Skip to main content

Integration of Wireless Sensor Network and Cloud Computing Using Trust and Reputation Technique

  • Conference paper
  • First Online:
Emerging Research in Electronics, Computer Science and Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 545))

Abstract

Cloud computing is a web-based computing where in the services based on Internet such as data, storage, and computing resources are delivered to the local devices through Internet. Meanwhile, wireless sensor network deals with monitoring and gathering of the information about the physical or environmental conditions. The integration of these two domains has tremendous advantages to improve the business infrastructure and performance over worldwide. The security of data on the cloud and calculation of trust and reputation of the cloud service providers (CSP) and sensor network providers (SNP) are the issues for this new paradigm. To fulfill these issues paper presents novel techniques 1) trust and reputation calculation 2) providing data security on cloud 3) choosing desirable CSP and SNP for the service. This paper proposes data security by taking into account the service of wireless sensor network (WSN) and cloud service providers. Our experimental results help users to choose the best service providers in case of both cloud and wireless sensor network. A better security for the data in the cloud is provided using trust and reputation calculation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw J 38(4):393–422

    Google Scholar 

  2. Yuriyama M, Kushida T (2010) Sensor-cloud infrastructure—physical sensor management with virtualized sensors on cloud computing. In: 13th International conference on network-based information systems (NBiS), pp 1–8

    Google Scholar 

  3. Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18

    Article  Google Scholar 

  4. Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616

    Google Scholar 

  5. Zhu C, Nicanfar H, Leung VCM, Yang LT (2015) An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans Inf Forensics Secur 10(1)

    Google Scholar 

  6. Guo MH, Liaw HT, Hsiao LL, Huang CY, Yen CT (2013) Authentication using graphical password in cloud. In: 15th International symposium on wireless personal multimedia communications (WPMC), pp 177–181

    Google Scholar 

  7. Shin SH, Kim DH, Yoo KY (2012) Lightweight multi-user authentication scheme based on cellular automata in cloud environment. In: 1st International conference on cloud networking (CLOUDNET), pp 176–178

    Google Scholar 

  8. Sun YL, Han Z, Yu W, Liu KJR (2006) A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. In: 25th IEEE international conference on computer communications INFOCOM, pp 1–13

    Google Scholar 

  9. Sun Y, Liu Y (2012) Security of online reputation systems: the evolution of attacks and defenses. IEEE Signal Process Mag 29(2):87–97

    Google Scholar 

  10. Grzonkowski S, Corcoran P (2011) Sharing cloud services: user authentication for social enhancement of home networking. IEEE Trans Consum Electron 57(3):1424–1432

    Google Scholar 

  11. Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw (TOSN) 4(3)

    Google Scholar 

  12. Choudhury AJ, Kumar P, Sain M, Lim H, Jae-Lee H (2011) A strong user authentication framework for cloud computing. In: IEEE Asia-Pacific services computing conference (APSCC), pp 110–115

    Google Scholar 

  13. Dinesha HA, Agrawal VK (2012) Multi-dimensional password generation technique for accessing cloud services. Cloud Comput Serv Arch J 2(3):31–39

    Google Scholar 

  14. Ruj S, Stojmenovic M, Nayak A (2014) Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans Parallel Distrib Syst 25(2)

    Google Scholar 

  15. Zhu C, Wang H, Leung VCM, Shu L, Yang LT (2014) An evaluation of user importance when integrating social networks and mobile cloud computing. In: IEEE conference global communications (GLOBECOM), pp 2935–2949

    Google Scholar 

  16. Fortino G, Pathan M, Di Fatta G (2012) BodyCloud: integration of cloud computing and body sensor networks. In: IEEE 4th international conference on cloud computing technology and science (CloudCom), pp 851–856

    Google Scholar 

  17. Yu H, Shen Z, Miao C, Leung C, Niyato D (2010) A survey of trust and reputation management systems in wireless communications. IEEE J 98(10):1755–1772

    Google Scholar 

  18. Qin T, Yu H, Leung C, Shen Z, Miao C (2009) Towards a trust aware cognitive radio architecture. ACM Sigmob Mob Comput Commun J 13(2):86–95

    Google Scholar 

  19. Singh A, Chatterjee K, A Multi-dimensional trust and reputation calculation model for cloud computing environments. Computer Science and Engineering National Institute of Technology, Patna, Bihar, India

    Google Scholar 

  20. Rajesh V, Gnanasekar JM, Ponmagal RS, Anbalagan P (2010) Integration of wireless sensor network with cloud. In: International conference on recent trends in information, telecommunication and computing (ITC), pp 321–323

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Buddesab .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Buddesab, Bhavyashree, S.P., Thriveni, J., Venugopal, K.R. (2019). Integration of Wireless Sensor Network and Cloud Computing Using Trust and Reputation Technique. In: Sridhar, V., Padma, M., Rao, K. (eds) Emerging Research in Electronics, Computer Science and Technology. Lecture Notes in Electrical Engineering, vol 545. Springer, Singapore. https://doi.org/10.1007/978-981-13-5802-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5802-9_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5801-2

  • Online ISBN: 978-981-13-5802-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics