Skip to main content

A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream

  • Conference paper
  • First Online:
Book cover Web Information Systems Engineering – WISE 2015 (WISE 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9419))

Included in the following conference series:

Abstract

The near real-time processing of continuous data flows in large scale sensor networks has many applications in risk-critical domains ranging from emergency management to industrial control systems. The problem is how to ensure end-to-end security (e.g., integrity, and authenticity) of such data stream for risk-critical applications. We refer this as an online security verification problem. Existing security techniques cannot deal with this problem because they were not designed to deal with high volume, high velocity data in real-time. Furthermore, they are inefficient as they introduce a significant buffering delay during security verification, resulting in a requirement of large buffer size for the stream processing server. To address this problem, we propose a Dynamic Key Length Based Security Framework (DLSeF) based on the shared key derived from synchronized prime numbers; the key is dynamically updated in short intervals to thwart Man in the Middle and other Network attacks. Theoretical analyses and experimental results of DLSeF framework show that it can significantly improve the efficiency of processing stream data by reducing the security verification time without compromising the security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stonebraker, M., Çetintemel, U., Zdonik, S.: The 8 requirements of real-time stream processing. ACM SIGMOD Rec. 34(4), 42–47 (2005)

    Article  Google Scholar 

  2. Bifet, A.: Mining big data in real time. Informatica (Slovenia) 37(1), 15–20 (2013)

    Google Scholar 

  3. Dayarathna, M., Suzumura, T.: Automatic optimization of stream programs via source program operator graph transformations. Distrib. Parallel Databases 31(4), 543–599 (2013)

    Article  Google Scholar 

  4. Ranjan, R.: Streaming big data processing in datacenter clouds. IEEE Cloud Comput. 1(1), 78–83 (2014)

    Article  MathSciNet  Google Scholar 

  5. Tien, J.M.: Big data: unleashing information. J. Syst. Sci. Syst. Eng. 22(2), 127–151 (2013)

    Article  MathSciNet  Google Scholar 

  6. Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., Byers, A.: Big data: the next frontier for innovation, competition, and productivity (2011)

    Google Scholar 

  7. Nehme, R.V., Lim, H.S., Bertino, E.: FENCE: continuous access control enforcement in dynamic data stream environments. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 243–254 (2013)

    Google Scholar 

  8. Cao, J., Kister, T., Xiang, S., Malhotra, B., Tan, W.-J., Tan, K.-L., Bressan, S.: ASSIST: access controlled ship identification streams. In: Hameurlain, A., Küng, J., Wagner, R., Amann, B., Lamarre, P. (eds.) TLDKS XI. LNCS, vol. 8290, pp. 1–25. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  9. Puthal, D.: Secure data collection and critical data transmission technique in mobile sink wireless sensor networks. M. Tech thesis, National Institute of Technology, Rourkela (2012)

    Google Scholar 

  10. Bahrami, M., Singhal, M.: The role of cloud computing architecture in big data. In: pedrycz, W., Chen, S.-M. (eds.) Information Granularity, Big Data, and Computational Intelligence, pp. 275–295. Springer, Switzerland (2015)

    Google Scholar 

  11. McAfee, A., Brynjolfsson, E.: Big data: the management revolution. Harvard Bus. Rev. 90, 59–69 (2012)

    Google Scholar 

  12. Puthal, D., Sahoo, B.: Secure Data Collection and Critical Data Transmission in Mobile Sink WSN: Secure and Energy Efficient Data Collection Technique. LAP Lambert Academic Publishing, Germany (2012)

    Google Scholar 

  13. Deshpande, A., Ives, Z., Raman, V.: Adaptive query processing. Found. Trends Databases 1(1), 1–140 (2007)

    Article  MATH  Google Scholar 

  14. Sutherland, T.M., Liu, B., Jbantova, M., Rundensteiner, E.A.: D-cape: distributed and self-tuned continuous query processing. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management, pp. 217–218. ACM (2005)

    Google Scholar 

  15. Burke, J., McDonald, J., Austin, T.: Architectural support for fast symmetric-key cryptography. ACM SIGOPS Operating Syst. Rev. 34(5), 178–189 (2000)

    Article  Google Scholar 

  16. www.cloudflare.com. Accessed 04 August 2014

  17. Nehme, R.V., Lim, H.S., Bertino, E., Rundensteiner, E.A.: StreamShield: a stream-centric approach towards security and privacy in data stream environments. In: Proceedings of the ACM SIGMOD International Conference on Management of data, pp. 1027–1030. ACM (2009)

    Google Scholar 

  18. Park, K.W., Lim, S.S., Park, K.H.: Computationally efficient PKI-based single sign-on protocol, PKASSO for mobile devices. IEEE Trans. Comput. 57(6), 821–834 (2008)

    Article  MathSciNet  Google Scholar 

  19. Puthal, D., Sahoo, B.P.S., Mishra, S., Swain, S.: Cloud computing features, issues, and challenges: a big picture. In: International Conference on Computational Intelligence and Networks (CINE), pp. 116–123. IEEE (2015)

    Google Scholar 

  20. Pub, N.F.: 197: advanced encryption standard (AES). Fed. Inf. Process. Stand. Publ. 197, 441-0311 (2001)

    Google Scholar 

  21. Heron, S.: Advanced encryption standard (AES). Netw. Secur. 2009(12), 8–12 (2009)

    Article  Google Scholar 

  22. Scyther. http://www.cs.ox.ac.uk/people/cas.cremers/scyther/

  23. Pistoia, M., Nagaratnam, N., Koved, L., Nadalin, A.: Enterprise Java 2 Security: Building Secure and Robust J2EE Applications. Addison Wesley Longman Publishing, Inc., Chicago (2004)

    Google Scholar 

  24. Kaddoura, I., Abdul-Nabi, S.: On formula to compute primes and the nth prime. Appl. Math. Sci. 6(76), 3751–3757 (2012)

    MATH  Google Scholar 

  25. Nepal, S., Zic, J., Liu, D., Jang, J.: A mobile and portable trusted computing platform. EURASIP J. Wirel. Commun. Netw. 2011(1), 1–19 (2011)

    Google Scholar 

  26. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

  27. Liu, C., Zhang, X., Yang, C., Chen, J.: CCBKE—session key negotiation for fast and secure scheduling of scientific applications in cloud computing. Future Gener. Comput. Syst. 29(5), 1300–1308 (2013)

    Article  Google Scholar 

  28. Akkaya, K., Younis, M.: An energy-aware QoS routing protocol for wireless sensor networks. In: 23rd International Conference on Distributed Computing Systems, pp. 710–715 (2003)

    Google Scholar 

Download references

Acknowledgment

This research is funded by Australia India Strategic Research Grant titled “Innovative Solutions for Big Data and Disaster Management Applications on Clouds (AISRF - 08140)” from the Department of Industry, Australia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepak Puthal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Puthal, D., Nepal, S., Ranjan, R., Chen, J. (2015). A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream. In: Wang, J., et al. Web Information Systems Engineering – WISE 2015. WISE 2015. Lecture Notes in Computer Science(), vol 9419. Springer, Cham. https://doi.org/10.1007/978-3-319-26187-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26187-4_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26186-7

  • Online ISBN: 978-3-319-26187-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics