Threat Management in Data-centric IoT-Based Collaborative Systems

被引:3
作者
Felemban, Muhamad [1 ]
Felemban, Emad [2 ]
Kobes, Jason [3 ]
Ghafoor, Arif [4 ]
机构
[1] KFUPM, COE POB 5065, Dhahran 31261, Saudi Arabia
[2] Umm Alqura Univ, Alawali Makkah 24381, Saudi Arabia
[3] Northrop Grumman, Falls Church, VA USA
[4] Purdue Univ, 610 Purdue Mall, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
Threat management; Internet-of-Things; database systems; cost-driven optimization; INTERNET; SERVICES; THINGS; ARCHITECTURE; SECURITY; DESIGN;
D O I
10.1145/3323232
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we propose a threat management system (FMS) for Data-centric Internet-of-Things-based Collaborative Systems (DIoTCSs). In particular, we focus on tampering attacks that target shared databases and can affect the execution of the DIoTCS services. The novelty of the proposed system is to isolate the damage caused by tampering attacks into data partitions. We formulate the partitioning problem as a cost-driven optimization problem, prove its NP-hardness, and propose two polynomial-time heuristics. We evaluate a TMS experimentally and demonstrate that intelligent partitioning of the database improves the overall availability of the DIoTCS.
引用
收藏
页数:19
相关论文
共 36 条
  • [1] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [2] A Distributed Access Control Architecture for Cloud Computing
    Almutairi, Abdulrahman A.
    Sarfraz, Muhammad I.
    Basalamah, Saleh
    Aref, Walid G.
    Ghafoor, Arif
    [J]. IEEE SOFTWARE, 2012, 29 (02) : 36 - 44
  • [3] Recovery from malicious transactions
    Ammann, P
    Jajodia, S
    Liu, P
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2002, 14 (05) : 1167 - 1185
  • [4] Balanced graph partitioning
    Andreev, Konstantin
    Raecke, Harald
    [J]. THEORY OF COMPUTING SYSTEMS, 2006, 39 (06) : 929 - 939
  • [5] Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
  • [6] Multi-representation based Data Processing Architecture for IoT Applications
    Arora, Vaibhav
    Nawab, Faisal
    Agrawal, Divyakant
    El Abbadi, Amr
    [J]. 2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, : 2234 - 2239
  • [7] Bernstein P. A., 1986, Concurrency Control and Recovery in Database Systems
  • [8] Internet of Things for Enterprise Systems of Modern Manufacturing
    Bi, Zhuming
    Xu, Li Da
    Wang, Chengen
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (02) : 1537 - 1546
  • [9] Browder K., 2002, Oracle Technical White Paper, V500
  • [10] IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges
    Cai, Hongming
    Xu, Boyi
    Jiang, Lihong
    Vasilakos, Athanasios V.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (01): : 75 - 87