Abstract
Big data and Internet of Things (IoT) are the highly sought-after frameworks these days because IoT connects abundant amount of data which cannot be labeled and stored in the typical database system. Generating intelligent decisions from enormously increasing data in a real-time system is of major concern. Although big data seems to change our lives, it tries to make a burden in the computing environment due to the proliferation of data. In such a context, the efficient collection, processing, analyzing and secure storage are identified to be some of the crucial steps. The continuous flow of incoming data to the big data is the first and major challenge and this concern may play a key role in designing a viable and secure big data. In addition, the security issues can be even worse when the stored data include highly sensitive and confidential information. Therefore, if strong security measures are not applied in big data storage, it will cause some vital consequences. Trust management can be considered as a critical factor which operates seamlessly behind the scenes in IoT big data era to provide a reliable communication between devices. This chapter aims to disclose the trust management techniques prevailing in IoT with a special focus on big data technologies, and will outline the new developments and approaches that are applicable in these areas.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134
Ahmed E et al (2017) The role of big data analytics in internet of things. Comput Netw 129:459–471
Yuan J, Li X (2018) A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. IEEE Access 6(c):23626–23638
Bashir AQ, Rizwan M, Gill (2016) Towards an IoT big data analytics framework : smart buildings systems. In: High performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS), pp 1325–1332
Ahmad A, Member S, Rathore MM, Member S, Paul A, Member S (2016) Defining human behaviors using big data analytics in social internet of things. In: Advanced information networking and applications (AINA), 2016 IEEE 30th international conference on
Ilapakurti A, Kedari S (2016) The role of big data in creating sense EHR, an integrated approach to create next generation mobile sensor and wearable data driven electronic health record. In: Big data computing service and applications (BigDataService), 2016 IEEE second international conference on
Arora D, Li KF, Loffler A (2016) Big data analytics for classification of network enabled devices. In: Advanced information networking and applications workshops (WAINA), 2016 30th international conference on, pp 708–713
Herwindra M, Tegar B, Rindang E, Buyung S, Wahana J, Luhung A (2016) Design and implementation of smart environment monitoring and analytics in real-time system framework based on internet of underwater things and big data. In: Electronics symposium (IES), 2016 international, pp 403–408
Ding Z, Gao X, Xu J, Wu H (2013) IOT-StatisticDB : a general statistical database cluster mechanism for big data analysis in the internet of things. In: Green computing and communications (GreenCom) IEEE and internet of things (iThings/CPSCom), IEEE international conference on and IEEE cyber, physical and social computing, pp 535–543
Lee CKM, Yeung CL, Cheng MN (2015) Research on IoT based cyber physical system for industrial big data analytics. In: Industrial engineering and engineering management (IEEM), IEEE international conference on, pp 1855–1859
Sezer OB, Dogdu E, Ozbayoglu M, Onal A (2016) An extended IoT framework with semantics, big data, and analytics
Wang H, Osen OL, Lit G, Lit W, Dai H, Zeng W (2015) Big data and industrial internet of things for the maritime industry in Northwestern Norway. In: TENCON 2015-2015 IEEE region 10 conference, pp 1–5
Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (1999) The role of trust management in distributed systems security In: Secure internet programming, pp 185–210
Ben Abderrahim O (2017) TMCoI-SIOT : a trust management system based on communities of interest for the social internet of things, pp 747–752
Atzori L, Iera A, Morabito G (2011) SIoT: giving a social structure to the internet of things. IEEE Commun Lett 15(11):1193–1195
Valarmathi AMKML (2017) Trust management in the social internet of things. Wirel Pers Commun 96(2):2681–2691
Hasan R, Lee AJ, Yurcik W (2005) Toward a threat model for storage systems. In: Proceedings of the 2005 ACM workshop on storage security and survivability, pp 94–102
Ardagna CA, Damiani E, De Capitani S, Foresti S, Samarati P (2007) Trust management. In: Security, privacy, and trust in modern data management, pp 103–117
Alshehri M, Hussain FK (2018) A centralized trust management mechanism for the internet of things (CTM-IoT). Int Conf Broadband Wirel Comput, Commun Appl 12(February):533–543
Nitti M, Girau R, Atzori L, Member S (2013) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26:1–14
Ben Y, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the internet of things : a context-aware and multi- service approach. Comput Secur 2013:1–15
Chen D, Chang G, Sun D, Li J, Jia J (2014) TRM-IoT : a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(October 2011):1207–1228
Chen I, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9:482–495
Chen I, Triantis KP (2018) Trust-based service management of internet of things systems and its applications
Jayasinghe U, Otebolaku A, Um T, Lee GM (2017) Data centric trust evaluation and prediction framework for IOT. ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K) 2017(March):1–7
N. Networks (2012) ITU-T
Bao F, Chen I (2012) Dynamic trust management for internet of things applications, pp 1–6
Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: Wireless communications, vehicular technology, information theory and aerospace \& electronic systems (VITAE), 2013 3rd international conference on, pp 1–5
Javanmardi S, Shojafar M, Shariatmadari S, Ahrabi SS (2014) FR TRUST: a fuzzy reputation based model for trust management in semantic P2P grids. Int J Grid Util Comput 2:1–11
Jayasinghe U, Lee H, Lee GM (2015) A computational model to evaluate honesty in social internet of things
Singh K, Verma AK (2018) A fuzzy-based trust model for flying ad hoc networks (FANETs). Int J Commun Syst 31(6):e3517
Bao F, Chen I (2012) Dynamic trust management for the internet of things applications, pp 1–30
Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. Wirel VITAE 2013:1–5
Bao F, Chen I, Chang M, Cho J (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Service Manag 9(2):169–183
Alhadad N et al (2013) Graph-based trust model for evaluating trust using subjective logic to cite this version : HAL Id : hal-00871138 graph-based trust model for evaluating trust using subjective logic
Jayasinghe U, Member G, Lee GM, Member S, Um T (2018) Machine learning based trust computational model for IoT services. IEEE Trans Sustain Comput 3782(c):1–14
Jorge L (2015) Towards a generic trust management framework using a machine-learning-based trust model, pp 1343–1348
Mahmud M et al (2018) A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications. Cognit Comput 10:1–10
Caminha J, Perkusich A, Perkusich M (2018) A smart trust management method to detect on-off attacks in the internet of things. Security Commun Netw 2018:1–10
Deng S, Huang L, Xu G (2016) On deep learning for trust-aware recommendations in social networks. IEEE Trans Neural Netw Learn Syst 28:1–14
A. Engineering (2010) TrustWalker: a RandomWalk model for combining trust-based and item-based recommendation Mohsen. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, no. 1990, pp 397–406
Baras JS (2009) Graph algebraic interpretation of trust establishment in autonomic networks. Prepr. Wiley J. Networks
Garmsiri S, Hamzeh A (2015) New graph based trust similarity measure. Ciência e Nat 37(December):339–343
George G, Thampi SM (2018) A graph-based security framework for securing industrial IoT networks from vulnerability exploitations. IEEE Access 6(September):43586–43601
Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proc. twelfth Int. Conf. World Wide Web – WWW ’03, p 640
Khan ZA, Ullrich J, Herrmann P (2017) A trust-based resilient routing mechanism for the internet of things
Nizamkari NS (2017) A graph-based trust-enhanced recommender system for service selection in IOT. In: Inventive systems and control (ICISC), 2017 international conference on, pp 1–5
Li L, Cai W, Liang L, Fan L (2010) Design and analysis of Bayesian game in role based trust management. In: Information theory and information security (ICITIS), 2010 IEEE international conference on, pp 394–398
Feng R, Che S, Wang X, Wan J (2014) An incentive mechanism based on game theory for trust management. Security Commun Netw March:2318–2325
Lim H, Ghinita G, Bertino E, Kantarcioglu M (2012) A game-theoretic approach for high-assurance of data trustworthiness in sensor networks
Fang H, Xu L, Huang X (2015) Self-adaptive trust management based on game theory in fuzzy large-scale networks. Soft Comput 21:907–921
Xu G, Xu C, Tian X (2012) PSO-TPS : an optimal trust path selection algorithm based on particle swarm optimization in small world network, pp 12–16
Huang W, Deng Z, Li R, Tang X (2013) Trust-based particle swarm optimization for grid task scheduling. Appl Mech Mater 240:1331–1335
Eray U, Sen S, Burak A (2015) GenTrust : a genetic trust management model for peer-to-peer systems. Appl Soft Comput 34:693–704
Vijayarangan S, Suresh S, Megalai J (2016) Genetic algorithm based an optimized trust based traffic analyzer for wireless sensor networks to detect malicious activities. Middle-East J Sci Res 24:41–47. https://doi.org/10.20894/IJCNES.103.005.001.010
Sanadhya S, Singh S (2015) Trust calculation with ant colony optimization in online social Networks. Proc Comput Sci 54:186–195
Sun M, Shi Z, Chen S, Zhou Z, Duan Y (2017) Energy-efficient composition of configurable internet of things services. IEEE Access 99:25609–25622
Gómez Mármol F, Martínez Pérez G, Gómez Skarmeta AF (2009) TACS, a trust model for P2P networks. Wirel Pers Commun 51(1):153–164
Bao F, Chen I, Tech V (2012) Trust management for the internet of things and its application to service composition. In: World of wireless, mobile and multimedia networks (WoWMoM), 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
Wu G, Liu Z, Yao L, Xu Z, Wang W (2013) A fuzzy-based trust management in WSNs. J Internet Serv Inf … 2:124–135
Wang Y (2011) A probabilistic approach for maintaining trust based on evidence. J Artif Intell Res 40:221–267
Jøsang A (2002) The Beta reputation system. In: Proceedings of the 15th bled electronic commerce conference, pp 1–14
Ganeriwal S, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. Reputation-based Framew high Integr Sens networks 4:15
Sun Z, Zhang Z, Xiao C, Qu G (2017) D-S evidence theory based trust ant colony routing in WSN. China Commun 6:27–41
Che S, Feng R, Liang X, Wang X (2015) A lightweight trust management based on Bayesian and Entropy for wireless sensor networks. Scurity Commun Netw 2014:168–175
Qiu X, Zhang L, Wang S, Qian G (2010) A trust transitivity model based-on Dempster-Shafer theory. JNW 5(9):1025–1032
Feng R, Xu X, Zhou X, Wan J (2011) A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory. Sensors 11(2):1345–1360
Di Pietro R, Salleras X, Signorini M, Waisbard E (2018) A blockchain-based trust system for the internet of things In: Proc. 23nd ACM Symp. Access Control Model. Technol. – SACMAT ’18, pp 77–83
Di Pietro R, Salleras X, Signorini M, Waisbard E (2018) A blockchain-based trust system for the internet of things. Proc ACM Symp Access Control Model Technol SACMAT Part F1371:77–83
Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: a decentralized Blockchain-based authentication system for IoT. Comput Secur 78:126–142
Zyskind G, Pentland AS (2015) Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops, pp 180–184
Song JC, Demir MA, Prevost JJ, Rad P (2018) Blockchain design for trusted decentralized IoT networks In: 2018 13th Syst. Syst. Eng. Conf. SoSE 2018, pp 169–174
Huang Z, Su X, Zhang Y, Shi C, Zhang H, Xie L (2018) A decentralized solution for IoT data trusted exchange based-on blockchain. In: 2017 3rd IEEE Int. Conf. Comput. Commun. ICCC 2017, vol 2018–Janua, pp 1180–1184
Li J, Bai Y, Zaman N, Leung VCM (2017) A decentralized trustworthy context and QoS-aware service discovery framework for the internet of things. IEEE Access 5:19154–19166
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Fabi, A.K., Thampi, S.M. (2020). Secure Big Data Transmission with Trust Management for the Internet of Things (IoT). In: Fadlullah, Z., Khan Pathan, AS. (eds) Combating Security Challenges in the Age of Big Data. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-35642-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-35642-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-35641-5
Online ISBN: 978-3-030-35642-2
eBook Packages: Computer ScienceComputer Science (R0)