Trusted Cloud Computing 2014
DOI: 10.1007/978-3-319-12718-7_6
|View full text |Cite
|
Sign up to set email alerts
|

A Trust Point-based Security Architecture for Sensor Data in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 36 publications
0
14
0
Order By: Relevance
“…Cloud services with their virtually unlimited scalability offer viable solutions for many use-cases that incur massive amounts of data to be processed [8,43,44] and can be used to store and analyze data generated at different manufacturing sites, which may be physically far apart. In scenarios of plants with dozens of lines generating data, limitations in the Internet uplinks of the plants may however ultimately limit the amount of data items that can be transferred, even if data reduction (cf.…”
Section: Handling Higher-effort Computationsmentioning
confidence: 99%
“…Cloud services with their virtually unlimited scalability offer viable solutions for many use-cases that incur massive amounts of data to be processed [8,43,44] and can be used to store and analyze data generated at different manufacturing sites, which may be physically far apart. In scenarios of plants with dozens of lines generating data, limitations in the Internet uplinks of the plants may however ultimately limit the amount of data items that can be transferred, even if data reduction (cf.…”
Section: Handling Higher-effort Computationsmentioning
confidence: 99%
“…Especially in mobile settings, they furthermore have to cope with limited connectivity and -as they are often battery driven -a limited energy budget. These limitations are addressed by the cloud-based IoT, where the IoT is interconnected with the cloud [3][4][5][6][7][8][9]. Given that, the core idea is to upload all sensed data to the cloud, where it is stored persistently.…”
Section: Network Scenariomentioning
confidence: 99%
“…However, these smart devices often suffer from extremely constrained processing and storage resources, and a limited energy budget, as they are often powered by battery. In order to overcome these limitations, one of the most promising approaches is to interconnect the IoT with the cloud and thus benefit from the elastically scalable and always available resources provided by the cloud computing paradigm [3][4][5][6][7][8][9]. The cloud-based Internet of Things simplifies storage and processing of collected data, allows using the same data in multiple services, eases the combination of data from several users, and supports user mobility.…”
Section: Introductionmentioning
confidence: 99%
“…Securely outsourcing data, which is collected by small devices, to the cloud has already been proposed by related work. For example, Lounis et al [17] provide a secure cloudbased solution for health care data, while the SensorCloud project [3]- [5], [7], [18], [19] aims at providing a secure infrastructure for realizing services which operate on all kinds of sensor data. Although these approaches focus on security aspects, they do not address privacy concerns beyond providing confidentiality and access control.…”
Section: Related Workmentioning
confidence: 99%
“…encryption. For this, we leverage the data protection and access control mechanisms of the SensorCloud security architecture [3], [4], [7]. Before any data is uploaded to the cloud, the PEP encrypts it using a symmetric data protection key.…”
Section: A Privacy Enforcement Pointsmentioning
confidence: 99%