Reference Hub16
Maintaining User Control While Storing and Processing Sensor Data in the Cloud

Maintaining User Control While Storing and Processing Sensor Data in the Cloud

Martin Henze, René Hummen, Roman Matzutt, Daniel Catrein, Klaus Wehrle
Copyright: © 2013 |Volume: 5 |Issue: 4 |Pages: 16
ISSN: 1938-0259|EISSN: 1938-0267|EISBN13: 9781466635715|DOI: 10.4018/ijghpc.2013100107
Cite Article Cite Article

MLA

Henze, Martin, et al. "Maintaining User Control While Storing and Processing Sensor Data in the Cloud." IJGHPC vol.5, no.4 2013: pp.97-112. http://doi.org/10.4018/ijghpc.2013100107

APA

Henze, M., Hummen, R., Matzutt, R., Catrein, D., & Wehrle, K. (2013). Maintaining User Control While Storing and Processing Sensor Data in the Cloud. International Journal of Grid and High Performance Computing (IJGHPC), 5(4), 97-112. http://doi.org/10.4018/ijghpc.2013100107

Chicago

Henze, Martin, et al. "Maintaining User Control While Storing and Processing Sensor Data in the Cloud," International Journal of Grid and High Performance Computing (IJGHPC) 5, no.4: 97-112. http://doi.org/10.4018/ijghpc.2013100107

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Clouds provide a platform for efficiently and flexibly aggregating, storing, and processing large amounts of data. Eventually, sensor networks will automatically collect such data. A particular challenge regarding sensor data in Clouds is the inherent sensitive nature of sensed information. For current Cloud platforms, the data owner loses control over her sensor data once it enters the Cloud. This imposes a major adoption barrier for bridging Cloud computing and sensor networks, which we address henceforth. After analyzing threats to sensor data in Clouds, the authors propose a Cloud architecture that enables end-to-end control over sensitive sensor data by the data owner. The authors introduce a well-defined entry point from the sensor network into the Cloud, which enforces end-to-end data protection, applies encryption and integrity protection, and grants data access. Additionally, the authors enforce strict isolation of services. The authors show the feasibility and scalability of their Cloud architecture using a prototype and measurements.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.