The Security Issue of WSNs Based on Cloud Computing

被引:0
|
作者
Xie, Yuanpeng [1 ]
Zhang, Jinsong [2 ]
Fu, Ge [2 ]
Wen, Hong [1 ]
Han, Qiyi [1 ]
Zhu, Xiping [1 ]
Jiang, Yixin [3 ]
Guo, Xiaobin [3 ]
机构
[1] Univ Elec Sci & Tech China, Natl Key Lab Commun, Chengdu 610054, Peoples R China
[2] Yunnan Yundian Tongfang Technol Co Ltd, Kunming 650217, Peoples R China
[3] China Southern Power Grid, Elect Power Res Inst, Guangzhou 510080, Guangdong, Peoples R China
来源
2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2013年
关键词
Security; WSNs; cloud computing; framework;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The combination of WSNs and cloud computing actually does overcome the problems such as storage issues, real-time processing aporia, and ubiquitous accessibility challenge due to the low-power, small-size characteristics of WSNs. But there still exist some other issues, particularly security issues. In this paper, we present a pub/sub based framework of the combination paradigm, and we discuss about the advantages and disadvantages including the security challenges of the new paradigm. Finally, the solutions to security problem will be presented at last.
引用
收藏
页码:383 / +
页数:2
相关论文
共 50 条
  • [31] Security in Cloud Computing
    Sharma, Vani Dayal
    Agarwai, Somya
    Moin, Syeda Shira
    Qadeer, Mohammed Abdul
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 234 - 239
  • [32] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
  • [33] Cloud computing and cloud security in China
    Zhang, Shaohe
    Jiang, Cuenyun
    Wang, Ruxin
    ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955
  • [34] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
  • [35] Research on the Data Storage Security based on Cloud Computing
    Ma, Xinqiang
    Huang, Yi
    Zhang, Yongdan
    Liu, Youyuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331
  • [36] The Research Based on Security Model and Cloud Computing Strategy
    Pei, Aoqiu
    Yang, Min
    Tang, Yanbin
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1600 - 1603
  • [37] Threshold Cryptography Based Data Security in Cloud Computing
    Saroj, Sushil Kr
    Chauhan, Sanjeev Kr
    Sharma, Aravendra Kr
    Vats, Sundaram
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 202 - 207
  • [38] Security Framework for Agent-Based Cloud Computing
    Venkateshwaran, K.
    Malviya, Anu
    Dikshit, Utkarsha
    Venkatesan, S.
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2015, 3 (03): : 35 - 42
  • [39] Agent Based Security for Cloud Computing using Obfuscation
    Govinda, K.
    Sathiyamoorthy, E.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 125 - 129
  • [40] Research on Cloud Computing Security Based on the Remote Attestation
    Xie, Fu
    Du, Yunyun
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2657 - 2664