计算机科学 ›› 2020, Vol. 47 ›› Issue (6): 276-283.doi: 10.11896/jsjkx.190400116

• 信息安全 • 上一篇    下一篇

社交传感云安全研究进展

梁俊斌, 张敏, 蒋婵   

  1. 广西大学计算机与电子信息学院 南宁530004
    广西多媒体通信与网络技术重点实验室 南宁530004
  • 收稿日期:2019-04-20 出版日期:2020-06-15 发布日期:2020-06-10
  • 通讯作者: 张敏(15388951803@163.com)
  • 作者简介:15388951803@163.com
  • 基金资助:
    国家自然科学基金项目(61562005,61762010);广西自然科学基金项目(2018GXNSFBA281169);广西高等学校千名中青年骨干教师培育计划项目(桂教人(2017)49)

Research Progress of Social Sensor Cloud Security

LIANG Jun-bin, ZHANG Min, JIANG Chan   

  1. School of computer, electronic information, Guangxi University, Nanning 530004, China
    Guangxi Key Laboratory of Multimedia Communication and Network Technology,Nanning 530004, China
  • Received:2019-04-20 Online:2020-06-15 Published:2020-06-10
  • About author:LIANG Jun-bin,born in 1979,Ph.D,professor,Ph.D supervisor.His main research interests include wireless sensor networks,network deployment and optimization.
    ZHANG Min,born in 1994,postgra-duate.Her research interests focus on wireless sensor networksand cloud computing.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61562005,61762010),Natural Science Foundation of Guangxi Province, China (2018GXNSFBA281169) and Thousands of Young and Middle-aged Backbone Teachers Training Program for Guangxi Higher Education [Education Department of Guangxi (2017)49]

摘要: 社交传感云是由社交网络、无线传感网络与云计算结合产生的一种新型传感云系统,将虚拟社交网络信息世界与现实的物理世界融合在一起,不断为社交用户提供新的服务和应用。社交传感云(Social Sensor Cloud)不仅具备了无线传感网络在收集外界信息方面强大的社交感知能力,还利用云计算技术打破了传统传感器网络在数据处理和存储方面的局限性。但是,由于社交传感器被移动地部署在不可信的社交云环境中,导致现有的社交传感云服务面临许多严重的安全问题,如社交传感器共享数据时容易遭受恶意攻击;不同服务商与用户之间的信誉问题,导致社交传感数据泄露、服务完整性问题等,严重阻碍了社交传感云服务的进一步发展。文中针对目前已有的研究,介绍了社交传感云的产生背景、体系框架、应用领域以及系统新特性,对社交数据安全、社交传感网络安全、社交传感云服务安全的研究现状进行介绍,并分析对比了典型的安全技术方案。此外,文中还讨论了该领域面临的挑战,并对未来的研究方向进行了展望。

关键词: 社交传感云, 云计算, 社交网络安全, 数据安全, 服务安全

Abstract: Social sensor cloud is a new type of sensor cloud system generated by social networks,wireless sensor networks and cloud computing,combines the virtual social networks world with the physical world,and provides new services and applications for social users continuously.It collects external information with the powerful social sensing ability of wireless sensor networks,and solves the limitations of traditional sensor networks in data processing and storage by using cloud computing technology.However,social sensors deployment in untrusted social cloud environment,which causes many serious security issues for social sensor cloud services,such as,malicious attacks when social sensors are sharing data,reputation issues between different service providers and users,social sensor data privacy leaks,service integrity issues.These security issues deeply hinder the further development of social sensor cloud services.For the related research progress of social sensor cloud,this paper introduces the background,the system framework,application fields and new system characteristics of social sensor cloud,and analyzes and compares typical security technology schemes.In addition,the key scientific issues to be solved in this field are discussed,and the future research work is prospected.

Key words: Social sensor cloud, Cloud computing, Social networks security, Data security, Services security

中图分类号: 

  • TP393
[1]ZHU C,LEUNG V C M,RODRIGUES J J P C,et al.Social Sensor Cloud:Framework,Greenness,Issues,and Outlook[J].IEEE Network,2018,32(5):100-105.
[2]XU Q,SU Z,YU S,et al.Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud[J].IEEE Tran-sactions on Big Data,2017,doi:10.1109/TBDATA.2017.2764925.
[3]AAMIR T,BOUGUETTAYA A,DONG H,et al.Social-Sensor Cloud Service Selection[C]//IEEE International Conference on Web Services.IEEE,2017:508-515.
[4]WANG T,LI Y,JIA W J,et al.Research progress of sensor-cloud security[J].Journal on Communications J. Communs.,2018,39(3):35-52.
[5]GHARINEIAT A,BOUGUETTAYA A,SELLIS T,et al. Crowdsourced Coverage as a Service:Two-Level Composition of Sensor Cloud Services[J].IEEE Transactions on Knowledge and Data Engineering,2017:1384-1397.
[6]CHARD K,CATON S,RANA O,et al.Social Clouds:A Retrospective[J].IEEE Cloud Computing,2016,2(6):30-40.
[7]REYES R J R,DE MENDONCA F F D,DIAS K L.A Service-Oriented Architecture with Data Virtualization Support for Cloud-Based Wireless Sensor Networks[C]//2017 VII Brazilian Symposium on Computing Systems Engineering (SBESC).IEEE,2017:199-204.
[8]CHANG C,SRIRAMA S N,LIYANAGE M.A service-oriented mobile cloud middleware framework for provisioning mobile sensing as a service[C]//2015 IEEE 21st International Confe-rence on Parallel and Distributed Systems (ICPADS).IEEE,2015:124-131.
[9]RANI S,AHMED S H,TALWAR R,et al.Can Sensors Collect Big Data?An Energy Efficient Big Data Gathering Algorithm for WSN[J].IEEE Transactions on Industrial Informatics,2017:1961-1968.
[10]NAKASHIMA K,YOKOYAMA M,TANIYAMA Y,et al.s3 system:A system for sharing social sensor data and analytical programs[C]//Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems:Computing Networking and Services.ACM,2016:147-152.
[11]ZENG J D,WANG T,JIA W J,et al.Research progress of sensor-cloud [J].Journal of Computer Research and Development,2017,54(5):925-939.
[12]PETRI I,DIAZ-MONTES J,RANA O,et al.Modelling and implementing social community clouds[J].IEEE Transactions on Services Computing,2017,10(3):410-422.
[13]CHATTERJEE S,LADIA R,MISRA S.Dynamic optimal pricing for heterogeneous service-oriented architecture of sensor-cloud infrastructure[J].IEEE Transactions on Services Computing,2017,10(2):203-216.
[14]AAMIR T,DONG H,BOUGUETTAYA A.Trust in social-sensor cloud service[C]//2018 IEEE International Conference on Web Services (ICWS).IEEE,2018:359-362.
[15]BILECKI L F,FIORESE A.A Trust Reputation Architecture for Cloud Computing Environment[C]//2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA).IEEE,2017:614-621.
[16]BHATT S,KRISHNAMURTHY V.Controlled information fusion with risk-averse CVaR social sensors[C]//2017 IEEE 56th Annual Conference on Decision and Control (CDC).IEEE,2017:2605-2610.
[17]REZVANI M,IGNJATOVIC A,BERTINO E,et al.A trust assessment framework for streaming data in wsns using iterative filtering[C]//2015 IEEE Tenth International Conference on Intelligent Sensors,Sensor Networks and Information Processing (ISSNIP).IEEE,2015:1-6.
[18]CHARD K,CATON S,RANA O,et al.Social cloud:Cloud computing in social networks[C]//2010 IEEE 3rd International Conference on Cloud Computing.IEEE,2010:99-106.
[19]MRABET M,BEN SAIED Y,SAIDANE L A.Modeling correlation between QoS attributes for trust computation in cloud computing environments[C]//Proceedings of the 17th IEEE/ACM International Symposium on Cluster,Cloud and Grid Computing.IEEE,2017:488-497.
[20]CHARD K,BUBENDORFER K,CATON S,et al.Social Cloud Computing:A Vision for Socially Motivated Resource Sharing[J].IEEE Transactions on Services Computing,2012,5(4):551-563.
[21]MADRIA S,KUMAR V,DALVI R.Sensor Cloud:A Cloud of Virtual Sensors[J].IEEE Software,2014,31(2):70-77.
[22]AIKO Z,NAKASHIMA K,YOSHIHISA T,et al.A Social Sensor Visualization System for a Platform to Generate and Share Social Sensor Data[C]//2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).IEEE,2018,2:628-633.
[23]YI X,BOUGUETTAYA A,GEORGAKOPOULOS D,et al. Privacy protection for wireless medical sensor data[J].IEEE Transactions on Dependable and Secure Computing,2015,13(3):369-380.
[24]BIJARBOONEH F H,DU W,NGAI C H,et al.Cloud-Assisted Data Fusion and Sensor Selection for Internet-of-Things[J].IEEE Internet of Things Journal,2015,3(3):257-268.
[25]LI F,WANG X,CHEN H,et al.Clickleak:keystroke leaks through multimodal sensors in cyber-physical social networks[J].IEEE Access,2017,5:27311-27321.
[26]JIANG J,HAN G,WANG F,et al.An Efficient DistributedTrust Model for Wireless Sensor Networks[J].IEEE Transactions on Parallel and Distributed Systems,2015,26(5):1228-1237.
[27]WANG T,LI Y,FANG W,et al.A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud System[J].IEEE Transactions on Big Data,2018,doi:10.1109/TBDATA.2018.2811501.
[28]MUSAEV A,PU C.Landslide information service based on composition of physical and social sensors[C]//2017 IEEE 33rd International Conference on Data Engineering (ICDE).IEEE,2017:1415-1416.
[29]LAU R Y K.Toward a social sensor based framework for intelligent transportation[C]//2017 IEEE 18th International Symposium on A World of Wireless,Mobile and Multimedia Networks (WoWMoM).IEEE,2017:1-6.
[30]WANG G,GUI X L.Selecting and Trust Computing for Transaction Nodes in Online Social Networks[J].Chinese Journal of Computers,2013,36(2):368-383.
[31]PRAVEENA A,SMYS S.Ensuring data security in cloud based social networks[C]//2017 International Conference ofElectro-nics,Communication and Aerospace Technology (ICECA).IEEE,2017,2:289-295.
[32]GULER B,VARAN B,TUTUNCUOGLU K,et al.Using Social Sensors for Influence Propagation in Networks With Positive and Negative Relationships[J].IEEE Journal of Selected Topics in Signal Processing,2015,9(2):360-373.
[33]WANG E K,LI Y,YE Y,et al.A Dynamic Trust Framework for Opportunistic Mobile Social Networks[J].IEEE Transactions on Network and Service Management,2017:319-329.
[34]XIA F,JEDARI B,YANG L T,et al.A Signaling Game for Uncertain Data Delivery in Selfish Mobile Social Networks[J].IEEE Transactions on Computational Social Systems,2017,3(2):100-112.
[35]MOOSAVI H,BUI F M.A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks[J].IEEE Transactions on Information Forensics and Security,2014,9(9):1367-1379.
[36]HAN G,LIU L,JIANG J,et al.Analysis of energy-efficient connected target coverage algorithms for industrial wireless sensor networks[J].IEEE Transactions on Industrial Informatics,2017,13(1):135-143.
[37]MAHBOUBI H,MOEZZI K,AGHDAM A G,et al.Distributed deployment algorithms for improved coverage in a network of wireless mobile sensors[J].IEEE Transactions on Industrial Informatics,2014,10(1):163-174.
[38]ANANTVALEE T,WU J.A survey on intrusion detection in mobile ad hoc networks[M]//Wireless Network Security.Boston:Springer,2007:159-180.
[39]BAIG Z A.Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks[J].Computer Communications,2011,34(3):468-484.
[40]LIU J,YU J,SHEN S.Energy-efficient two-layer cooperative defense scheme to secure sensor-clouds[J].IEEE Transactions on Information Forensics and Security,2018,13(2):408-420.
[41]BORUJENI E M,RAHBARI D,NICKRAY M.The impact of security services on fog-based WSNs lifetime[C]//2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI).IEEE,2017:984-991.
[42]ZHU C,SHU L,LEUNG V C M,et al.Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City[J].IEEE Communications Magazine,2017,55(12):24-30.
[43]CHARD K,CATON S,RANA O,et al.Social cloud:Cloud computing in social networks[C]//2010 IEEE 3rd International Conference on Cloud Computing.IEEE,2010:99-106.
[44]KWAK D,LIU R,KIM D,et al.Seeing is believing:Sharing real-time visual traffic information via vehicular clouds[J].IEEE Access,2016,4:3617-3631.
[45]GONG X,CHEN X,ZHANG J,et al.Exploiting social trust assisted reciprocity (STAR) toward utility-optimal socially-aware crowdsensing[J].IEEE Transactions on Signal and Information Processing over Networks,2015,1(3):195-208.
[46]DINH T,KIM Y.An efficient interactive model for on-demand sensing-as-a-services of sensor-cloud[J].Sensors,2016,16(7):992.
[47]YUAN J,LI X.A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion[J].IEEE Access,2018,6:23626-23638.
[48]DINH T,KIM Y.An efcient sensor-cloud interactive model for on-demand latency requirement guarantee[C]//2017 IEEE International Conference on Communications (ICC).IEEE,2017:1-6.
[49]RACHKIDI E E,AGOULMINE N,CHENDEB N,et al.Resources optimization and effcient distribution of shared virtual sensors in sensor-cloud[C]//2017 IEEE InternationalConfe-rence on Communications (ICC).IEEE,2017:1-6.
[50]KIM S.An Effective Sensor Cloud Control Scheme based on a Two-stage Game Approach[J].IEEE Access,2018,PP(99):20430-20439.
[1] 张恺琪, 涂志莹, 初佃辉, 李春山. 基于排队论的服务资源可用性相关研究综述[J]. 计算机科学, 2021, 48(1): 26-33.
[2] 雷阳, 姜瑛. 云计算环境下关联节点的异常判断[J]. 计算机科学, 2021, 48(1): 295-300.
[3] 徐蕴琪, 黄荷, 金钟. 容器技术在科学计算中的应用研究[J]. 计算机科学, 2021, 48(1): 319-325.
[4] 李彦, 申德荣, 聂铁铮, 寇月. 面向加密云数据的多关键字语义搜索方法[J]. 计算机科学, 2020, 47(9): 318-323.
[5] 马潇潇, 黄艳. 大属性可公开追踪的密文策略属性基加密方案[J]. 计算机科学, 2020, 47(6A): 420-423.
[6] 金小敏, 滑文强. 移动云计算中面向能耗优化的资源管理[J]. 计算机科学, 2020, 47(6): 247-251.
[7] 孙敏, 陈中雄, 叶侨楠. 云环境下基于HEDSM的工作流调度策略[J]. 计算机科学, 2020, 47(6): 252-259.
[8] 田宇立, 李宁. 云环境下的系统使用模式与故障分析[J]. 计算机科学, 2020, 47(12): 50-55.
[9] 王瑄, 毛莺池, 谢在鹏, 黄倩. 基于差分进化的推断任务卸载策略[J]. 计算机科学, 2020, 47(10): 256-262.
[10] 谷晓会,章国安. SDN在车载网中的应用综述[J]. 计算机科学, 2020, 47(1): 237-244.
[11] 张彬彬, 王娟, 岳昆, 武浩, 郝佳. 基于随机森林的虚拟机性能预测与配置优化[J]. 计算机科学, 2019, 46(9): 85-92.
[12] 卢海峰, 顾春华, 罗飞, 丁炜超, 袁野, 任强. 强化学习下能耗优化的虚拟机放置策略[J]. 计算机科学, 2019, 46(9): 291-297.
[13] 江泽涛,黄锦,胡硕,徐智. 云计算下可撤销的全外包CP-ABE方案[J]. 计算机科学, 2019, 46(7): 114-119.
[14] 张新, 胡晓东, 魏嘉伟. 基于云计算的地理信息服务技术[J]. 计算机科学, 2019, 46(6A): 532-536.
[15] 张建山, 林兵, 卢宇, 许芙蓉. 基于无线城域网的微云部署及用户任务调度[J]. 计算机科学, 2019, 46(6): 128-134.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 雷丽晖,王静. 可能性测度下的LTL模型检测并行化研究[J]. 计算机科学, 2018, 45(4): 71 -75 .
[2] 孙启,金燕,何琨,徐凌轩. 用于求解混合车辆路径问题的混合进化算法[J]. 计算机科学, 2018, 45(4): 76 -82 .
[3] 张佳男,肖鸣宇. 带权混合支配问题的近似算法研究[J]. 计算机科学, 2018, 45(4): 83 -88 .
[4] 伍建辉,黄中祥,李武,吴健辉,彭鑫,张生. 城市道路建设时序决策的鲁棒优化[J]. 计算机科学, 2018, 45(4): 89 -93 .
[5] 史雯隽,武继刚,罗裕春. 针对移动云计算任务迁移的快速高效调度算法[J]. 计算机科学, 2018, 45(4): 94 -99 .
[6] 周燕萍,业巧林. 基于L1-范数距离的最小二乘对支持向量机[J]. 计算机科学, 2018, 45(4): 100 -105 .
[7] 刘博艺,唐湘滟,程杰仁. 基于多生长时期模板匹配的玉米螟识别方法[J]. 计算机科学, 2018, 45(4): 106 -111 .
[8] 耿海军,施新刚,王之梁,尹霞,尹少平. 基于有向无环图的互联网域内节能路由算法[J]. 计算机科学, 2018, 45(4): 112 -116 .
[9] 崔琼,李建华,王宏,南明莉. 基于节点修复的网络化指挥信息系统弹性分析模型[J]. 计算机科学, 2018, 45(4): 117 -121 .
[10] 王振朝,侯欢欢,连蕊. 抑制CMT中乱序程度的路径优化方案[J]. 计算机科学, 2018, 45(4): 122 -125 .