DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream

Stream processing has become an important paradigm for the massive real-time processing of continuous data flows in large scale sensor networks. While dealing with big data streams in sensor networks, Stream Processing Engines (SPEs) must always verify the authenticity, and integrity of the data as the medium of communication is untrusted, as malicious attackers could access and modify the data. Existing technologies for data security verification are not suitable for data streaming applications, as the verification in real time introduces significant overheads. In this paper, we propose a Dynamic Prime Number Based Security Verification (DPBSV) scheme for big data stream processing. Our scheme is based on a common shared key that is updated dynamically by generating synchronized pairs of prime numbers. Theoretical analyses and experimental results of our DPBSV scheme show that it can significantly improve the efficiency as compared to existing approaches by reducing the security verification overhead. Our approach not only reduces the verification time, but also strengthens the security of the data by constantly updating the shared keys.

[1]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[2]  Samih Abdul-Nabi,et al.  On Formula to Compute Primes and the n th Prime , 2012 .

[3]  James M. Tien,et al.  Big Data: Unleashing information , 2013, 2013 10th International Conference on Service Systems and Service Management.

[4]  Ki-Woong Park,et al.  Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices , 2008, IEEE Transactions on Computers.

[5]  Rajiv Ranjan,et al.  Streaming Big Data Processing in Datacenter Clouds , 2014, IEEE Cloud Computing.

[6]  Elisa Bertino,et al.  StreamShield: a stream-centric approach towards security and privacy in data stream environments , 2009, SIGMOD Conference.

[7]  Michael Stonebraker,et al.  The 8 requirements of real-time stream processing , 2005, SGMD.

[8]  B. P. S. Sahoo,et al.  Cloud Computing Features, Issues, and Challenges: A Big Picture , 2015, 2015 International Conference on Computational Intelligence and Networks.

[9]  Jianguo Lu,et al.  Bias Correction in a Small Sample from Big Data , 2013, IEEE Transactions on Knowledge and Data Engineering.

[10]  I. Akyildiz WIRELESS MULTIMEDIA SENSOR NETWORKS : A SURVEY The uthors discusse , 2022 .

[11]  Jinjun Chen,et al.  CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing , 2013, Future Gener. Comput. Syst..

[12]  Frederick Reiss,et al.  TelegraphCQ: continuous dataflow processing , 2003, SIGMOD '03.

[13]  Toyotaro Suzumura,et al.  Automatic optimization of stream programs via source program operator graph transformations , 2013, Distributed and Parallel Databases.

[14]  Deepak Puthal Secure Data Collection and Critical Data Transmission Technique in Mobile Sink Wireless Sensor Networks , 2012 .

[15]  Albert Bifet,et al.  Mining Big Data in Real Time , 2013, Informatica.

[16]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[17]  Michael Stonebraker,et al.  Monitoring Streams - A New Class of Data Management Applications , 2002, VLDB.

[18]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[19]  John Zic,et al.  A mobile and portable trusted computing platform , 2011, EURASIP J. Wirel. Commun. Netw..

[20]  Dursun Delen,et al.  Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud , 2013, Decis. Support Syst..

[21]  Claudio Soriente,et al.  StreamCloud: An Elastic and Scalable Data Streaming System , 2012, IEEE Transactions on Parallel and Distributed Systems.

[22]  Todd M. Austin,et al.  Architectural support for fast symmetric-key cryptography , 2000, SIGP.

[23]  Marco Pistoia,et al.  Enterprise Java 2 Security: Building Secure and Robust J2EE Applications , 2004 .

[24]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[25]  Deepak Puthal,et al.  Secure Data Collection & Critical Data Transmission in Mobile Sink WSN: Secure and Energy efficient data collection technique , 2012 .