7 Hits in 3.1 sec

The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud [article]

Martin Henze, René Hummen, Roman Matzutt, Klaus Wehrle
2016 arXiv   pre-print
Hence, sensor data needs to be secured properly before it can be outsourced to the cloud.  ...  When securing the outsourcing of sensor data to the cloud, one important challenge lies in the representation of sensor data and the choice of security measures applied to it.  ...  Acknowledgments The authors would like to thank everyone who contributed to this document (see attached list of contributors). The SensorCloud project was funded by the  ... 
arXiv:1607.03239v1 fatcat:brsb6mbzaveiff7qbeqjtsuuqa

A Cloud design for user-controlled storage and processing of sensor data

Rene Hummen, Martin Henze, Daniel Catrein, Klaus Wehrle
2012 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings  
Our proposed security architecture enforces end-to-end data access control by the data owner reaching from the sensor network to the Cloud storage and processing subsystems as well as strict isolation  ...  In this paper, we analyze and define properties that a trusted Cloud design has to fulfill. Based on this analysis, we present the security architecture of SensorCloud.  ...  ACKNOWLEDGMENT The authors would like to thank the members of the SensorCloud consortium for the inspiring discussions on the concepts described in this paper.  ... 
doi:10.1109/cloudcom.2012.6427523 dblp:conf/cloudcom/HummenHCW12 fatcat:sxuzusm2kvbk3ef5xwmqfmje2e

A WSN based Environment and Parameter Monitoring System for Human Health Comfort: A Cloud Enabled Approach

Manohara Pai, Pooja B, Radhika M. Pai
2014 EAI Endorsed Transactions on Scalable Information Systems  
The sink node of WSN outsources data into the cloud after performing operations to secure the data.  ...  In this proposed work, secure sensor-cloud architecture for the applications in healthcare is implemented by integrating two different clouds.  ...  Thus considering the confidentiality and integrity factor of the outsourced data we propose secure sensor-cloud architecture.  ... 
doi:10.4108/sis.1.3.e2 fatcat:z4enuifqdzf5ba2r76ojr6o36u

Maintaining User Control While Storing and Processing Sensor Data in the Cloud

Martin Henze, René Hummen, Roman Matzutt, Daniel Catrein, Klaus Wehrle
2013 International Journal of Grid and High Performance Computing  
Our main security goal is the control of the data owner over her sensor data when outsourcing storage and processing to the Cloud.  ...  Security Goals With respect to outsourcing storage and processing of sensor data to the Cloud, technology needs to provide the means to protect the privacy and security of sensitive sensor data in a multi-tenant  ...  an international forum for the dissemination and development of theory and practice in grid and cloud computing.  ... 
doi:10.4018/ijghpc.2013100107 fatcat:bbomewtipzefpltwygen2cntg4

Goal-Oriented Opportunistic Sensor Clouds [chapter]

Marc Kurz, Gerold Hölzl, Alois Ferscha
2012 Lecture Notes in Computer Science  
This emerges the need to roll out the data federating entity as decentralized collecting point.  ...  The sensor systems are usually attached on the body, on objects, or in the environment, directly surrounding persons or groups whose activities or contextual information has to be detected.  ...  This means that the effort of securing the access to the sensor data can be outsourced into the cloud. Global synchronization and data alignment is a big problem and non-trivial task.  ... 
doi:10.1007/978-3-642-33615-7_10 fatcat:2bkpwccncfb75fjfk5cag35ucq

The Role of RFID in Green IoT: A Survey on Technologies, Challenges and a Way Forward

Zainatul Yushaniza Mohamed Yusoff, Mohamad Khairi Ishak, Kamal Ali Alezabi
2021 Advances in Science, Technology and Engineering Systems  
The Internet of Things (IoT) is a technology that enables communication between everyday life using different sensor actuators that work together to identify, capture, and distribute critical data from  ...  Overall, this paper highlights the potential efforts of RFID to address existing Green IoT issues.  ...  Acknowledgment The authors would like to thank Majlis Amanah Rakyat (MARA) and Universiti Sains Malaysia, for providing the financial support under Research Grant RUI(1001/PELECT/8014049) to carry out  ... 
doi:10.25046/aj060103 fatcat:plofdecp6zespcblkqe7a567vi

Secure cloud computing in legal metrology

Alexander Oppermann, Technische Universität Berlin, Technische Universität Berlin, Jean-Pierre Seifert
A secure communication protocol for encrypted data is presented to take account of integrity of encrypted measurements for data in transit.  ...  In recent years Cloud Computing has been developed constantly, overcoming different challenges to mature in the fields of security, stability and reliability.  ...  SensorCloud for example provides an end-to-end encryption for sensor data but reduces the cloud to a secure storage solution.  ... 
doi:10.14279/depositonce-9736 fatcat:ihjx5kwf3ne6xfdsiptmjhcmou