2015
DOI: 10.1007/978-3-319-26187-4_7
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
72
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 79 publications
(72 citation statements)
references
References 16 publications
0
72
0
Order By: Relevance
“…Another work that targets real-time content is presented in [10], in which a semantic-based video organizing platform is proposed to search videos in big data volumes. The proposed technique uses a semantic relational network model to mine and organize video resources based on their associations, while the authors in [11] proposed a Dynamic Key Length based Security Framework (DLSeF) founded on a common key resulting from synchronized prime numbers. The key is dynamically updated in short intervals to prevent man in the middle attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Another work that targets real-time content is presented in [10], in which a semantic-based video organizing platform is proposed to search videos in big data volumes. The proposed technique uses a semantic relational network model to mine and organize video resources based on their associations, while the authors in [11] proposed a Dynamic Key Length based Security Framework (DLSeF) founded on a common key resulting from synchronized prime numbers. The key is dynamically updated in short intervals to prevent man in the middle attacks.…”
Section: Related Workmentioning
confidence: 99%
“…In [13] [14], it is already proved that symmetric key solutions are thousand times faster than a symmetric key solution. Symmetric key cryptography is always suitable for the low power devices, where shared key need to be updated after certain period of time [13][14] [15]. Current research trend creates hybrid architecture by combining communication and computing technologies such as fog or cloud computing.…”
Section: Related Workmentioning
confidence: 99%
“…The basic idea is that the keys are the targets of attacks by attackers. To avoid such problems in big sensing data streams, we proposed novel techniques such as DPBSV [12] and DLSeF [14]. In these models, if an intruder/ attacker eventually hacks the key, the data and time period is selected in such a way that he/she cannot predict the key or its length for the next session.…”
Section: Proposed Synchronization Methodsmentioning
confidence: 99%
“…data security and query security) and both these security issues were applied for stream data analysis. Following this architecture, we identify four important requirements and properties for security verification of big data stream: (a) near real-time security verification, (b) dealing with high volume and velocity of data, (c) the data items should only be accessed once, and (d) the original data are not available for comparisons [11,12,13,14]. We focused on addressing big data stream security requirements by keeping all these big data stream constraints.…”
mentioning
confidence: 99%
See 1 more Smart Citation