Integration of Wireless Sensor Network and Cloud Computing Using Trust and Reputation Technique

Cloud computing is a web-based computing where in the services based on Internet such as data, storage, and computing resources are delivered to the local devices through Internet. Meanwhile, wireless sensor network deals with monitoring and gathering of the information about the physical or environmental conditions. The integration of these two domains has tremendous advantages to improve the business infrastructure and performance over worldwide. The security of data on the cloud and calculation of trust and reputation of the cloud service providers (CSP) and sensor network providers (SNP) are the issues for this new paradigm. To fulfill these issues paper presents novel techniques 1) trust and reputation calculation 2) providing data security on cloud 3) choosing desirable CSP and SNP for the service. This paper proposes data security by taking into account the service of wireless sensor network (WSN) and cloud service providers. Our experimental results help users to choose the best service providers in case of both cloud and wireless sensor network. A better security for the data in the cloud is provided using trust and reputation calculation.

[1]  Yan Sun,et al.  Security of Online Reputation Systems: The evolution of attacks and defenses , 2012, IEEE Signal Process. Mag..

[2]  Slawomir Grzonkowski,et al.  Sharing cloud services: user authentication for social enhancement of home networking , 2011, IEEE Transactions on Consumer Electronics.

[3]  R. S. Ponmagal,et al.  Integration of Wireless Sensor Network with Cloud , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[4]  Chih-Yuan Huang,et al.  Authentication using graphical password in cloud , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.

[5]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[6]  Kakali Chatterjee,et al.  A multi-dimensional trust and reputation calculation model for cloud computing environments , 2017, 2017 ISEA Asia Security and Privacy (ISEASP).

[7]  Chunyan Miao,et al.  Towards a trust aware cognitive radio architecture , 2009, MOCO.

[8]  Madoka Yuriyama,et al.  Sensor-Cloud Infrastructure - Physical Sensor Management with Virtualized Sensors on Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.

[9]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[10]  Victor C. M. Leung,et al.  An evaluation of user importance when integrating social networks and mobile cloud computing , 2014, 2014 IEEE Global Communications Conference.

[11]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[12]  Hyotaek Lim,et al.  A Strong User Authentication Framework for Cloud Computing , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.

[13]  H. A. Dinesha,et al.  Multi-dimensional password generation technique for accessing cloud services , 2012, CloudCom 2012.

[14]  Mukaddim Pathan,et al.  BodyCloud: Integration of Cloud Computing and body sensor networks , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[15]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[16]  Sushmita Ruj,et al.  Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2014, IEEE Transactions on Parallel and Distributed Systems.

[17]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[18]  Victor C. M. Leung,et al.  An Authenticated Trust and Reputation Calculation , 2017 .

[19]  Chunyan Miao,et al.  A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.