Abstract
The near real-time processing of continuous data flows in large scale sensor networks has many applications in risk-critical domains ranging from emergency management to industrial control systems. The problem is how to ensure end-to-end security (e.g., integrity, and authenticity) of such data stream for risk-critical applications. We refer this as an online security verification problem. Existing security techniques cannot deal with this problem because they were not designed to deal with high volume, high velocity data in real-time. Furthermore, they are inefficient as they introduce a significant buffering delay during security verification, resulting in a requirement of large buffer size for the stream processing server. To address this problem, we propose a Dynamic Key Length Based Security Framework (DLSeF) based on the shared key derived from synchronized prime numbers; the key is dynamically updated in short intervals to thwart Man in the Middle and other Network attacks. Theoretical analyses and experimental results of DLSeF framework show that it can significantly improve the efficiency of processing stream data by reducing the security verification time without compromising the security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Stonebraker, M., Çetintemel, U., Zdonik, S.: The 8 requirements of real-time stream processing. ACM SIGMOD Rec. 34(4), 42–47 (2005)
Bifet, A.: Mining big data in real time. Informatica (Slovenia) 37(1), 15–20 (2013)
Dayarathna, M., Suzumura, T.: Automatic optimization of stream programs via source program operator graph transformations. Distrib. Parallel Databases 31(4), 543–599 (2013)
Ranjan, R.: Streaming big data processing in datacenter clouds. IEEE Cloud Comput. 1(1), 78–83 (2014)
Tien, J.M.: Big data: unleashing information. J. Syst. Sci. Syst. Eng. 22(2), 127–151 (2013)
Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., Byers, A.: Big data: the next frontier for innovation, competition, and productivity (2011)
Nehme, R.V., Lim, H.S., Bertino, E.: FENCE: continuous access control enforcement in dynamic data stream environments. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 243–254 (2013)
Cao, J., Kister, T., Xiang, S., Malhotra, B., Tan, W.-J., Tan, K.-L., Bressan, S.: ASSIST: access controlled ship identification streams. In: Hameurlain, A., Küng, J., Wagner, R., Amann, B., Lamarre, P. (eds.) TLDKS XI. LNCS, vol. 8290, pp. 1–25. Springer, Heidelberg (2013)
Puthal, D.: Secure data collection and critical data transmission technique in mobile sink wireless sensor networks. M. Tech thesis, National Institute of Technology, Rourkela (2012)
Bahrami, M., Singhal, M.: The role of cloud computing architecture in big data. In: pedrycz, W., Chen, S.-M. (eds.) Information Granularity, Big Data, and Computational Intelligence, pp. 275–295. Springer, Switzerland (2015)
McAfee, A., Brynjolfsson, E.: Big data: the management revolution. Harvard Bus. Rev. 90, 59–69 (2012)
Puthal, D., Sahoo, B.: Secure Data Collection and Critical Data Transmission in Mobile Sink WSN: Secure and Energy Efficient Data Collection Technique. LAP Lambert Academic Publishing, Germany (2012)
Deshpande, A., Ives, Z., Raman, V.: Adaptive query processing. Found. Trends Databases 1(1), 1–140 (2007)
Sutherland, T.M., Liu, B., Jbantova, M., Rundensteiner, E.A.: D-cape: distributed and self-tuned continuous query processing. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management, pp. 217–218. ACM (2005)
Burke, J., McDonald, J., Austin, T.: Architectural support for fast symmetric-key cryptography. ACM SIGOPS Operating Syst. Rev. 34(5), 178–189 (2000)
www.cloudflare.com. Accessed 04 August 2014
Nehme, R.V., Lim, H.S., Bertino, E., Rundensteiner, E.A.: StreamShield: a stream-centric approach towards security and privacy in data stream environments. In: Proceedings of the ACM SIGMOD International Conference on Management of data, pp. 1027–1030. ACM (2009)
Park, K.W., Lim, S.S., Park, K.H.: Computationally efficient PKI-based single sign-on protocol, PKASSO for mobile devices. IEEE Trans. Comput. 57(6), 821–834 (2008)
Puthal, D., Sahoo, B.P.S., Mishra, S., Swain, S.: Cloud computing features, issues, and challenges: a big picture. In: International Conference on Computational Intelligence and Networks (CINE), pp. 116–123. IEEE (2015)
Pub, N.F.: 197: advanced encryption standard (AES). Fed. Inf. Process. Stand. Publ. 197, 441-0311 (2001)
Heron, S.: Advanced encryption standard (AES). Netw. Secur. 2009(12), 8–12 (2009)
Pistoia, M., Nagaratnam, N., Koved, L., Nadalin, A.: Enterprise Java 2 Security: Building Secure and Robust J2EE Applications. Addison Wesley Longman Publishing, Inc., Chicago (2004)
Kaddoura, I., Abdul-Nabi, S.: On formula to compute primes and the nth prime. Appl. Math. Sci. 6(76), 3751–3757 (2012)
Nepal, S., Zic, J., Liu, D., Jang, J.: A mobile and portable trusted computing platform. EURASIP J. Wirel. Commun. Netw. 2011(1), 1–19 (2011)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)
Liu, C., Zhang, X., Yang, C., Chen, J.: CCBKE—session key negotiation for fast and secure scheduling of scientific applications in cloud computing. Future Gener. Comput. Syst. 29(5), 1300–1308 (2013)
Akkaya, K., Younis, M.: An energy-aware QoS routing protocol for wireless sensor networks. In: 23rd International Conference on Distributed Computing Systems, pp. 710–715 (2003)
Acknowledgment
This research is funded by Australia India Strategic Research Grant titled “Innovative Solutions for Big Data and Disaster Management Applications on Clouds (AISRF - 08140)” from the Department of Industry, Australia.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Puthal, D., Nepal, S., Ranjan, R., Chen, J. (2015). A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream. In: Wang, J., et al. Web Information Systems Engineering – WISE 2015. WISE 2015. Lecture Notes in Computer Science(), vol 9419. Springer, Cham. https://doi.org/10.1007/978-3-319-26187-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-26187-4_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26186-7
Online ISBN: 978-3-319-26187-4
eBook Packages: Computer ScienceComputer Science (R0)