Distributed Information Flow Verification for Secure Service Composition in Smart Sensor Network

来源 :中国通信 | 被引量 : 0次 | 上传用户:wjkylin
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user. However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant. Then we propose an algorithm over the distributed verification framework involving each sensor node to participate in the composite service verification based on the security constraints. The experimental results indicate that our approach can reduce the cost of verification and provide a better load balance. Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant Then we propose an algorithm over the distributed verification framework involving each sensor node participate in the composite service verification based on the security constraints. The experimental results that reduce the cost of verification and provide a better load balance.
其他文献
“前段时间,妈妈去杭州学习,去了好长时间,可能有一个月吧.今天,妈妈终于从杭州回来了,我非常高兴!因为妈妈的怀抱很暖和;因为妈妈回来了,爸爸的生日就能过得更好;因为妈妈在
期刊
写一篇好文章成了很多学生的心头大石,而指导学生写一篇好文章也令不少教师抓耳挠腮,嘴上说得天花乱坠,学生的习作依然不堪入目.如何抓住评讲契机,巧妙点拨,令拙作变佳作?教
2011年10月27日,国际3D学会(13DS:Internationa]3D Society)中国分会(以下简称13DS中国分会)在北京举行了成立仪式,并于即日起开始运营工作。该组织成立的目的是通过3D培训教育(3D大学)和评奖等活动推进我国3D影视科技和影视节目内容市场的发展。  自2010年以来,中国3D产业迅速发展,除了3D电影产业外,3D电视产业的发展也步入快车道,这其中,除了3D电视机
在环保趋严的大背景下,山东阳谷华泰化工股份有限公司凭借长期环保投入及产品质量优势,抓住机遇对重点、优质客户进行积极的开发和产品推广,主营业务收入及净利润持续较快增
期刊
当2005年的新年钟声敲响的时候,中国报业或许根本没有想到一场严重的危机正在酝酿之中.刚刚成功在香港证券交易所上市的北青传媒雄心万丈,超过6亿港元的募集资金早已经派好了
随着新课程改革的深入,新课标更加注重以人为本的教学理念,尤其是高中数学教学中,由于知识点的增多和知识难度的提升,很多学生出现了学习困难、学习成果不明显等问题。本文结
目的区域生长法是遥感影像分割中常用的算法,该算法首先选取适当的像元作为生长的起始点(种子点)。现有的种子点选取方法存在种子点数目较多、效率低以及地物细节种子点不足等问题。针对种子点选取存在的问题,提出一种基于1维光谱差异的区域生长种子点的选取方法。方法首先计算像元间1维(水平、竖直)方向上的光谱差异,然后选取光谱差异的局部极小值作为种子点,最后对种子点进行优选,得到区域生长的起点。结果应用本文方法
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
当北京广播电视报委婉地宣布全城赠阅计划搁浅的时候,中国传媒业波澜不兴,平静地注视着又一位勇敢者倒在报纸竞争的湍流中.这是中国报业第一次全城免费赠阅报纸经营策略的失
在素质教育时代背景的呼唤要求下,初中北师大版数学教材的编写遵循了贴近学生、贴近生活、贴近实际的原则。由此可见,数学课程变成了体验课程,它不仅是承载数学知识的“死”