메뉴 건너뛰기




Volumn 2017-January, Issue , 2017, Pages 6011-6020

A synchronized shared key generation method for maintaining end-to-end security of big data streams

Author keywords

[No Author keywords available]

Indexed keywords

BIG DATA; DISASTER PREVENTION; DISASTERS; INTERNET OF THINGS; SYNCHRONIZATION;

EID: 85108192267     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (18)

References (27)
  • 1
    • 31444440239 scopus 로고    scopus 로고
    • The 8 requirements of real-time stream processing
    • M. Stonebraker, U. Çetintemel, and S. Zdonik. "The 8 requirements of real-time stream processing." ACM SIGMOD Record, 34(4), 2005, pp. 42-47.
    • (2005) ACM SIGMOD Record , vol.34 , Issue.4 , pp. 42-47
    • Stonebraker, M.1    Çetintemel, U.2    Zdonik, S.3
  • 2
    • 70849105916 scopus 로고    scopus 로고
    • StreamShield: A stream-centric approach towards security and privacy in data stream environments
    • R. Nehme, et al. "StreamShield: a stream-centric approach towards security and privacy in data stream environments." In Proc. of ACM SIGMOD International Conference on Management of data, 2009, pp. 1027-1030.
    • (2009) Proc. Of ACM SIGMOD International Conference on Management of Data , pp. 1027-1030
    • Nehme, R.1
  • 3
    • 84869444719 scopus 로고    scopus 로고
    • Streamcloud: An elastic and scalable data streaming system
    • V. Gulisano, et al. "Streamcloud: An elastic and scalable data streaming system." IEEE Transactions on Parallel and Distributed Systems, 23(12), 2012, pp. 2351-2365.
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , Issue.12 , pp. 2351-2365
    • Gulisano, V.1
  • 5
    • 85108204238 scopus 로고    scopus 로고
    • Online
    • Scyther,[Online] http://www.cs.ox.ac.uk/people/cas.cremers/scyther/
  • 7
    • 85108220214 scopus 로고    scopus 로고
    • accessed on: 04.08.2015
    • Contiki OS: http://www.contiki-os.org/ (accessed on: 04.08.2015).
  • 8
    • 84907227275 scopus 로고    scopus 로고
    • ID-based sensor node authentication for multi-layer sensor networks
    • S. Sung, and J. Ryou. "ID-based sensor node authentication for multi-layer sensor networks." Journal of Communications and Networks, 16(4), 2014, pp. 363-370.
    • (2014) Journal of Communications and Networks , vol.16 , Issue.4 , pp. 363-370
    • Sung, S.1    Ryou, J.2
  • 9
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • H. Yeh, et al. "A secured authentication protocol for wireless sensor networks using elliptic curves cryptography." Sensors 11(5), 2011, pp. 4767-4779.
    • (2011) Sensors , vol.11 , Issue.5 , pp. 4767-4779
    • Yeh, H.1
  • 10
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks
    • M. Khan, and K. Alghathbar. "Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'." Sensors 10(3), 2010, pp. 2450-2459.
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.1    Alghathbar, K.2
  • 11
    • 84967144040 scopus 로고    scopus 로고
    • DPBSV-an efficient and secure scheme for big sensing data stream
    • D. Puthal, et al. "DPBSV-An Efficient and Secure Scheme for Big Sensing Data Stream." In Proc. of Trustcom/BigDataSE/ISPA, vol. 1, pp. 246-253. IEEE, 2015.
    • (2015) Proc. Of Trustcom/BigDataSE/ISPA , vol.1 , pp. 246-253
    • Puthal, D.1
  • 12
    • 84962052195 scopus 로고    scopus 로고
    • A dynamic prime number based efficient security mechanism for big sensing data streams
    • D. Puthal, et al. "A Dynamic Prime Number Based Efficient Security Mechanism for Big Sensing Data Streams." Journal of Computer and System Sciences 83(1), 2017, pp. 22-42.
    • (2017) Journal of Computer and System Sciences , vol.83 , Issue.1 , pp. 22-42
    • Puthal, D.1
  • 14
    • 85008884270 scopus 로고    scopus 로고
    • DLSEf: A dynamic key length based efficient real-time security verification model for big data stream
    • D. Puthal, et al. " DLSeF: A Dynamic Key Length based Efficient Real-Time Security Verification Model for Big Data Stream." In ACM Transactions on Embedded Computing Systems (TECS), 2016.
    • (2016) ACM Transactions on Embedded Computing Systems (TECS)
    • Puthal, D.1
  • 17
    • 84969917052 scopus 로고    scopus 로고
    • Building sensor-based big data cyberinfrastructures
    • E. Bertino, S. Nepal, and R. Ranjan. "Building Sensor-Based Big Data Cyberinfrastructures." IEEE Cloud Computing 2(5), 2015, pp. 64-69.
    • (2015) IEEE Cloud Computing , vol.2 , Issue.5 , pp. 64-69
    • Bertino, E.1    Nepal, S.2    Ranjan, R.3
  • 18
    • 84961627543 scopus 로고    scopus 로고
    • Streaming big data processing in datacenter clouds
    • R. Ranjan. "Streaming big data processing in datacenter clouds." IEEE Cloud Computing 1(1), 2014, pp. 78-83.
    • (2014) IEEE Cloud Computing , vol.1 , Issue.1 , pp. 78-83
    • Ranjan, R.1
  • 20
    • 0003508558 scopus 로고    scopus 로고
    • PUB, NIST FIPS Federal Information Processing Standards Publication 441-0311
    • PUB, NIST FIPS. "197: Advanced encryption standard (AES)." Federal Information Processing Standards Publication 197, 2001, pp. 441-0311.
    • (2001) 197: Advanced Encryption Standard (AES) , vol.197
  • 21
    • 73649145526 scopus 로고    scopus 로고
    • Advanced encryption standard (AES)
    • S. Heron. "Advanced Encryption Standard (AES)." Network Security 2009(12), 2009, pp. 8-12.
    • (2009) Network Security , vol.2009 , Issue.12 , pp. 8-12
    • Heron, S.1
  • 22
    • 85108215973 scopus 로고    scopus 로고
    • accessed on: 04.08.2015
    • www.cloudflare.com (accessed on: 04.08.2015).
  • 26
    • 85010036045 scopus 로고    scopus 로고
    • A Sybil attack detection scheme for a forest wildfire monitoring application
    • MA Jan, et al. "A Sybil attack detection scheme for a forest wildfire monitoring application." In Future Generation Computer Systems, 2016.
    • (2016) Future Generation Computer Systems
    • Jan, M.A.1
  • 27
    • 84978224275 scopus 로고    scopus 로고
    • Threats to networking cloud and edge datacenters in the internet of things
    • D. Puthal, et al. "Threats to Networking Cloud and Edge Datacenters in the Internet of Things." IEEE Cloud Computing 3(3), 2016, pp. 64-71.
    • (2016) IEEE Cloud Computing , vol.3 , Issue.3 , pp. 64-71
    • Puthal, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.