The Security Issue of WSNs Based on Cloud Computing

被引:0
|
作者
Xie, Yuanpeng [1 ]
Zhang, Jinsong [2 ]
Fu, Ge [2 ]
Wen, Hong [1 ]
Han, Qiyi [1 ]
Zhu, Xiping [1 ]
Jiang, Yixin [3 ]
Guo, Xiaobin [3 ]
机构
[1] Univ Elec Sci & Tech China, Natl Key Lab Commun, Chengdu 610054, Peoples R China
[2] Yunnan Yundian Tongfang Technol Co Ltd, Kunming 650217, Peoples R China
[3] China Southern Power Grid, Elect Power Res Inst, Guangzhou 510080, Guangdong, Peoples R China
来源
2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2013年
关键词
Security; WSNs; cloud computing; framework;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The combination of WSNs and cloud computing actually does overcome the problems such as storage issues, real-time processing aporia, and ubiquitous accessibility challenge due to the low-power, small-size characteristics of WSNs. But there still exist some other issues, particularly security issues. In this paper, we present a pub/sub based framework of the combination paradigm, and we discuss about the advantages and disadvantages including the security challenges of the new paradigm. Finally, the solutions to security problem will be presented at last.
引用
收藏
页码:383 / +
页数:2
相关论文
共 50 条
  • [21] A NOVEL BASED SECURITY ARCHITECTURE OF CLOUD COMPUTING
    Gupta, Subham Kumar
    Rawat, Seema
    Kumar, Praveen
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [22] Study of Data Security Based On Cloud Computing
    Wang, Honghua
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1609 - 1611
  • [23] Research on Security of the Client Based on Cloud Computing
    Xu Xiaoping
    Yan Junhu
    2012 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING (ICAISC 2012), 2012, 12 : 1 - 6
  • [24] Special Issue on security and privacy in Internet of Things and cloud computing systems
    Woungang, Isaac
    Dhurandher, Sanjay Kumar
    Rodrigues, Joel J. P. C.
    Awad, Ahmed
    SECURITY AND PRIVACY, 2018, 1 (03):
  • [25] Security in cloud computing
    International Journal of Information Security, 2014, 13 : 95 - 96
  • [26] Security for Cloud Computing
    Nazeer, Shahrin A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (07): : 51 - 60
  • [27] On Cloud Computing Security
    Bai, Yun
    Policarpio, Sean
    RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 388 - 396
  • [28] Cloud Computing Security
    Carlin, Sean
    Curran, Kevin
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2011, 3 (01) : 14 - 19
  • [29] Security in Cloud Computing
    Rishitha
    Reshmi, T. R.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 14 - 20
  • [30] Security in cloud computing
    Gritzalis, Stefanos
    Mitchell, Chris
    Thuraisingham, Bhavani
    Zhou, Jianying
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) : 95 - 96