Abstract
Cloud computing is a web-based computing where in the services based on Internet such as data, storage, and computing resources are delivered to the local devices through Internet. Meanwhile, wireless sensor network deals with monitoring and gathering of the information about the physical or environmental conditions. The integration of these two domains has tremendous advantages to improve the business infrastructure and performance over worldwide. The security of data on the cloud and calculation of trust and reputation of the cloud service providers (CSP) and sensor network providers (SNP) are the issues for this new paradigm. To fulfill these issues paper presents novel techniques 1) trust and reputation calculation 2) providing data security on cloud 3) choosing desirable CSP and SNP for the service. This paper proposes data security by taking into account the service of wireless sensor network (WSN) and cloud service providers. Our experimental results help users to choose the best service providers in case of both cloud and wireless sensor network. A better security for the data in the cloud is provided using trust and reputation calculation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw J 38(4):393–422
Yuriyama M, Kushida T (2010) Sensor-cloud infrastructure—physical sensor management with virtualized sensors on cloud computing. In: 13th International conference on network-based information systems (NBiS), pp 1–8
Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616
Zhu C, Nicanfar H, Leung VCM, Yang LT (2015) An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans Inf Forensics Secur 10(1)
Guo MH, Liaw HT, Hsiao LL, Huang CY, Yen CT (2013) Authentication using graphical password in cloud. In: 15th International symposium on wireless personal multimedia communications (WPMC), pp 177–181
Shin SH, Kim DH, Yoo KY (2012) Lightweight multi-user authentication scheme based on cellular automata in cloud environment. In: 1st International conference on cloud networking (CLOUDNET), pp 176–178
Sun YL, Han Z, Yu W, Liu KJR (2006) A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. In: 25th IEEE international conference on computer communications INFOCOM, pp 1–13
Sun Y, Liu Y (2012) Security of online reputation systems: the evolution of attacks and defenses. IEEE Signal Process Mag 29(2):87–97
Grzonkowski S, Corcoran P (2011) Sharing cloud services: user authentication for social enhancement of home networking. IEEE Trans Consum Electron 57(3):1424–1432
Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw (TOSN) 4(3)
Choudhury AJ, Kumar P, Sain M, Lim H, Jae-Lee H (2011) A strong user authentication framework for cloud computing. In: IEEE Asia-Pacific services computing conference (APSCC), pp 110–115
Dinesha HA, Agrawal VK (2012) Multi-dimensional password generation technique for accessing cloud services. Cloud Comput Serv Arch J 2(3):31–39
Ruj S, Stojmenovic M, Nayak A (2014) Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans Parallel Distrib Syst 25(2)
Zhu C, Wang H, Leung VCM, Shu L, Yang LT (2014) An evaluation of user importance when integrating social networks and mobile cloud computing. In: IEEE conference global communications (GLOBECOM), pp 2935–2949
Fortino G, Pathan M, Di Fatta G (2012) BodyCloud: integration of cloud computing and body sensor networks. In: IEEE 4th international conference on cloud computing technology and science (CloudCom), pp 851–856
Yu H, Shen Z, Miao C, Leung C, Niyato D (2010) A survey of trust and reputation management systems in wireless communications. IEEE J 98(10):1755–1772
Qin T, Yu H, Leung C, Shen Z, Miao C (2009) Towards a trust aware cognitive radio architecture. ACM Sigmob Mob Comput Commun J 13(2):86–95
Singh A, Chatterjee K, A Multi-dimensional trust and reputation calculation model for cloud computing environments. Computer Science and Engineering National Institute of Technology, Patna, Bihar, India
Rajesh V, Gnanasekar JM, Ponmagal RS, Anbalagan P (2010) Integration of wireless sensor network with cloud. In: International conference on recent trends in information, telecommunication and computing (ITC), pp 321–323
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Buddesab, Bhavyashree, S.P., Thriveni, J., Venugopal, K.R. (2019). Integration of Wireless Sensor Network and Cloud Computing Using Trust and Reputation Technique. In: Sridhar, V., Padma, M., Rao, K. (eds) Emerging Research in Electronics, Computer Science and Technology. Lecture Notes in Electrical Engineering, vol 545. Springer, Singapore. https://doi.org/10.1007/978-981-13-5802-9_7
Download citation
DOI: https://doi.org/10.1007/978-981-13-5802-9_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5801-2
Online ISBN: 978-981-13-5802-9
eBook Packages: EngineeringEngineering (R0)