Research Paper | Computer Science & Engineering | China | Volume 8 Issue 6, June 2019
Distributed Data Provenance (DDP) to Secure the Sensor Data Stream
Mohammad Amanul Islam
Introducing provenance has already been established as a very substantial approach of securing the sensor data that records the history (e.g., creation, ownership, significance) and operations performed on the data or its travel path. The data provenance is also crucial for ensuring data accountability and privacy as preserving the quality of data stored in numerous systems. Hence, keeping the provenance information requires to address several challenges including storage overhead, high throughput, and secure transmission, etc. In this paper, we propose an architecture of distributed data provenance that avoids the problem of data degradation because of adding a large size of data provenance. Moreover, it enables the transparency of data accountability, helps to enhance the privacy and availability of data provenance. In this scheme, the provenance signifies the creation history of data in the hash form of data, and it has been distributed as chained information with the data into the given data payload of the data packet. Experiments demonstrate the efficiency, scalability on the provenance encoding capacity of the proposed scheme, and the reliability of this scheme has been illustrated with low transmission overhead for the payload storage application of a packet in the wireless sensor environment.
Keywords: bits, data, provenance, payload, wireless sensor network
Edition: Volume 8 Issue 6, June 2019
Pages: 410 - 419
How to Cite this Article?
Mohammad Amanul Islam, "Distributed Data Provenance (DDP) to Secure the Sensor Data Stream", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20198177, Volume 8 Issue 6, June 2019, 410 - 419
196 PDF Views | 119 PDF Downloads
Similar Articles with Keyword 'bits'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1467 - 1471XOR Encryption Based Video Steganography
Ramandeep Kaur, Pooja
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 1581 - 1583Proposed D-Range Page Replacement Algorithm
Devansh Dave
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 572 - 574A Survey on Channel Allocation in Hybrid Multichannel Multiradio Wireless Mesh Networks
Prof. L. B Bhagwat, Sudeep Naik
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1130 - 1132Survey On: Reversible Data Hiding in Encrypted JPEG Images
N. B. Pokale, Sanjivani S. Koli
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2222 - 2227Net Asset Value Prediction using FLANN Model
C. M. Anish, Babita Majhi
Similar Articles with Keyword 'data'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1626 - 1628Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1789 - 1791The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence
Vina Lomte, Saloni Shah
Similar Articles with Keyword 'provenance'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1420 - 1423Text Clustering With Using Side Information
Shubhangi V. Airekar, Dhanshree S. Kulkurni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3069 - 3074On the Utilization Aspect of Document Data for Mining the Side Information
N.S. Krishna Prasad, S. Dhana Sekaran
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2135 - 2136Text Clustering and Classification on the Use of Side Information
Shilpa S. Raut, Prof. V. B. Maral
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1132 - 1138Designing of Secure Privacy Preserving Algorithm for Detecting Packet Loss and Provenance Verification in Wireless Ad-Hoc Networks
K. Anil Kumar, Sumithra R
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 159 - 162Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication - A Review
Harvinder Singh, Er. Amandeep Kaur
Similar Articles with Keyword 'payload'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2085 - 2089Implementation and Analysis of DoS Attack Detection Algorithms
Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1467 - 1471XOR Encryption Based Video Steganography
Ramandeep Kaur, Pooja
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2541 - 2544Reversible Data Embedding using F5 Algorithm
Sanjivani Koli, N. B. Pokale
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017
Pages: 2156 - 2159Review on Reversible Data Hiding With Distributed Source Encoding Using Identity Hiding Mechanism for Image and Data Owner
Sanjyot A. Biranje, Dr. D S. Bhosle
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 762 - 767Reversible Data Hiding in Encrypted Images
Chaple Gopal, G Balram
Similar Articles with Keyword 'wireless sensor network'
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1317 - 1319A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Chaitanya Sharma
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 3170 - 3173Wireless Sensor Networks for Traffic Congestion Monitoring
Nitish R Chavan, Ravinarayana.B, Ravikumar.D