Downloads: 151 | Views: 303
Research Paper | Computer Science & Engineering | China | Volume 8 Issue 6, June 2019 | Popularity: 6.8 / 10
Distributed Data Provenance (DDP) to Secure the Sensor Data Stream
Mohammad Amanul Islam
Abstract: Introducing provenance has already been established as a very substantial approach of securing the sensor data that records the history (e. g. , creation, ownership, significance) and operations performed on the data or its travel path. The data provenance is also crucial for ensuring data accountability and privacy as preserving the quality of data stored in numerous systems. Hence, keeping the provenance information requires to address several challenges including storage overhead, high throughput, and secure transmission, etc. In this paper, we propose an architecture of distributed data provenance that avoids the problem of data degradation because of adding a large size of data provenance. Moreover, it enables the transparency of data accountability, helps to enhance the privacy and availability of data provenance. In this scheme, the provenance signifies the creation history of data in the hash form of data, and it has been distributed as chained information with the data into the given data payload of the data packet. Experiments demonstrate the efficiency, scalability on the provenance encoding capacity of the proposed scheme, and the reliability of this scheme has been illustrated with low transmission overhead for the payload storage application of a packet in the wireless sensor environment.
Keywords: bits, data, provenance, payload, wireless sensor network
Edition: Volume 8 Issue 6, June 2019
Pages: 410 - 419
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 658 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 91 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1626 - 1628Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian