International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | China | Volume 8 Issue 6, June 2019

Distributed Data Provenance (DDP) to Secure the Sensor Data Stream

Mohammad Amanul Islam

Introducing provenance has already been established as a very substantial approach of securing the sensor data that records the history (e.g., creation, ownership, significance) and operations performed on the data or its travel path. The data provenance is also crucial for ensuring data accountability and privacy as preserving the quality of data stored in numerous systems. Hence, keeping the provenance information requires to address several challenges including storage overhead, high throughput, and secure transmission, etc. In this paper, we propose an architecture of distributed data provenance that avoids the problem of data degradation because of adding a large size of data provenance. Moreover, it enables the transparency of data accountability, helps to enhance the privacy and availability of data provenance. In this scheme, the provenance signifies the creation history of data in the hash form of data, and it has been distributed as chained information with the data into the given data payload of the data packet. Experiments demonstrate the efficiency, scalability on the provenance encoding capacity of the proposed scheme, and the reliability of this scheme has been illustrated with low transmission overhead for the payload storage application of a packet in the wireless sensor environment.

Keywords: bits, data, provenance, payload, wireless sensor network

Edition: Volume 8 Issue 6, June 2019

Pages: 410 - 419


How to Cite this Article?

Mohammad Amanul Islam, "Distributed Data Provenance (DDP) to Secure the Sensor Data Stream", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20198177, Volume 8 Issue 6, June 2019, 410 - 419

75 PDF Views | 37 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'bits'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1720 - 1723

Text Steganography using Helping Verbs

Rahul Sanwal, Rishabh Jain

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2606 - 2609

Designing and Comparative Analysis of Image Transmission using Techniques HQAM and QAM

Neeru Sharma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 266 - 270

Data Security through more robust DCT based methodology and Assessment in terms of PSNR

Ajit Singh, Swati Aggarwal

Share this article

Similar Articles with Keyword 'data'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this article

Similar Articles with Keyword 'provenance'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3069 - 3074

On the Utilization Aspect of Document Data for Mining the Side Information

N.S. Krishna Prasad, S. Dhana Sekaran

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1420 - 1423

Text Clustering With Using Side Information

Shubhangi V. Airekar, Dhanshree S. Kulkurni

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2135 - 2136

Text Clustering and Classification on the Use of Side Information

Shilpa S. Raut, Prof. V. B. Maral

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1132 - 1138

Designing of Secure Privacy Preserving Algorithm for Detecting Packet Loss and Provenance Verification in Wireless Ad-Hoc Networks

K. Anil Kumar, Sumithra R

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 159 - 162

Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication - A Review

Harvinder Singh, Er. Amandeep Kaur

Share this article

Similar Articles with Keyword 'payload'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1899 - 1903

Design of Application to Detect Images Embedded with Malicious Programs

Robert T. R. Shoniwa, Geogen George

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1367 - 1370

A Review on Various Approaches of Video Steganography

Sapanpreet Kaur, Mandeep Kaur

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2281 - 2284

Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality

Mekha Jose

Share this article

Similar Articles with Keyword 'wireless sensor network'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 685 - 689

Secure Routing in Wireless Sensor Networks through the Identified Trusted Node

D. Latha, K. Palanivel

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1536 - 1542

Survey on Energy Efficient Routing Protocol in Wireless Sensor Network

Poonam Kudale, M. D. Ingle

Share this article

Top