Details of Research Outputs

Status已发表Published
TitleDetection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system
Creator
Date Issued2021
Source PublicationConcurrency and Computation: Practice and Experience
ISSN11532-0626;1532-0634
Volume33Issue:7
Abstract

With the popularity of Sensor-Cloud, its security issues get more attention from industry and academia. Especially, Sensor-Cloud underlying network is very vulnerable to internal attacks due to its limitations in computing, storage, and analysis. Most existing trust evaluation mechanisms are proposed to detect internal attack issues from the behavior level. However, there are some special internal attacks in the data level such as hidden data attacks, which are normal in the behavior level but generate malicious data to lead user to make wrong decisions. To detect this type of attacks, we design a fog-based detection system (FDS), which is based on the trust evaluation mechanism in the behavior level. In this paper, three types of scenes (the redundant data, the parameter curve characteristic, and the data validation) are defined, and three detection schemes are given. Some experiments are conducted, which manifest that FDS has certain advantages in detecting hidden data attacks. © 2018 John Wiley & Sons, Ltd.

Keywordfog computing hidden data attacks internal attacks sensor-cloud trust evaluation mechanism
DOI10.1002/cpe.5109
URLView source
Indexed BySCIE
Language英语English
WOS Research AreaComputer Science
WOS SubjectComputer Science, Software Engineering ; Computer Science, Theory & Methods
WOS IDWOS:000632049700013
PublisherJohn Wiley and Sons Ltd
Citation statistics
Cited Times:69[WOS]   [WOS Record]     [Related Records in WOS]
Document TypeJournal article
Identifierhttp://repository.uic.edu.cn/handle/39GCC9TT/4464
CollectionResearch outside affiliated institution
Affiliation
1.College of Computer Science and Technology, Huaqiao UniversityXiamen, China
2.School of Computer Science and Educational Software, Guangzhou UniversityGuangzhou, China
3.School of Information Science and Engineering, Central South UniversityHunan, China
4.State Key Laboratory of Internet of Things for Smart City, University of Macau, Macau, China
Recommended Citation
GB/T 7714
Zhang, Guangxue,Wang, Tian,Wang, Guojunet al. Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system[J]. Concurrency and Computation: Practice and Experience, 2021, 33(7).
APA Zhang, Guangxue, Wang, Tian, Wang, Guojun, Liu, Anfeng, & Jia, Weijia. (2021). Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Concurrency and Computation: Practice and Experience, 33(7).
MLA Zhang, Guangxue,et al."Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system". Concurrency and Computation: Practice and Experience 33.7(2021).
Files in This Item:
There are no files associated with this item.
Related Services
Usage statistics
Google Scholar
Similar articles in Google Scholar
[Zhang, Guangxue]'s Articles
[Wang, Tian]'s Articles
[Wang, Guojun]'s Articles
Baidu academic
Similar articles in Baidu academic
[Zhang, Guangxue]'s Articles
[Wang, Tian]'s Articles
[Wang, Guojun]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Zhang, Guangxue]'s Articles
[Wang, Tian]'s Articles
[Wang, Guojun]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.