A low-latency secure data outsourcing scheme for cloud-WSN

Jing Li, Zhitao Guan, Xiaojiang Du, Zijian Zhang, Zhenyu Zhou

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

With the support of cloud computing, large quantities of data collected from various WSN applications can be managed efficiently. However, maintaining data security and efficiency of data processing in cloud- WSN (C-WSN) are important and challenging issues. In this paper, we present an efficient data outsourcing scheme based on CP-ABE, which can not only guarantee secure data access, but also reduce overall data processing time. In our proposed scheme, a large file is divided into several data blocks by data owner (DO) firstly. Then, the data blocks are encrypted and transferred to the cloud server in parallel. For data receiver (DR), data decryption and data transmission is also processed in parallel. In addition, data integrity can be checked by DR without any master key components. The security analysis shows that the proposed scheme can meet the security requirement of C-WSN. By performance evaluation, it shows that our scheme can dramatically improve data processing efficiency compared to the traditional CP-ABE method.

Original languageEnglish
Title of host publication2017 IEEE Wireless Communications and Networking Conference, WCNC 2017 - Proceedings
ISBN (Electronic)9781509041831
DOIs
StatePublished - 10 May 2017
Event2017 IEEE Wireless Communications and Networking Conference, WCNC 2017 - San Francisco, United States
Duration: 19 Mar 201722 Mar 2017

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Conference

Conference2017 IEEE Wireless Communications and Networking Conference, WCNC 2017
Country/TerritoryUnited States
CitySan Francisco
Period19/03/1722/03/17

Keywords

  • C-WSN
  • CP-ABE
  • Low latency
  • Outsourcing

Fingerprint

Dive into the research topics of 'A low-latency secure data outsourcing scheme for cloud-WSN'. Together they form a unique fingerprint.

Cite this