 scopus 로고    scopus 로고
    • Accessed on: 30.07.2016.
    • Contiki operating system. [Online]. Available: Http://www. contiki-os.org/, Accessed on: 30.07.2016.
    • Contiki Operating System
  • 33
    • 10644281455 scopus 로고    scopus 로고
    • Retrospective on aurora
    • H. Balakrishnan, et al., "Retrospective on aurora," VLDB J., vol. 13, no. 4, pp. 370-383, 2004.
    • (2004) Vldb J. , vol.13 , Issue.4 , pp. 370-383
    • Balakrishnan, H.1
  • 35
    • 85009936481 scopus 로고    scopus 로고
    • An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
    • (In press)
    • F. Wu, et al., "An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment," J. Netw. Comput. Appl., (In press), 2016, https://doi. org/10.1016/j.jnca.2016.12.008
    • (2016) J. Netw. Comput. Appl.
    • Wu, F.1
  • 36
    • 84869444719 scopus 로고    scopus 로고
    • Streamcloud: An elastic and scalable data streaming system
    • Dec.
    • V. Gulisano, et al., "Streamcloud: An elastic and scalable data streaming system," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2351-2365, Dec. 2012.
    • (2012) Ieee Trans. Parallel Distrib. Syst. , vol.23 , Issue.12 , pp. 2351-2365
    • Gulisano, V.1
  • 38
    • 84872236493 scopus 로고    scopus 로고
    • Multilevel secure data stream processing: Architecture and implementation
    • R. Adaikkalavan, X. Xie, and I. Ray, "Multilevel secure data stream processing: Architecture and implementation," J. Comput. Secur., vol. 20, no. 5, pp. 547-581, 2012.
    • (2012) J. Comput. Secur. , vol.20 , Issue.5 , pp. 547-581
    • Adaikkalavan, R.1    Xie, X.2    Ray, I.3
  • 40
    • 84978224275 scopus 로고    scopus 로고
    • Threats to networking cloud and edge datacenters in the internet of thing
    • May-Jun.
    • D. Puthal, S. Nepal, R. Ranjan, and J. Chen, "Threats to networking cloud and edge datacenters in the internet of thing," IEEE Cloud Comput., vol. 3, no. 3, pp. 64-71, May-Jun. 2016.
    • (2016) Ieee Cloud Comput. , vol.3 , Issue.3 , pp. 64-71
    • Puthal, D.1    Nepal, S.2    Ranjan, R.3    Chen, J.4
  • 43
  • 44
    • 41449098948 scopus 로고    scopus 로고
    • LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    • May
    • K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware end-to-end data security in wireless sensor networks," IEEE Trans. Mobile Comput., vol. 7, no. 5, pp. 585-598, May 2008.
    • (2008) Ieee Trans. Mobile Comput. , vol.7 , Issue.5 , pp. 585-598
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 45
    • 67749118172 scopus 로고    scopus 로고
    • Confidentiality and integrity for data aggregation in WSN using peer monitoring
    • R. Di Pietro, P. Michiardi, and R. Molva, "Confidentiality and integrity for data aggregation in WSN using peer monitoring," Secur. Commun. Netw., vol. 2, no. 2, pp. 181-194, 2009.
    • (2009) Secur. Commun. Netw. , vol.2 , Issue.2 , pp. 181-194
    • Di Pietro, R.1    Michiardi, P.2    Molva, R.3
  • 47
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • A. Perrig, et al., "SPINS: Security protocols for sensor networks," Wireless Netw., vol. 8, no. 5, pp. 521-534, 2002.
    • (2002) Wireless Netw. , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1
  • 48
    • 85047486986 scopus 로고    scopus 로고
    • A selective encryption scheme for protecting H. 264/AVC video in multimedia social network
    • F. Peng, X.-Q. Gong, M. Long, and X.-M. Sun, "A selective encryption scheme for protecting H. 264/AVC video in multimedia social network," Multimedia Tools Appl., pp. 1-19, 2016.
    • (2016) Multimedia Tools Appl , pp. 1-19
    • Peng, F.1    Gong, X.-Q.2    Long, M.3    Sun, X.-M.4
  • 49
    • 85108192267 scopus 로고    scopus 로고
    • A synchronized shared key generation method for maintaining end-to-end security of big data streams
    • D. Puthal, S. Nepal, R. Ranjan, and J. Chen, "A synchronized shared key generation method for maintaining end-to-end security of big data streams," in Proc. 50th Hawaii Int. Conf. Syst. Sci., 2017, pp. 6011-6020.
    • (2017) Proc. 50th Hawaii Int. Conf. Syst. Sci. , pp. 6011-6020
    • Puthal, D.1    Nepal, S.2    Ranjan, R.3    Chen, J.4
  • 50
    • 84883147431 scopus 로고    scopus 로고
    • Automatic optimization of stream programs via source program operator graph transformations
    • M. Dayarathna and T. Suzumura, "Automatic optimization of stream programs via source program operator graph transformations," Distrib. Parallel Databases, vol. 31, no. 4, pp. 543-599, 2013
    • (2013) Distrib. Parallel Databases , vol.31 , Issue.4 , pp. 543-599
    • Dayarathna, M.1    Suzumura, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.