Ieee Infocom 2009 2009
DOI: 10.1109/infcom.2009.5062006
|View full text |Cite
|
Sign up to set email alerts
|

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance

Abstract: Polytechnic InstituteRecently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). The distributed architecture makes it challenging to build a highly secure and dependable yet lightweight data storage system. On the one hand, sensor data are subject to not only Byzantine failures, but also dynamic pollution attacks, as along the time the adversary may modify/pollute the stored data by compromising individual sensors. On the oth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
54
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 81 publications
(54 citation statements)
references
References 30 publications
0
54
0
Order By: Relevance
“…Not only does it desire to move data that has not been or is rarely accessed to a lower tier of storage than agreed for monetary reasons, but it may also attempt to hide a data loss incident due to management errors. [4] Adversary, who has the capability to compromisea number of cloud data storage servers in different time intervals and subsequently is able to modify or delete users' data while remaining undetected by CSPs for a certain period.…”
Section: Adversary Modelmentioning
confidence: 99%
“…Not only does it desire to move data that has not been or is rarely accessed to a lower tier of storage than agreed for monetary reasons, but it may also attempt to hide a data loss incident due to management errors. [4] Adversary, who has the capability to compromisea number of cloud data storage servers in different time intervals and subsequently is able to modify or delete users' data while remaining undetected by CSPs for a certain period.…”
Section: Adversary Modelmentioning
confidence: 99%
“…In article [7] author proposed a novel dependable and secure information storage scheme with dynamic integrity assurance. Based on the principle of secret sharing and eradication coding, they first propose a hybrid share generation and distribution plan to accomplish dependable and fault tolerant providing so as to beg data storage excess for unique information parts.…”
Section: Public Auditing Of Dynamic Datamentioning
confidence: 99%
“…In order to solve this problem, many schemes are proposed under different systems and security models [1][2][3][4][5][6][7][8][9][10]. In all these works, great efforts are made to design solutions that meet various requirements: high scheme efficiency, stateless verification, unbounded use of queries and retrievability of data, etc.…”
Section: Introductionmentioning
confidence: 99%