Skip to main content

Big Data Stream Security Classification for IoT Applications

  • Living reference work entry
  • First Online:
Encyclopedia of Big Data Technologies

Abstract

Internet of Things (IoT) becomes a key source to big sensing data streams. Big data streams become a key research issue to process in a resource-constrained IoT devices, but security concerns in big sensing data streams are still an open research problem. This paper presents an overview of the big data stream security classifications in the context of IoT infrastructure. The basics toward the cybersecurity threats and potential solution for big data stream environment are highlighted. Finally the paper classified the security threats based on CIA (confidentiality, integrity, and availability) triad classifications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  • Bella G, Paulson L (1998) Kerberos version IV: inductive analysis of the secrecy goals. In: Computer security – ESORICS 98, Louvain-la-Neuve, pp 361–375

    Chapter  Google Scholar 

  • Chen P, Wang X, Wu Y, Su J, Zhou H (2015) POSTER: iPKI: identity-based private key infrastructure for securing BGP protocol. In: 22nd ACM SIGSAC conference on computer and communications security, Colorado, pp 1632–1634

    Google Scholar 

  • El-Sayed H, Sankar S, Prasad M, Puthal D, Gupta A, Mohanty M, Lin C (2017) Edge of things: the big picture on the integration of edge, IoT and the cloud in a distributed computing environment. IEEE Access 6:1706–1717

    Article  Google Scholar 

  • Fox G, Gadgil H, Pallickara S, Pierce M, Grossman R, Gu Y, Hanley D, Hong X (2004) High performance data streaming in service architecture. Technical report, Indiana University and University of Illinois at Chicago

    Google Scholar 

  • Granjal J, Monteiro E, Sá Silva J (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17(3):1294–1312

    Article  Google Scholar 

  • Medaglia C, Serbanati A (2010) An overview of privacy and security issues in the internet of things. In: The internet of things. Springer, New York, pp 389–395

    Chapter  Google Scholar 

  • Nehme R, Lim H, Bertino E, Rundensteiner E (2009) StreamShield: a stream-centric approach towards security and privacy in data stream environments. In: ACM SIGMOD international conference on management of data, Rhode Island, pp 1027–1030

    Google Scholar 

  • Puthal D, Nepal S, Ranjan R, Chen J (2015a) DPBSV- An efficient and secure scheme for big sensing data stream. In: 14th IEEE international conference on trust, security and privacy in computing and communications, Helsinki, pp 246–253

    Google Scholar 

  • Puthal D, Nepal S, Ranjan R, Chen J (2015b) A dynamic key length based approach for real-time security verification of big sensing data stream. In: 16th international conference on web information system engineering, Miami, pp 93–108

    Google Scholar 

  • Puthal D, Nepal S, Ranjan R, Chen J (2016a) Threats to networking cloud and edge datacenters in the Internet of Things. IEEE Cloud Computing 3(3):64–71

    Article  Google Scholar 

  • Puthal D, Nepal S, Ranjan R, Chen J (2016b) DLSeF: A dynamic key length based efficient real-time security verification model for big data stream. ACM Trans Embed Comput Syst 16(2):51

    Article  Google Scholar 

  • Puthal D, Mohanty S, Nanda P, Choppali U (2017a) Building security perimeters to protect network systems against cyber threats. IEEE Consum Electron Mag 6(4):24–27

    Article  Google Scholar 

  • Puthal D, Ranjan R, Nepal S, Chen J (2017b) IoT and Big Data: an architecture with data flow and security issues. In: Cloud infrastructures, services, and IoT systems for smart cities, Brindisi, pp 243–252

    Google Scholar 

  • Puthal D, Nepal S, Ranjan R, Chen J (2017c) A dynamic prime number based efficient security mechanism for big sensing data streams. J Comput Syst Sci 83(1):22–42

    Article  MathSciNet  Google Scholar 

  • Puthal D, Wu X, Nepal S, Ranjan R, Chen J (2017d, in press) SEEN: a selective encryption method to ensure confidentiality for big sensing data streams. IEEE Trans Big Data

    Google Scholar 

  • Puthal D, Obaidat M, Nanda, P, Prasad M, Mohanty S, Zomaya A (2017e, in press) Secure and sustainable load balancing of edge datacenters in fog computing. IEEE Communs Mag

    Google Scholar 

  • Sharma S, Puthal D, Tazeen S, Prasad M, Zomaya AY (2017) MSGR: a mode-switched grid-based sustainable routing protocol for wireless sensor networks. IEEE Access 5:19864–19875

    Article  Google Scholar 

  • Weber R (2010) Internet of things–new security and privacy challenges. Comput Law Secur Rev 26(1):23–30

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepak Puthal .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Puthal, D., Ranjan, R., Chen, J. (2018). Big Data Stream Security Classification for IoT Applications. In: Sakr, S., Zomaya, A. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-63962-8_236-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63962-8_236-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63962-8

  • Online ISBN: 978-3-319-63962-8

  • eBook Packages: Living Reference MathematicsReference Module Computer Science and Engineering

Publish with us

Policies and ethics