The Security Issue of WSNs Based on Cloud Computing

被引:0
|
作者
Xie, Yuanpeng [1 ]
Zhang, Jinsong [2 ]
Fu, Ge [2 ]
Wen, Hong [1 ]
Han, Qiyi [1 ]
Zhu, Xiping [1 ]
Jiang, Yixin [3 ]
Guo, Xiaobin [3 ]
机构
[1] Univ Elec Sci & Tech China, Natl Key Lab Commun, Chengdu 610054, Peoples R China
[2] Yunnan Yundian Tongfang Technol Co Ltd, Kunming 650217, Peoples R China
[3] China Southern Power Grid, Elect Power Res Inst, Guangzhou 510080, Guangdong, Peoples R China
来源
2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2013年
关键词
Security; WSNs; cloud computing; framework;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The combination of WSNs and cloud computing actually does overcome the problems such as storage issues, real-time processing aporia, and ubiquitous accessibility challenge due to the low-power, small-size characteristics of WSNs. But there still exist some other issues, particularly security issues. In this paper, we present a pub/sub based framework of the combination paradigm, and we discuss about the advantages and disadvantages including the security challenges of the new paradigm. Finally, the solutions to security problem will be presented at last.
引用
收藏
页码:383 / +
页数:2
相关论文
共 50 条
  • [1] The security issue of wsns based on cloud computing for smart grid
    National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, 610054, Chengdu, China
    Inf. Technol. J., 2013, 22 (6702-6709):
  • [2] Special issue on security in cloud computing
    Jaatun, Martin Gilje
    Lambrinoudakis, Costas
    Rong, Chunming
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2012, 1 (01): : 1 - 2
  • [3] Cloud computing, Reliability and Security Issue
    Ghobadi, Alireza
    Karimi, Roozbeh
    Heidari, Farnaz
    Samadi, Masoud
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 504 - 510
  • [4] Cloud Computing Security Issue: Survey
    Kamal, Shailza
    Kaur, Rajpreet
    2ND INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-11), 2011, 1414
  • [5] Special issue on security in cloud computing
    Li, Jin
    Castiglione, Aniello
    Dong, Changyu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 110 : 97 - 98
  • [6] Special issue on trust and security in cloud computing
    Ko, Ryan K. L.
    Kirchberg, Markus
    Lee, Bu Sung
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2183 - 2184
  • [7] Special Issue on: Security for Cloud Computing Preface
    Enokido, Tomoya
    Chen, Xiaofeng
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 1 - 2
  • [8] A Review on Security Issue in Security Model of Cloud Computing Environment
    Venkatakotireddy, G.
    Rao, B. Thirumala
    Vurukonda, Naresh
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2017, 2018, 668 : 207 - 212
  • [9] Editorial of special issue on security and privacy in cloud computing
    Hao, Feng
    Yi, Xun
    Bertino, Elisa
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 27-28 : 1 - +
  • [10] Special Issue on Security and Privacy in Cloud Computing Preface
    Tsai, Sang-Bing
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2020, 32 (03) : V - VI