Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Authorized Verification for Distributed Data Storage and Security

Author : Patan Rabbani 1 S.Vishwanath Reddy 2

Date of Publication :7th August 2015

Abstract: Authentication is any process by which a system verifies the identity of a User who wishes to access it. Since Access Control is normally based on the identity of the User who requests access to a resource ,Authentication is essential to effective Security When authentication is required of art or physical objects, this proof could be a friend, family member or colleague attesting to the item's provenance, perhaps by having witnessed the item in its creator's. Data storage security is a wide-ranging area that covers everything from legal compliance, through preparedness for e-discovery requests to user access control and the physical security of data storage. The potential for such data to support scientific discovery and optimization of existing systems is significant, but only if it can be integrated and analyzed in a meaningful way by a wide range of investigators. A novel class of incentive mechanisms is proposed to attract extensive users to truthfully participate in crowd sensing applications with a given budget constraint. The class mechanisms also bring good service quality for the requesters in crowd sensing applications. Although it is so important, there still exists many verification and privacy challenges, including users’ bids and subtask information privacy and identification privacy, winners’ set privacy of the platform, and the security of the payment outcomes. In this paper, we present a privacy-preserving verifiable incentive mechanism for crowd sensing applications with the budget constraint, not only to explore how to protect the privacies of users and the platform, but also to make the verifiable payment correct between the platform and users for crowd sensing applications. Results indicate that our privacypreserving verifiable incentive mechanism achieves the same results as the generic one without privacy preservation.

Reference :

    1. B. Sheng, Q. Li, and W. Mao, “Data storage placement in sensor networks,” in ACM MobiHoc’06, Florence, Italy, May 2006, pp. 344–355.
    2. W. Zhang, H. Song, S. Zhu, and G. Cao, “Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks,” in ACM MobiHoc’05, Urbana-Champaign, IL, USA,May 2005, pp. 378–389.
    3. H. Wang and Q. Li, “Distributed user access control in sensor networks,” in DCOSS’06, San Francisco, CA, June 2006, pp. 305–320.
    4. D. Liu, “Efficient and distributed access control in sensor networks,” in DCOSS ’07, Santa Fe, New Mexico, USA, June 2007
    5. W.E. Cobb, E.D. Lapse, R.O. Baldwin, M.A. Temple, and Y.C. Kim, " Transfer of information on Information Forensics and Security” vol. 2, no. 4, pp. 14-24, Dec 2009
    6. K. Ren, W. Lou, and Y. Zhang, “Multi-user broadcast authentication in wireless sensor networks,” in IEEE SECON’07, San Diego, CA, June 2007, pp. 223–232.
    7. M. Shao, S. Zhu, W. Zhang, and G.Cao, “pDCS: Security and privacy support for data-centric sensor networks,” in IEEE INFOCOM’07, Anchorage, Alaska, USA, May 2007, pp. 1298–1306.
    8. Y. Zhou, Y. Zhang, and Y. Fang, “Access control in wireless sensor networks,” Ad Hoc Networks, Special Issue on Security in Ad Hoc and Sensor Networks, vol. 5, no. 1, pp. 3–13, Jan. 2007. .
    9. NOPP, http://www.nopp.org/.
    10. IOOS, http://www.ocean.us/
    11. B. Carbunar, Y. Yu, L. Shi, M. Pearce, and V. Vasudevan, “Query privacy in wireless sensor networks,” in SECON ’07, San Diego, CA, USA, June 2007, pp. 203– 212.
    12. K. Ren, W. Lou, K. Kim, and R. Deng, “A novel privacy preserving authentication and access control scheme for pervasive computing environment,” in IEEE Transactions on Vehicular Technology, 2006.
    13. S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient security mechanisms for large-scale distributed sensor networks,” in ACM CCS’03, Washington, DC, Oct. 2003, pp. 62–72.
    14. H. Chan, A. Perrig, and D. Song, “Random key pre distribution schemes for sensor networks,” in S&P’03, Oakland, CA, May 2003, pp. 197–213.
    15. D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” in ACM CCS’03, Washington, DC, Oct. 2003, pp. 52–61.
    16. Y. Zhang,W.Liu, W.Lou, and Y. Compromisetolerant Fang,“Location-based security mechanisms for wireless sensor networks,” IEEE J. Select. Areas Commun., Special Issue on Security in Wireless Ad Hoc Networks, vol.24,no.2,pp.247-260 feb 2006

Recent Article