Skip to content
Scan a barcode
Scan
Added to your cart
Paperback Secure Sensor Cloud Book

ISBN: 3031003993

ISBN13: 9783031003998

Secure Sensor Cloud

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Good

$14.29
Save $18.66!
List Price $32.95
Almost Gone, Only 1 Left!

You Might Also Enjoy

Development as Freedom
Development as Freedom
Amartya Sen

from: $4.99

The Argumentative Indian: Writings on Indian History, Culture and Identity
The Argumentative Indian: Writings on Indian History, Culture and Identity
Amartya Sen

from: $5.39

Identity and Violence: The Illusion of Destiny
Identity and Violence: The Illusion of Destiny
Amartya Sen

from: $5.09

The End of Poverty: Economic Possibilities for Our Time
The End of Poverty: Economic Possibilities for Our Time
Jeffrey D. Sachs

from: $4.89

The White Man's Burden: Why the West's Efforts to Aid the Rest Have Done So Much Ill and So Little Good
The White Man's Burden: Why the West's Efforts to Aid the Rest Have Done So Much Ill and So Little Good
William Easterly, William Russell Easterly

from: $4.39

The Bottom Billion: Why the Poorest Countries are Failing and What Can Be Done About It
The Bottom Billion: Why the Poorest Countries are Failing and What Can Be Done About It
Paul Collier

from: $5.09

The Idea of Justice
The Idea of Justice
Amartya Sen

from: $11.19

Poor Economics : A Radical Rethinking of the Way to Fight Global Poverty
Poor Economics : A Radical Rethinking of the Way to Fight Global Poverty
Esther Duflo, Abhijit V. Banerjee

from: $5.39

Dead Aid: Why Aid Is Not Working and How There Is a Better Way for Africa
Dead Aid: Why Aid Is Not Working and How There Is a Better Way for Africa
Dambisa Moyo

from: $5.19

Predictions: Thirty Great Minds on the Future (Popular Science)
Predictions: Thirty Great Minds on the Future (Popular Science)
James Watson, Lynn Margulis, Donald A. Norman, F. Sherwood Rowland, Kevin Warwick, Harriet Swain, Richard Dawkins, Kate Worsley, Carl Djerassi, Tim Cornwall, Amartya Sen, W. French Anderson, Martin Ince, Domenico Pacitti, Paul C.W. Davies, Peter Singer, David King, Noam Chomsky, Chris Stringer, Andrew Robinson, Slavoj Žižek, Umberto Eco, Elaine Showalter, Arthur C. Clarke, Jennifer Wallace, Susan A. Greenfield, Ayala Ochert, Andrea Dworkin, Steven D. Pinkerton, Dale Spender, Stephen Jay Gould, John Kenneth Galbraith, Kam Patel, Daniel C. Dennett, Chinua Achebe, Steven Weinberg, Alison Goddard, Francis Fukuyama, Paul Nurse, Tony Durham, Karen Gold, Daniel Goleman, Michel Prest, Sherry Turkle

from: $5.09

India After Gandhi: The History of the World's Largest Democracy
India After Gandhi: The History of the World's Largest Democracy
Ramachandra Guha

from: $7.99

The Nightingale
The Nightingale
Kristin Hannah

from: $9.69

Book Overview

The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned.

The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hash-based Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.

Customer Reviews

0 customer rating | 0 review
There are currently no reviews. Be the first to review this work.
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured