Skip to main content
Taylor & Francis Group Logo
Advanced Search

Click here to search books using title name,author name and keywords.

  • Login
  • Hi, User  
    • Your Account
    • Logout
Advanced Search

Click here to search books using title name,author name and keywords.

Breadcrumbs Section. Click here to navigate to respective pages.

Chapter

End-to-End Security Framework for Big Sensing Data Streams

Chapter

End-to-End Security Framework for Big Sensing Data Streams

DOI link for End-to-End Security Framework for Big Sensing Data Streams

End-to-End Security Framework for Big Sensing Data Streams book

End-to-End Security Framework for Big Sensing Data Streams

DOI link for End-to-End Security Framework for Big Sensing Data Streams

End-to-End Security Framework for Big Sensing Data Streams book

ByDeepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen
BookBig Data Management and Processing

Click here to navigate to parent product.

Edition 1st Edition
First Published 2017
Imprint Chapman and Hall/CRC
Pages 16
eBook ISBN 9781315154008

ABSTRACT

Big data streaming has become an important paradigm for real-time processing of massive continuous data flows in large-scale sensing networks. While dealing with big sensing data streams from Internet of Things (IoT), a data stream manager (DSM) must always verify the authenticity, integrity, and confidentiality of the data to ensure end-to-end security as the medium of communication is wireless and untrusted. Malicious attackers could access and modify the data at any time/place from source to cloud data center. Existing technologies for data security verification are not suitable for data-streaming applications, as the verification should be performed in real time and which introduces a delay in the data stream. In this chapter, we will propose a Dynamic Prime-Number-Based Security Verification (DPBSV) framework for big data streams. Our framework is based on 264a common shared key that is updated dynamically by generating synchronized prime numbers. The common shared key updates at both ends, that is, source-sensing devices and DSM, without further communication after handshaking. Theoretical analyses and experimental results of our DPBSV framework show that it can significantly improve the efficiency of the verification process by reducing the time and utilizing a smaller buffer size in DSM. We have experimented the proposed scheme in a simulated environment and demonstrated the feasibility of the approach. We observed that the proposed scheme not only reduces the verification time or buffer size in DSM, but also strengthens the security of the data by constantly changing the shared keys.

T&F logoTaylor & Francis Group logo
  • Policies
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
  • Journals
    • Taylor & Francis Online
    • CogentOA
    • Taylor & Francis Online
    • CogentOA
  • Corporate
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
  • Help & Contact
    • Students/Researchers
    • Librarians/Institutions
    • Students/Researchers
    • Librarians/Institutions
  • Connect with us

Connect with us

Registered in England & Wales No. 3099067
5 Howick Place | London | SW1P 1WG © 2021 Informa UK Limited