A Probability based Model for Big Data Security in Smart City

被引:3
作者
Dattana, Vishal [1 ]
Gupta, Kishu [2 ]
Kush, Ashwani [3 ]
机构
[1] Middle East Coll, Dept Comp, Muscat, Oman
[2] Kurukshetra Univ, Dept Comp Sci & Applicat, Kurukshetra 136119, Haryana, India
[3] Kurukshetra Univ, Univ Coll, Kurukshetra 136119, Haryana, India
来源
2019 4TH MEC INTERNATIONAL CONFERENCE ON BIG DATA AND SMART CITY (ICBDSC) | 2019年
关键词
Big data; Bigraph; Data Analytics; Data Leakage; Guilt Model; IoT; Smart City;
D O I
10.1109/icbdsc.2019.8645607
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart technologies at hand have facilitated generation and collection of huge volumes of data, on daily basis. It involves highly sensitive and diverse data like personal, organisational, environment, energy, transport and economic data. Data Analytics provide solution for various issues being faced by smart cities like crisis response, disaster resilience, emergence management, smart traffic management system etc.; it requires distribution of sensitive data among various entities within or outside the smart city,. Sharing of sensitive data creates a need for efficient usage of smart city data to provide smart applications and utility to the end users in a trustworthy and safe mode. This shared sensitive data if get leaked as a consequence can cause damage and severe risk to the city's resources. Fortification of critical data from unofficial disclosure is biggest issue for success of any project. Data Leakage Detection provides a set of tools and technology that can efficiently resolves the concerns related to smart city critical data. The paper, showcase an approach to detect the leakage which is caused intentionally or unintentionally. The model represents allotment of data objects between diverse agents using Bigraph. The objective is to make critical data secure by revealing the guilty agent who caused the data leakage.
引用
收藏
页码:163 / 168
页数:6
相关论文
共 21 条
[1]   Lime: Data lineage in the malicious environment [J].
Backes, Michael ;
Grimm, Niklas ;
Kate, Aniket .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 :183-187
[2]  
Croft J, 2011, 6 USENIX C HOT TOP S, P7
[3]  
Gafny M., 2010, P 2010 ACM WORKSHOP, P3, DOI [DOI 10.1145/1866886.1866890, 10.1145/1866886.1866890]
[4]  
GUPTA A, 2017, INT J ENG ADV TECHNO, V7, P153, DOI DOI 10.2174/2210315506666161116122434
[5]   A Probabilistic Approach for Guilty Agent Detection using Bigraph after Distribution of Sample Data [J].
Gupta, Ishu ;
Singh, Ashutosh Kumar .
6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS, 2018, 125 :662-668
[6]  
Gupta K, 2018, 5 INT C COMP SUST GL, P3957
[7]   M-Score: A Misuseability Weight Measure [J].
Harel, Amir ;
Shabtai, Asaf ;
Rokach, Lior ;
Elovici, Yuval .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (03) :414-428
[8]  
Ismail A, 2016, 3 MEC INT C BIG DAT, P1
[9]  
Kaur Kuljeet, 2017, 2017 IEEE Power & Energy Society General Meeting, DOI 10.1109/PESGM.2017.8274627
[10]  
Kaur K., 2017, Int. J. Netw. Secur. Its Appl, V9, P21, DOI [10.5121/ijnsa.2017.9502, DOI 10.5121/IJNSA.2017.9502]