Please use this identifier to cite or link to this item:

A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams

File SizeFormat 
paper0740.pdf1.74 MBAdobe PDFView/Open

Item Summary

Title: A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams
Authors: Puthal, Deepak
Nepal, Surya
Ranjan, Rajiv
Chen, Jinjun
Keywords: Big Data Streams
End-to-End Security
Key synchronization
Issue Date: 04 Jan 2017
Abstract: A large number of mission critical applications ranging from disaster management to smart city are built on the Internet of Things (IoT) platform by deploying a number of smart sensors in a heterogeneous environment. The key requirements of such applications are the need of near real-time stream data processing in large scale sensing networks. This trend gives birth of an area called big data stream. One of the key problems in big data stream is to ensure the end-to-end security. To address this challenge, we proposed Dynamic Prime Number Based Security Verification (DPBSV) and Dynamic Key Length Based Security Framework (DLSeF) methods for big data streams based on the shared key derived from synchronized prime numbers in our earlier works. One of the major shortcomings of these methods is that they assume synchronization of the shared key. However, the assumption does not hold when the communication between Data Stream Manager (DSM) and sensing devices is broken. To address this problem, this paper proposes an adaptive technique to synchronize the shared key without communication between sensing devices and DSM, where sensing devices obtain the shared key re-initialization properties from its neighbours. Theoretical analyses and experimental results show that the proposed technique can be integrated with our DPBSV and DLSeF methods without degrading the performance and efficiency. We observed that the proposed synchronization method also strengthens the security of the models.
Pages/Duration: 10 pages
ISBN: 978-0-9981331-0-2
DOI: 10.24251/HICSS.2017.719
Rights: Attribution-NonCommercial-NoDerivatives 4.0 International
Appears in Collections:Cyber-of-Things: Cyber-Crimes and Cyber-Security Minitrack

Please contact if you need this content in an alternative format.

Items in ScholarSpace are protected by copyright, with all rights reserved, unless otherwise indicated.