International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 151

Research Paper | Computer Science & Engineering | China | Volume 8 Issue 6, June 2019

Distributed Data Provenance (DDP) to Secure the Sensor Data Stream

Mohammad Amanul Islam

Introducing provenance has already been established as a very substantial approach of securing the sensor data that records the history (e. g. , creation, ownership, significance) and operations performed on the data or its travel path. The data provenance is also crucial for ensuring data accountability and privacy as preserving the quality of data stored in numerous systems. Hence, keeping the provenance information requires to address several challenges including storage overhead, high throughput, and secure transmission, etc. In this paper, we propose an architecture of distributed data provenance that avoids the problem of data degradation because of adding a large size of data provenance. Moreover, it enables the transparency of data accountability, helps to enhance the privacy and availability of data provenance. In this scheme, the provenance signifies the creation history of data in the hash form of data, and it has been distributed as chained information with the data into the given data payload of the data packet. Experiments demonstrate the efficiency, scalability on the provenance encoding capacity of the proposed scheme, and the reliability of this scheme has been illustrated with low transmission overhead for the payload storage application of a packet in the wireless sensor environment.

Keywords: bits, data, provenance, payload, wireless sensor network

Edition: Volume 8 Issue 6, June 2019

Pages: 410 - 419

Share this Article

How to Cite this Article?

Mohammad Amanul Islam, "Distributed Data Provenance (DDP) to Secure the Sensor Data Stream", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20198177, Volume 8 Issue 6, June 2019, 410 - 419

Enter Your Email Address


Similar Articles with Keyword 'bits'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Downloads: 6

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 314 - 318

Parkinson Disease Detection Using Machine Learning Algorithms

Yatharth Nakul, Ankit Gupta, Hritik Sachdeva

Share this Article

Similar Articles with Keyword 'data'

Downloads: 510 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'provenance'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3069 - 3074

On the Utilization Aspect of Document Data for Mining the Side Information

N.S. Krishna Prasad, S. Dhana Sekaran

Share this Article

Downloads: 105

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1132 - 1138

Designing of Secure Privacy Preserving Algorithm for Detecting Packet Loss and Provenance Verification in Wireless Ad-Hoc Networks

K. Anil Kumar, Sumithra R

Share this Article

Similar Articles with Keyword 'payload'

Downloads: 105

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Similar Articles with Keyword 'wireless sensor network'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article
Top