Security and Privacy for Sensor Databases
نویسنده
چکیده
The most compelling sensor technology advances of this decade are deploying wireless networks of heterogeneous smart sensor nodes for complex information gathering tasks. Sensors in wireless sensor networks operate under a set of unique and fundamental constraints that make collaborative information gathering tasks challenging. Sensors in the network simultaneously participate in the collaborative decision making required for aggregation of data in an efficient way. Thus, the study of security and privacy for sensor databases in the context of Sensor Networks is at the very heart of technology advances for the next decade. The intent of this paper is to bring together the fundamental concepts of security and privacy for sensor databases, so the unifying principles and underlying concepts of algorithm design may more easily be structured. We discuss several security issues. These include security policy, security architectures, secure sensor database functions, secure data distribution, the inference problem, the privacy problem, and tradeoffs between security, integrity, fault tolerance and real-time processing for sensor data managers. Next we discuss security issues for sensor databases taking into consideration some unique constraints for sensor networks. Finally we provide directions for future research on security for sensor databases.
منابع مشابه
An Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملA Survey on Big Data & Privacy Preserving Publishing Techniques
Big data describes very large data sets that have more diverse and complicated structure like weblogs, social media, email, sensors, and photographs. These less structured data and distinctiveness characteristics from traditional databases typically associated with extra complications in storing, analyzing and applying further procedures or extracting results. Big data analytics is the process ...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003