Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Secure sensor cloud / (Record no. 562337)

000 -LEADER
fixed length control field 08610nam a22007571i 4500
001 - CONTROL NUMBER
control field 8581648
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200413152928.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190103s2019 caua foab 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781681734699
Qualifying information ebook
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781681734705
Qualifying information hardcover
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781681734682
Qualifying information paperback
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.2200/S00886ED1V01Y201811ASE018
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl000408883
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1080937435
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK7872.D48
Item number K857 2019
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 681.2
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kumar, Vimal
Titles and words associated with a name (Lecturer in computer science),
Relator term author.
245 10 - TITLE STATEMENT
Title Secure sensor cloud /
Statement of responsibility, etc. Vimal Kumar, Amartya Sen, Sanjay Madria.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [San Rafael, California] :
Name of producer, publisher, distributor, manufacturer Morgan & Claypool,
Date of production, publication, distribution, manufacture, or copyright notice 2019.
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (xiii, 126 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Synthesis lectures on algorithms and software in engineering,
International Standard Serial Number 1938-1735 ;
Volume/sequential designation # 18
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat Reader.
500 ## - GENERAL NOTE
General note Part of: Synthesis digital library of engineering and computer science.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 113-124).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction -- 1.1 Wireless sensing devices and wireless sensor networks -- 1.2 Sensor cloud -- 1.2.1 Sensor cloud layered architecture -- 1.2.2 Virtual sensors -- 1.2.3 Sensor cloud delivery models -- 1.3 Secure sensor cloud --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. Preliminaries -- 2.1 Security risk assessment -- 2.1.1 Risk assessment methodologies -- 2.2 Cryptographic operations -- 2.2.1 Homomorphic encryption -- 2.2.2 Paillier encryption -- 2.2.3 Elliptic curve cryptography -- 2.2.4 Key policy attribute-based encryption -- 2.2.5 Proxy re-encryption -- 2.3 Other mathematical primitives -- 2.3.1 Bilinear maps -- 2.3.2 Shamir's secret sharing -- 2.3.3 Bloom filter --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. Sensor cloud architecture and implementation -- 3.1 Virtual sensors -- 3.2 Sensor cloud architecture -- 3.2.1 Client-centric layer -- 3.2.2 Middleware layer -- 3.2.3 Sensor-centric layer -- 3.3 Software design -- 3.4 QoS in sensor cloud -- 3.5 Implementation -- 3.5.1 System setup -- 3.5.2 Middleware implementation details -- 3.5.3 Backend base station server implementation details -- 3.5.4 Data streaming for multi-user environment -- 3.5.5 Virtual sensor implementation -- 3.5.6 Time model for virtual sensors -- 3.6 Summary --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. Risk assessment in a sensor cloud -- 4.1 Introduction -- 4.2 Risk assessment framework for WSN in a sensor cloud -- 4.2.1 Attack graphs for wireless sensor networks -- 4.2.2 Quantitative risk assessment by modeling attack graphs using Bayesian networks -- 4.2.3 Time frame estimations -- 4.3 Use case scenario depicting the risk assessment framework -- 4.3.1 Attack graph for confidentiality -- 4.3.2 Time frame estimations -- 4.4 Discussions -- 4.4.1 Complexity analysis and scalability -- 4.4.2 Risk assessment vs. intrusion detection systems -- 4.5 Summary --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. Secure aggregation of data in a sensor cloud -- 5.1 Introduction -- 5.2 Related work -- 5.3 Secure hierarchical data aggregation algorithm -- 5.3.1 Modified ECDSA signature algorithm -- 5.3.2 EC Elgamal encryption -- 5.4 Privacy and integrity preserving data aggregation (PIP) -- 5.4.1 The PIP algorithm -- 5.4.2 Numerical example -- 5.5 Summary --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6. Access control of aggregated data in sensor clouds -- 6.1 Introduction -- 6.2 Related work -- 6.3 Models -- 6.3.1 System model -- 6.3.2 Adversary model -- 6.4 Access control policy -- 6.5 Overview of the scheme -- 6.6 Access control scheme -- 6.6.1 System setup -- 6.6.2 Access control secret key generation -- 6.6.3 Data aggregation key generation -- 6.6.4 Data aggregation key establishment -- 6.6.5 Data aggregation -- 6.7 Discussion -- 6.8 Revocation of users -- 6.9 Modifying access at runtime -- 6.9.1 Encryption scheme for modifying access at runtime -- 6.9.2 Protocol for modifying access at runtime -- 6.10 Security analysis -- 6.11 Summary --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 7. Efficient and secure code dissemination in sensor clouds -- 7.1 Introduction -- 7.2 Related work -- 7.3 System model and assumptions -- 7.4 Proposed approach -- 7.5 The EC-BBS proxy re-encryption scheme -- 7.6 Detecting common functions -- 7.7 Proposed algorithm -- 7.7.1 Pre-deployment phase -- 7.7.2 Pre-dissemination -- 7.7.3 Code dissemination -- 7.7.4 Activity on the nodes -- 7.8 A discussion on security -- 7.8.1 Confidentiality of code -- 7.8.2 Integrity of code -- 7.9 Summary --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Bibliography -- Authors' biographies.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0# - CITATION/REFERENCES NOTE
Name of source Compendex
510 0# - CITATION/REFERENCES NOTE
Name of source INSPEC
510 0# - CITATION/REFERENCES NOTE
Name of source Google scholar
510 0# - CITATION/REFERENCES NOTE
Name of source Google book search
520 3# - SUMMARY, ETC.
Summary, etc. The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned. The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hashbased Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF title page (viewed on January 3, 2019).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Wireless sensor networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cloud computing.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term sensor cloud
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term risk assessment
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term IoT
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term encryption
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cyber-physical system
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term access control
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term secure code
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term secure data aggregation
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term privacy
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sen, Amartya
Titles and other words associated with a name (Computer scientist),
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Madria, Sanjay Kumar,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781681734682
-- 9781681734705
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis digital library of engineering and computer science.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis lectures on algorithms and software in engineering ;
Volume/sequential designation # 18.
International Standard Serial Number 1938-1735
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=8581648
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Barcode Date last seen Price effective from Koha item type
        PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 2020-04-13 EBKE837 2020-04-13 2020-04-13 E books

Powered by Koha