Providing a secure interface using smart phone based sensors networks in cloud computing Raghavendra Reddy M.V 1 , H Srinivasa Murthy 2 1 M. Tech Student, Department of CS&E, S J C Institute of Technology, Chickaballapura-562101, Karnataka. 2 Asst. Prof Department of IS&E, S J C Institute of Technology, Chickaballapura-56210.1, Karnataka. 1 mv.raghav@gmail.com 2 hsrinivasamurth y@yahoo.co.in Abstract The research on secure sensor networks in the context of a high-level cloud based brokering architecture and highlighted various research challenges going forward. We outline research challenges associated with assessing the trustworthiness of the sensors based on environmental sensor data, detecting and defending against “sensory malware” on such sensors, and mitigating side channel leaks when sensor devices communicate with the cloud. We believe these components of the overall cloud based sensor network architecture are the least trustworthy since they are out of the control of the cloud “back end.” Thus, addressing these challenges will help protect the integrity of the sensing platforms, the privacy of users who carry mobile sensors, as well as the delivery of sensor data to the cloud. These protections will greatly contribute to trustworthy collection of sensor data from smart and mobile sensing devices. We aim to secure smart sensor networks, where computationally powerful sensing devices such as smart phones or cognitive radios interact with the cloud. In previous work, it was seen that a large-scale brokering frame work, and people are researching several facets of securing sensors in the context of this framework. In this paper we discuss initial results for three portions of this effort, challenges that remain for secure sensor networks, and specific directions we are currently pursuing. We propose a model for large-scale smart phone based sensor networks, with sensor information processed b y clouds and grids, with a mediation layer for processing, filtering and other mash-ups done via a brokering network. Final aggregate results are assumed to be sent to users through traditional cloud interfaces such as browsers. We conjecture that such a network configuration will have significant sensing applications, and perform some preliminary work in both defining the system, and considering threats to the system as a whole from different perspectives. We then discuss our current, initial approaches to solving three portions of the overall security architecture: i) Risk Analysis relating to the possession and environment of the smart phone sensors, ii) New malware threats and defenses installed on the sensor network proper, and iii) An analysis of covert channels being used to circumvent encryption in the user/cloud interface. Keywords- Wireless Sensor Network, Brokered Network, Security, Smart Phone. 1 INTRODUCTION With the increased pervasiveness of sensory devices for military and civilian uses comes the demand for effective processing of the large amounts of data they collect. This demand can only be met with the low-cost computing resources offered b y today’s cloud computing systems. Today’s cloud can already support data-intensive computing at a low cost: for example, a large-scale computing task can be accomplished on Amazon’s Elastic Compute Cloud (EC2) at an expense as low as 10 cents per CPU hour. So far little effort has been made in applying the ultra cost effective cloud platform towards analyzing and managing sensor data. Recently, we have made the first step towards building a practical sensor cloud system. Different from prior work on sensor networks, we assume that sensors communicate directly with a proxy or broker on a cloud. In our research, we consider a group of sensors organized as a hierarchical structure or some types of partitions, which communicate with their cloud proxies through wireless channels. The sensor platforms studied in our research are ones with multiple sensors that can each measure different properties of the environment. For example, we might have GPS for positioning, International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012 ISBN 978-1-4675-2248-9 © 2012 Published by Coimbatore Institute of Information Technology