Affiliation:
1. Department of Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany
2. QSC AG, Cologne, Germany
Abstract
Clouds provide a platform for efficiently and flexibly aggregating, storing, and processing large amounts of data. Eventually, sensor networks will automatically collect such data. A particular challenge regarding sensor data in Clouds is the inherent sensitive nature of sensed information. For current Cloud platforms, the data owner loses control over her sensor data once it enters the Cloud. This imposes a major adoption barrier for bridging Cloud computing and sensor networks, which we address henceforth. After analyzing threats to sensor data in Clouds, the authors propose a Cloud architecture that enables end-to-end control over sensitive sensor data by the data owner. The authors introduce a well-defined entry point from the sensor network into the Cloud, which enforces end-to-end data protection, applies encryption and integrity protection, and grants data access. Additionally, the authors enforce strict isolation of services. The authors show the feasibility and scalability of their Cloud architecture using a prototype and measurements.
Subject
Computer Networks and Communications
Reference34 articles.
1. A survey on sensor networks
2. Amazon Web Services. (2013). Amazon EC2 instance types. Retrieved April 10, 2013, from http://aws.amazon.com/en/ec2/instance-types/
3. Barker, E., Barker, W., Burr, W., Polk, W., & Smid M. (2012). Recommendation for key management – Part 1: General (Revision 3). National Institute of Standards and Technology, NIST Special Publication 800-57.
4. Digital Rights Management
5. Boneh, D., & Waters, B. (2007). Conjunctive, subset, and range queries on encrypted data. In Proceedings 4th Theory of Cryptography Conference (TCC 2007).
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献