A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Risk Management using Behavior based Attack Graphs
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Top-Down Specialization for Information and Privacy Preservation
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Incognito: efficient full-domain K-anonymity
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation
Data Mining and Knowledge Discovery
Mondrian Multidimensional K-Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
OpenID 2.0: a platform for user-centric identity management
Proceedings of the second ACM workshop on Digital identity management
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Minimum-cost network hardening using attack graphs
Computer Communications
Trust Negotiation in Identity Management
IEEE Security and Privacy
Optimal security hardening using multi-objective optimization on attack tree models of networks
Proceedings of the 14th ACM conference on Computer and communications security
Statistical trust establishment in wireless sensor networks
ICPADS '07 Proceedings of the 13th International Conference on Parallel and Distributed Systems - Volume 01
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
IEEE Transactions on Knowledge and Data Engineering
A virtualization framework for heterogeneous sensor network platforms
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
Conjunctive, subset, and range queries on encrypted data
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Predicate encryption supporting disjunctions, polynomial equations, and inner products
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Hi-index | 0.00 |
Cloud computing is a concept that has received significant attention lately. With advances in virtualization, coupled with the demand for services, many initiatives are underway in the environment of cloud computing. At this point, most of the services in cloud Computing are broadly in the paradigm of computing and storage, and in the traditional Client Server mode. With the recent explosion of wireless sensor networks and their applicability in civilian and military applications, there is an emerging vision for integrating sensor networks into the cloud. Practical systems like Microsoft's SensorMap and Asia Pacific Environmental Sensor Grid are attestations to the enormous potential for sensor networks to be integrated into the cloud. In this framework users need not own sensor networks. Sensor Network owners after a mission need not disband the networks. There is a symbiotic relationship wherein sensor network owners can provide a variety of services to customers for profit. Customers also benefit from a variety of remote services without being physically close to the environment of interest. However, despite the benefits of sensor-clouds, security issues are largely open. A variety of new threats and attacks are possible, and existing solutions in standalone sensor networks will not be applicable in the cloud. The vision of this article is to introduce the sensor-cloud computing and overview the research challenges from the security perspective.