SEEN: A selective encryption method to ensure confidentiality for big sensing data streams

Deepak Puthal, Xindong Wu, Nepal Surya, Rajiv Ranjan, Jinjun Chen

Research output: Contribution to journalArticlepeer-review

31 Scopus citations

Abstract

Resource constrained sensing devices are being used widely to build and deploy self-organizing wireless sensor networks for a variety of critical applications such as smart cities, smart health, precision agriculture and industrial control systems. Many such devices sense the deployed environment and generate a variety of data and send them to the server for analysis as data streams. A Data Stream Manager (DSM) at the server collects the data streams (often called big data) to perform real time analysis and decision-making for these critical applications. A malicious adversary may access or tamper with the data in transit. One of the challenging tasks in such applications is to assure the trustworthiness of the collected data so that any decisions are made on the processing of correct data. Assuring high data trustworthiness requires that the system satisfies two key security properties: Confidentiality and integrity. To ensure the confidentiality of collected data, we need to prevent sensitive information from reaching the wrong people by ensuring that the right people are getting it. Sensed data are always associated with different sensitivity levels based on the sensitivity of emerging applications or the sensed data types or the sensing devices. For example, a temperature in a precision agriculture application may not be as sensitive as monitored data in smart health. Providing multilevel data confidentiality along with data integrity for big sensing data streams in the context of near real time analytics is a challenging problem. In this paper, we propose a Selective Encryption (SEEN) method to secure big sensing data streams that satisfies the desired multiple levels of confidentiality and data integrity. Our method is based on two key concepts: Common shared keys that are initialized and updated by DSM without requiring retransmission, and a seamless key refreshment process without interrupting the data stream encryption/decryption. Theoretical analyses and experimental results of our SEEN method show that it can significantly improve the efficiency and buffer usage at DSM without compromising the confidentiality and integrity of the data streams.

Original languageBritish English
Article number7921576
Pages (from-to)379-392
Number of pages14
JournalIEEE Transactions on Big Data
Volume5
Issue number3
DOIs
StatePublished - 1 Jul 2019

Keywords

  • Big data stream
  • Data confidentiality
  • Data integrity
  • Data security
  • Selective encryption

Fingerprint

Dive into the research topics of 'SEEN: A selective encryption method to ensure confidentiality for big sensing data streams'. Together they form a unique fingerprint.

Cite this