Computer Science ›› 2020, Vol. 47 ›› Issue (6): 276-283.doi: 10.11896/jsjkx.190400116

• Information Security • Previous Articles     Next Articles

Research Progress of Social Sensor Cloud Security

LIANG Jun-bin, ZHANG Min, JIANG Chan   

  1. School of computer, electronic information, Guangxi University, Nanning 530004, China
    Guangxi Key Laboratory of Multimedia Communication and Network Technology,Nanning 530004, China
  • Received:2019-04-20 Online:2020-06-15 Published:2020-06-10
  • About author:LIANG Jun-bin,born in 1979,Ph.D,professor,Ph.D supervisor.His main research interests include wireless sensor networks,network deployment and optimization.
    ZHANG Min,born in 1994,postgra-duate.Her research interests focus on wireless sensor networksand cloud computing.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61562005,61762010),Natural Science Foundation of Guangxi Province, China (2018GXNSFBA281169) and Thousands of Young and Middle-aged Backbone Teachers Training Program for Guangxi Higher Education [Education Department of Guangxi (2017)49]

Abstract: Social sensor cloud is a new type of sensor cloud system generated by social networks,wireless sensor networks and cloud computing,combines the virtual social networks world with the physical world,and provides new services and applications for social users continuously.It collects external information with the powerful social sensing ability of wireless sensor networks,and solves the limitations of traditional sensor networks in data processing and storage by using cloud computing technology.However,social sensors deployment in untrusted social cloud environment,which causes many serious security issues for social sensor cloud services,such as,malicious attacks when social sensors are sharing data,reputation issues between different service providers and users,social sensor data privacy leaks,service integrity issues.These security issues deeply hinder the further development of social sensor cloud services.For the related research progress of social sensor cloud,this paper introduces the background,the system framework,application fields and new system characteristics of social sensor cloud,and analyzes and compares typical security technology schemes.In addition,the key scientific issues to be solved in this field are discussed,and the future research work is prospected.

Key words: Cloud computing, Data security, Services security, Social networks security, Social sensor cloud

CLC Number: 

  • TP393
[1]ZHU C,LEUNG V C M,RODRIGUES J J P C,et al.Social Sensor Cloud:Framework,Greenness,Issues,and Outlook[J].IEEE Network,2018,32(5):100-105.
[2]XU Q,SU Z,YU S,et al.Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud[J].IEEE Tran-sactions on Big Data,2017,doi:10.1109/TBDATA.2017.2764925.
[3]AAMIR T,BOUGUETTAYA A,DONG H,et al.Social-Sensor Cloud Service Selection[C]//IEEE International Conference on Web Services.IEEE,2017:508-515.
[4]WANG T,LI Y,JIA W J,et al.Research progress of sensor-cloud security[J].Journal on Communications J. Communs.,2018,39(3):35-52.
[5]GHARINEIAT A,BOUGUETTAYA A,SELLIS T,et al. Crowdsourced Coverage as a Service:Two-Level Composition of Sensor Cloud Services[J].IEEE Transactions on Knowledge and Data Engineering,2017:1384-1397.
[6]CHARD K,CATON S,RANA O,et al.Social Clouds:A Retrospective[J].IEEE Cloud Computing,2016,2(6):30-40.
[7]REYES R J R,DE MENDONCA F F D,DIAS K L.A Service-Oriented Architecture with Data Virtualization Support for Cloud-Based Wireless Sensor Networks[C]//2017 VII Brazilian Symposium on Computing Systems Engineering (SBESC).IEEE,2017:199-204.
[8]CHANG C,SRIRAMA S N,LIYANAGE M.A service-oriented mobile cloud middleware framework for provisioning mobile sensing as a service[C]//2015 IEEE 21st International Confe-rence on Parallel and Distributed Systems (ICPADS).IEEE,2015:124-131.
[9]RANI S,AHMED S H,TALWAR R,et al.Can Sensors Collect Big Data?An Energy Efficient Big Data Gathering Algorithm for WSN[J].IEEE Transactions on Industrial Informatics,2017:1961-1968.
[10]NAKASHIMA K,YOKOYAMA M,TANIYAMA Y,et al.s3 system:A system for sharing social sensor data and analytical programs[C]//Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems:Computing Networking and Services.ACM,2016:147-152.
[11]ZENG J D,WANG T,JIA W J,et al.Research progress of sensor-cloud [J].Journal of Computer Research and Development,2017,54(5):925-939.
[12]PETRI I,DIAZ-MONTES J,RANA O,et al.Modelling and implementing social community clouds[J].IEEE Transactions on Services Computing,2017,10(3):410-422.
[13]CHATTERJEE S,LADIA R,MISRA S.Dynamic optimal pricing for heterogeneous service-oriented architecture of sensor-cloud infrastructure[J].IEEE Transactions on Services Computing,2017,10(2):203-216.
[14]AAMIR T,DONG H,BOUGUETTAYA A.Trust in social-sensor cloud service[C]//2018 IEEE International Conference on Web Services (ICWS).IEEE,2018:359-362.
[15]BILECKI L F,FIORESE A.A Trust Reputation Architecture for Cloud Computing Environment[C]//2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA).IEEE,2017:614-621.
[16]BHATT S,KRISHNAMURTHY V.Controlled information fusion with risk-averse CVaR social sensors[C]//2017 IEEE 56th Annual Conference on Decision and Control (CDC).IEEE,2017:2605-2610.
[17]REZVANI M,IGNJATOVIC A,BERTINO E,et al.A trust assessment framework for streaming data in wsns using iterative filtering[C]//2015 IEEE Tenth International Conference on Intelligent Sensors,Sensor Networks and Information Processing (ISSNIP).IEEE,2015:1-6.
[18]CHARD K,CATON S,RANA O,et al.Social cloud:Cloud computing in social networks[C]//2010 IEEE 3rd International Conference on Cloud Computing.IEEE,2010:99-106.
[19]MRABET M,BEN SAIED Y,SAIDANE L A.Modeling correlation between QoS attributes for trust computation in cloud computing environments[C]//Proceedings of the 17th IEEE/ACM International Symposium on Cluster,Cloud and Grid Computing.IEEE,2017:488-497.
[20]CHARD K,BUBENDORFER K,CATON S,et al.Social Cloud Computing:A Vision for Socially Motivated Resource Sharing[J].IEEE Transactions on Services Computing,2012,5(4):551-563.
[21]MADRIA S,KUMAR V,DALVI R.Sensor Cloud:A Cloud of Virtual Sensors[J].IEEE Software,2014,31(2):70-77.
[22]AIKO Z,NAKASHIMA K,YOSHIHISA T,et al.A Social Sensor Visualization System for a Platform to Generate and Share Social Sensor Data[C]//2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).IEEE,2018,2:628-633.
[23]YI X,BOUGUETTAYA A,GEORGAKOPOULOS D,et al. Privacy protection for wireless medical sensor data[J].IEEE Transactions on Dependable and Secure Computing,2015,13(3):369-380.
[24]BIJARBOONEH F H,DU W,NGAI C H,et al.Cloud-Assisted Data Fusion and Sensor Selection for Internet-of-Things[J].IEEE Internet of Things Journal,2015,3(3):257-268.
[25]LI F,WANG X,CHEN H,et al.Clickleak:keystroke leaks through multimodal sensors in cyber-physical social networks[J].IEEE Access,2017,5:27311-27321.
[26]JIANG J,HAN G,WANG F,et al.An Efficient DistributedTrust Model for Wireless Sensor Networks[J].IEEE Transactions on Parallel and Distributed Systems,2015,26(5):1228-1237.
[27]WANG T,LI Y,FANG W,et al.A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud System[J].IEEE Transactions on Big Data,2018,doi:10.1109/TBDATA.2018.2811501.
[28]MUSAEV A,PU C.Landslide information service based on composition of physical and social sensors[C]//2017 IEEE 33rd International Conference on Data Engineering (ICDE).IEEE,2017:1415-1416.
[29]LAU R Y K.Toward a social sensor based framework for intelligent transportation[C]//2017 IEEE 18th International Symposium on A World of Wireless,Mobile and Multimedia Networks (WoWMoM).IEEE,2017:1-6.
[30]WANG G,GUI X L.Selecting and Trust Computing for Transaction Nodes in Online Social Networks[J].Chinese Journal of Computers,2013,36(2):368-383.
[31]PRAVEENA A,SMYS S.Ensuring data security in cloud based social networks[C]//2017 International Conference ofElectro-nics,Communication and Aerospace Technology (ICECA).IEEE,2017,2:289-295.
[32]GULER B,VARAN B,TUTUNCUOGLU K,et al.Using Social Sensors for Influence Propagation in Networks With Positive and Negative Relationships[J].IEEE Journal of Selected Topics in Signal Processing,2015,9(2):360-373.
[33]WANG E K,LI Y,YE Y,et al.A Dynamic Trust Framework for Opportunistic Mobile Social Networks[J].IEEE Transactions on Network and Service Management,2017:319-329.
[34]XIA F,JEDARI B,YANG L T,et al.A Signaling Game for Uncertain Data Delivery in Selfish Mobile Social Networks[J].IEEE Transactions on Computational Social Systems,2017,3(2):100-112.
[35]MOOSAVI H,BUI F M.A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks[J].IEEE Transactions on Information Forensics and Security,2014,9(9):1367-1379.
[36]HAN G,LIU L,JIANG J,et al.Analysis of energy-efficient connected target coverage algorithms for industrial wireless sensor networks[J].IEEE Transactions on Industrial Informatics,2017,13(1):135-143.
[37]MAHBOUBI H,MOEZZI K,AGHDAM A G,et al.Distributed deployment algorithms for improved coverage in a network of wireless mobile sensors[J].IEEE Transactions on Industrial Informatics,2014,10(1):163-174.
[38]ANANTVALEE T,WU J.A survey on intrusion detection in mobile ad hoc networks[M]//Wireless Network Security.Boston:Springer,2007:159-180.
[39]BAIG Z A.Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks[J].Computer Communications,2011,34(3):468-484.
[40]LIU J,YU J,SHEN S.Energy-efficient two-layer cooperative defense scheme to secure sensor-clouds[J].IEEE Transactions on Information Forensics and Security,2018,13(2):408-420.
[41]BORUJENI E M,RAHBARI D,NICKRAY M.The impact of security services on fog-based WSNs lifetime[C]//2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI).IEEE,2017:984-991.
[42]ZHU C,SHU L,LEUNG V C M,et al.Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City[J].IEEE Communications Magazine,2017,55(12):24-30.
[43]CHARD K,CATON S,RANA O,et al.Social cloud:Cloud computing in social networks[C]//2010 IEEE 3rd International Conference on Cloud Computing.IEEE,2010:99-106.
[44]KWAK D,LIU R,KIM D,et al.Seeing is believing:Sharing real-time visual traffic information via vehicular clouds[J].IEEE Access,2016,4:3617-3631.
[45]GONG X,CHEN X,ZHANG J,et al.Exploiting social trust assisted reciprocity (STAR) toward utility-optimal socially-aware crowdsensing[J].IEEE Transactions on Signal and Information Processing over Networks,2015,1(3):195-208.
[46]DINH T,KIM Y.An efficient interactive model for on-demand sensing-as-a-services of sensor-cloud[J].Sensors,2016,16(7):992.
[47]YUAN J,LI X.A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion[J].IEEE Access,2018,6:23626-23638.
[48]DINH T,KIM Y.An efcient sensor-cloud interactive model for on-demand latency requirement guarantee[C]//2017 IEEE International Conference on Communications (ICC).IEEE,2017:1-6.
[49]RACHKIDI E E,AGOULMINE N,CHENDEB N,et al.Resources optimization and effcient distribution of shared virtual sensors in sensor-cloud[C]//2017 IEEE InternationalConfe-rence on Communications (ICC).IEEE,2017:1-6.
[50]KIM S.An Effective Sensor Cloud Control Scheme based on a Two-stage Game Approach[J].IEEE Access,2018,PP(99):20430-20439.
[1] CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323.
[2] GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321.
[3] WANG Zheng, JIANG Chun-mao. Cloud Task Scheduling Algorithm Based on Three-way Decisions [J]. Computer Science, 2021, 48(6A): 420-426.
[4] PAN Rui-jie, WANG Gao-cai, HUANG Heng-yi. Attribute Access Control Based on Dynamic User Trust in Cloud Computing [J]. Computer Science, 2021, 48(5): 313-319.
[5] CHEN Yu-ping, LIU Bo, LIN Wei-wei, CHENG Hui-wen. Survey of Cloud-edge Collaboration [J]. Computer Science, 2021, 48(3): 259-268.
[6] WANG Wen-juan, DU Xue-hui, REN Zhi-yu, SHAN Di-bin. Reconstruction of Cloud Platform Attack Scenario Based on Causal Knowledge and Temporal- Spatial Correlation [J]. Computer Science, 2021, 48(2): 317-323.
[7] JIANG Hui-min, JIANG Zhe-yuan. Reference Model and Development Methodology for Enterprise Cloud Service Architecture [J]. Computer Science, 2021, 48(2): 13-22.
[8] MAO Han-yu, NIE Tie-zheng, SHEN De-rong, YU Ge, XU Shi-cheng, HE Guang-yu. Survey on Key Techniques and Development of Blockchain as a Service Platform [J]. Computer Science, 2021, 48(11): 4-11.
[9] WANG Qin, WEI Li-fei, LIU Ji-hai, ZHANG Lei. Private Set Intersection Protocols Among Multi-party with Cloud Server Aided [J]. Computer Science, 2021, 48(10): 301-307.
[10] ZHNAG Kai-qi, TU Zhi-ying, CHU Dian-hui, LI Chun-shan. Survey on Service Resource Availability Forecast Based on Queuing Theory [J]. Computer Science, 2021, 48(1): 26-33.
[11] LEI Yang, JIANG Ying. Anomaly Judgment of Directly Associated Nodes Under Cloud Computing Environment [J]. Computer Science, 2021, 48(1): 295-300.
[12] XU Yun-qi, HUANG He, JIN Zhong. Application Research on Container Technology in Scientific Computing [J]. Computer Science, 2021, 48(1): 319-325.
[13] LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323.
[14] MA Xiao-xiao and HUANG Yan. Publicly Traceable Accountable Ciphertext Policy Attribute Based Encryption Scheme Supporting Large Universe [J]. Computer Science, 2020, 47(6A): 420-423.
[15] JIN Xiao-min, HUA Wen-qiang. Energy Optimization Oriented Resource Management in Mobile Cloud Computing [J]. Computer Science, 2020, 47(6): 247-251.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!