Abstract
Internet of Things (IoT) becomes a key source to big sensing data streams. Big data streams become a key research issue to process in a resource-constrained IoT devices, but security concerns in big sensing data streams are still an open research problem. This paper presents an overview of the big data stream security classifications in the context of IoT infrastructure. The basics toward the cybersecurity threats and potential solution for big data stream environment are highlighted. Finally the paper classified the security threats based on CIA (confidentiality, integrity, and availability) triad classifications.
Similar content being viewed by others
References
Bella G, Paulson L (1998) Kerberos version IV: inductive analysis of the secrecy goals. In: Computer security – ESORICS 98, Louvain-la-Neuve, pp 361–375
Chen P, Wang X, Wu Y, Su J, Zhou H (2015) POSTER: iPKI: identity-based private key infrastructure for securing BGP protocol. In: 22nd ACM SIGSAC conference on computer and communications security, Colorado, pp 1632–1634
El-Sayed H, Sankar S, Prasad M, Puthal D, Gupta A, Mohanty M, Lin C (2017) Edge of things: the big picture on the integration of edge, IoT and the cloud in a distributed computing environment. IEEE Access 6:1706–1717
Fox G, Gadgil H, Pallickara S, Pierce M, Grossman R, Gu Y, Hanley D, Hong X (2004) High performance data streaming in service architecture. Technical report, Indiana University and University of Illinois at Chicago
Granjal J, Monteiro E, Sá Silva J (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17(3):1294–1312
Medaglia C, Serbanati A (2010) An overview of privacy and security issues in the internet of things. In: The internet of things. Springer, New York, pp 389–395
Nehme R, Lim H, Bertino E, Rundensteiner E (2009) StreamShield: a stream-centric approach towards security and privacy in data stream environments. In: ACM SIGMOD international conference on management of data, Rhode Island, pp 1027–1030
Puthal D, Nepal S, Ranjan R, Chen J (2015a) DPBSV- An efficient and secure scheme for big sensing data stream. In: 14th IEEE international conference on trust, security and privacy in computing and communications, Helsinki, pp 246–253
Puthal D, Nepal S, Ranjan R, Chen J (2015b) A dynamic key length based approach for real-time security verification of big sensing data stream. In: 16th international conference on web information system engineering, Miami, pp 93–108
Puthal D, Nepal S, Ranjan R, Chen J (2016a) Threats to networking cloud and edge datacenters in the Internet of Things. IEEE Cloud Computing 3(3):64–71
Puthal D, Nepal S, Ranjan R, Chen J (2016b) DLSeF: A dynamic key length based efficient real-time security verification model for big data stream. ACM Trans Embed Comput Syst 16(2):51
Puthal D, Mohanty S, Nanda P, Choppali U (2017a) Building security perimeters to protect network systems against cyber threats. IEEE Consum Electron Mag 6(4):24–27
Puthal D, Ranjan R, Nepal S, Chen J (2017b) IoT and Big Data: an architecture with data flow and security issues. In: Cloud infrastructures, services, and IoT systems for smart cities, Brindisi, pp 243–252
Puthal D, Nepal S, Ranjan R, Chen J (2017c) A dynamic prime number based efficient security mechanism for big sensing data streams. J Comput Syst Sci 83(1):22–42
Puthal D, Wu X, Nepal S, Ranjan R, Chen J (2017d, in press) SEEN: a selective encryption method to ensure confidentiality for big sensing data streams. IEEE Trans Big Data
Puthal D, Obaidat M, Nanda, P, Prasad M, Mohanty S, Zomaya A (2017e, in press) Secure and sustainable load balancing of edge datacenters in fog computing. IEEE Communs Mag
Sharma S, Puthal D, Tazeen S, Prasad M, Zomaya AY (2017) MSGR: a mode-switched grid-based sustainable routing protocol for wireless sensor networks. IEEE Access 5:19864–19875
Weber R (2010) Internet of things–new security and privacy challenges. Comput Law Secur Rev 26(1):23–30
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this entry
Cite this entry
Puthal, D., Ranjan, R., Chen, J. (2018). Big Data Stream Security Classification for IoT Applications. In: Sakr, S., Zomaya, A. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-63962-8_236-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-63962-8_236-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63962-8
Online ISBN: 978-3-319-63962-8
eBook Packages: Living Reference MathematicsReference Module Computer Science and Engineering