Secure and Dependable Distributed Data Storage and Access Control by mrz53354

VIEWS: 13 PAGES: 6

									SECURE AND DEPENDABLE
DISTRIBUTED DATA STORAGE
AND ACCESS CONTROL IN
WIRELESS SENSOR NETWORKS


                 Kui Ren
   ECE, Illinois Institute of Technology


               Wenjing Lou
   ECE, Worcester Polytechnic Institute
DATA STORAGE AND ACCESS IN WSNS
   Centralized approach
       Sensing data are sent back to a center location, such as a
        sink, for storage and access
       Real-time (or short-epoch) monitoring applications, where
        frequent updates and timely delivery of sensing data are
        vital
   Distributed approach
       Collected data are stored in-network, accessed in
        distributed fashion by users
       Long-epoch applications, where acquired data are queried
        infrequently by users, some in-network data processing is
        necessary, or the communication channel is not always
        readily available or it is not necessary to report the
        collected data in real time
       Unattended WSNs, In-situ data storage WSNs, Storage-
        centric WSNs, Asynchronous WSNs
SECURITY THREATS TO DISTRIBUTED
DATA STORAGE AND ACCESS
   Unique Challenges
       In centralized approach, the data storage device, i.e. the
        sink, is a well protected trusted entity.
       In distributed approach, data storage devices, i.e., sensor
        nodes, are subject to failure and compromise.
   New Security Threats
       Critical data may get lost due to the failure of sensor
        devices
       Confidential data may be compromised by the adversary
        through compromising a selective subset of sensor nodes
       Data items may be maliciously modified without being
        detected through compromising a selective subset of sensor
        nodes
       A group of compromised users may gain access to data they
        are not entitled through colluding
DISTRIBUTED DATA STORAGE

   Security Objective
       Fault-tolerant and compromise-resilient data storage
   New Approaches
     Individual storage or simple replica are insecure and
      inefficient, low survivability
     Solutions based on secret sharing and erasure coding
      for better security and dependability
     Dynamic data integrity verification to ensure
      dynamic data security and dependability
     Algebraic signature based schemes for dynamic data
      security due to its homomorphic property
DISTRIBUTE DATA ACCESS CONTROL

   Security Objective
       Fine-grained distributed data access control that is
        collusion-resistance
   New Approaches
     State-of-the-art secret key cryptography based
      solutions are inadequate in terms of collusion
      resistance and inefficient for fine-grained access
      control
     Exploiting both user hierarchy and sensor
      heterogeneity to design lightweight SKC based fine-
      grained data access control
     Attribute-based encryption (ABE) for a collusion
      resilient, more flexible and fine-grained access
      structure
THANK YOU !

								
To top