Providing a secure interface using smart phone
based sensors networks in cloud computing
Raghavendra Reddy M.V
1
, H Srinivasa Murthy
2
1
M. Tech Student, Department of CS&E, S J C Institute of Technology, Chickaballapura-562101, Karnataka.
2
Asst. Prof Department of IS&E, S J C Institute of Technology, Chickaballapura-56210.1, Karnataka.
1
mv.raghav@gmail.com
2
hsrinivasamurth y@yahoo.co.in
Abstract — The research on secure sensor networks in the context of a high-level cloud based
brokering architecture and highlighted various research challenges going forward. We outline
research challenges associated with assessing the trustworthiness of the sensors based on
environmental sensor data, detecting and defending against “sensory malware” on such sensors,
and mitigating side channel leaks when sensor devices communicate with the cloud. We believe
these components of the overall cloud based sensor network architecture are the least trustworthy
since they are out of the control of the cloud “back end.” Thus, addressing these challenges will help
protect the integrity of the sensing platforms, the privacy of users who carry mobile sensors, as well as
the delivery of sensor data to the cloud. These protections will greatly contribute to trustworthy
collection of sensor data from smart and mobile sensing devices. We aim to secure smart sensor
networks, where computationally powerful sensing devices such as smart phones or cognitive radios
interact with the cloud. In previous work, it was seen that a large-scale brokering frame work, and
people are researching several facets of securing sensors in the context of this framework. In this
paper we discuss initial results for three portions of this effort, challenges that remain for secure
sensor networks, and specific directions we are currently pursuing. We propose a model for
large-scale smart phone based sensor networks, with sensor information processed b y clouds and
grids, with a mediation layer for processing, filtering and other mash-ups done via a
brokering network. Final aggregate results are assumed to be sent to users through traditional cloud
interfaces such as browsers. We conjecture that such a network configuration will have significant
sensing applications, and perform some preliminary work in both defining the system, and
considering threats to the system as a whole from different perspectives. We then discuss our current,
initial approaches to solving three portions of the overall security architecture: i) Risk Analysis
relating to the possession and environment of the smart phone sensors, ii) New malware threats
and defenses installed on the sensor network proper, and iii) An analysis of covert channels being
used to circumvent encryption in the user/cloud interface.
Keywords- Wireless Sensor Network, Brokered Network, Security, Smart Phone.
1 INTRODUCTION
With the increased pervasiveness of sensory devices for military and civilian uses comes
the demand for effective processing of the large amounts of data they collect. This demand
can only be met with the low-cost computing resources offered b y today’s cloud computing
systems. Today’s cloud can already support data-intensive computing at a low cost: for
example, a large-scale computing task can be accomplished on Amazon’s Elastic Compute Cloud
(EC2) at an expense as low as 10 cents per CPU hour. So far little effort has been made in applying
the ultra cost effective cloud platform towards analyzing and managing sensor data. Recently, we
have made the first step towards building a practical sensor cloud system. Different from prior work
on sensor networks, we assume that sensors communicate directly with a proxy or broker on a cloud.
In our research, we consider a group of sensors organized as a hierarchical structure or some types
of partitions, which communicate with their cloud proxies through wireless channels. The
sensor platforms studied in our research are ones with multiple sensors that can each measure
different properties of the environment. For example, we might have GPS for positioning,
International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012
ISBN 978-1-4675-2248-9 © 2012 Published by Coimbatore Institute of Information Technology