Status | 已发表Published |
Title | Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system |
Creator | |
Date Issued | 2021 |
Source Publication | Concurrency and Computation: Practice and Experience
![]() |
ISSN | 11532-0626;1532-0634 |
Volume | 33Issue:7 |
Abstract | With the popularity of Sensor-Cloud, its security issues get more attention from industry and academia. Especially, Sensor-Cloud underlying network is very vulnerable to internal attacks due to its limitations in computing, storage, and analysis. Most existing trust evaluation mechanisms are proposed to detect internal attack issues from the behavior level. However, there are some special internal attacks in the data level such as hidden data attacks, which are normal in the behavior level but generate malicious data to lead user to make wrong decisions. To detect this type of attacks, we design a fog-based detection system (FDS), which is based on the trust evaluation mechanism in the behavior level. In this paper, three types of scenes (the redundant data, the parameter curve characteristic, and the data validation) are defined, and three detection schemes are given. Some experiments are conducted, which manifest that FDS has certain advantages in detecting hidden data attacks. © 2018 John Wiley & Sons, Ltd. |
Keyword | fog computing hidden data attacks internal attacks sensor-cloud trust evaluation mechanism |
DOI | 10.1002/cpe.5109 |
URL | View source |
Indexed By | SCIE |
Language | 英语English |
WOS Research Area | Computer Science |
WOS Subject | Computer Science, Software Engineering ; Computer Science, Theory & Methods |
WOS ID | WOS:000632049700013 |
Publisher | John Wiley and Sons Ltd |
Citation statistics | |
Document Type | Journal article |
Identifier | http://repository.uic.edu.cn/handle/39GCC9TT/4464 |
Collection | Research outside affiliated institution |
Affiliation | 1.College of Computer Science and Technology, Huaqiao UniversityXiamen, China 2.School of Computer Science and Educational Software, Guangzhou UniversityGuangzhou, China 3.School of Information Science and Engineering, Central South UniversityHunan, China 4.State Key Laboratory of Internet of Things for Smart City, University of Macau, Macau, China |
Recommended Citation GB/T 7714 | Zhang, Guangxue,Wang, Tian,Wang, Guojunet al. Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system[J]. Concurrency and Computation: Practice and Experience, 2021, 33(7). |
APA | Zhang, Guangxue, Wang, Tian, Wang, Guojun, Liu, Anfeng, & Jia, Weijia. (2021). Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Concurrency and Computation: Practice and Experience, 33(7). |
MLA | Zhang, Guangxue,et al."Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system". Concurrency and Computation: Practice and Experience 33.7(2021). |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment