Search results for "Distributed data store"

showing 10 items of 10 documents

MSS: A Multi-Level Data Placement Scheme for Data Survival in Wireless Sensor Networks

2009

In recently popularized unattended wireless sensor networks, sensed data are stored locally or some designated nodes for a long term and retrieved sometime by collectors on demand. Such data may be delete or modified as sensor nodes are always exposed to risks such as random failure and mobile adversary. To maximize the data survival, we propose a secure and efficient scheme - MSS. MSS makes use of hopbounded computational secret sharing to achieve fault tolerance and compromise resilience, and takes advantages of multi-level secret sharing to mitigate communication overhead and improve overall security. MSS has the most advantages in terms of security and efficiency among presented schemes…

Computer sciencebusiness.industryDistributed computingDistributed data storeOverhead (computing)Fault toleranceAdversarybusinessResilience (network)Wireless sensor networkSecret sharingComputer networkTerm (time)2009 5th International Conference on Wireless Communications, Networking and Mobile Computing
researchProduct

A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs

2010

Unattended Wireless Sensor Networks (UWSNs) operated in hostile environments face a risk on data security due to the absence of real-time communication between sensors and sinks, which imposes sensors to accumulate data till the next visit of a mobile sink to off-load the data. Thus, how to ensure forward secrecy, backward secrecy and reliability of the accumulated data is a great challenge. For example, if a sensor is compromised, pre-compromise data accumulated in the sensor is exposed to access. In addition, by holding key secrecy of the compromised sensor, attackers also can learn post-compromise data in the sensor. Furthermore, in practical UWSNs, once sensors stop working for accident…

Computer sciencebusiness.industryForward secrecyReliability (computer networking)Node (networking)SecrecyDistributed data storeProbabilistic logicData securitybusinessWireless sensor networkComputer network2010 IEEE Global Telecommunications Conference GLOBECOM 2010
researchProduct

New dispatching strategy for the integration of active-demand and distributed storage in the electricity market

2015

The proliferation of Distributed Generation (DG) in power systems calls for a redesign of electricity network management, which should be able to accommodate large amounts of intermittent generation. This issue requires a discussion about the current dispatching regulation, giving distributed storage systems and qualified electricity consumption the opportunity to provide ancillary services to the distribution grid. In this work, a new dispatching strategy for the integration of active-demand and distributed storage in the Italian electricity market is presented. The strategy is focused on a distribution Smart Grid (SG), where customers can indirectly participate to the Day-Ahead (DA) and t…

Demand responsebusiness.industryDispatching strategySmart gridEnvironmental economicsSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaStand-alone power systemSmart gridElectricity marketStorage systemOrder (exchange)Distributed generationDistributed data storeElectricity marketElectricitybusinessElectricity retailing2015 AEIT International Annual Conference (AEIT)
researchProduct

HybridS: A Scheme for Secure Distributed Data Storage in WSNs

2008

In unattended wireless sensor networks (WSNs), data is stored locally or at designated nodes upon sensing, and users can access it on demand. This paradigm can improve energy efficiency by making use of the upcoming cheap and large flash memory, as well as system robustness. Nevertheless, the security and dependability of distributed storage are critical for the applicability of such WSNs. In this paper, we propose a secure and dependable data storage scheme by taking advantages of secret sharing and Reed-Solomon code, which has computational security and yet maintains optimal data size. The extensive analysis verifies our scheme can provide secure and dependable data storage in WSNs in the…

Distributed databasebusiness.industryComputer scienceDistributed computingComputer data storageDistributed data storeDependabilityCryptographybusinessWireless sensor networkByzantine fault toleranceSecret sharingComputer network2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
researchProduct

Technical-economical evaluation for distributed storage applications. An Italian case study for a medium-scale public facility

2014

Time-of-use energy cost management involves the use of storage by customers to reduce their electricity bills. This can be accomplished by charging the storage during off-peak time periods, when electricity energy prices are low, and discharging it during times when on-peak energy prices are applied. This article addresses the question whether it is economically viable to install medium-scale distributed storage devices in the power system designed to lower the electricity cost for a customer-side application, assuming flexible electricity tariffs. The technical/economical evaluation is carried out referring to Lithium ion (Li-ion), Sodium Sulphur (NaS) and Vanadium Redox Battery (VRB) tech…

Energy storage load shifting Li-ion battery Technical-economical evaluationsEngineeringEnergy storageTechnical-economical evaluationsbusiness.industryElectrical engineeringVanadium redox batteryMedium scaleSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaElectric power systemStand-alone power systemLoad shiftingDistributed data storeCapital costLi-ion batteryElectricitybusinessProcess engineeringPublic Facility
researchProduct

A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing

2009

Many data storage schemes have been proposed in the past for keeping dependable data storage, but they are not designed for Unattended Wireless Sensor Networks (UWSNs). When applying these schemes to UWSNs, most of them have limitations such as high storage requirement, transmission cost, and not resilient to a large number of node compromises. To address the problem of data storage, transmission cost, and resilience of node compromise in UWSNs, we propose a novel Homomorphic Encryption and Homomorphic Secret Sharing based scheme (HEHSS) to accomplish the goals of confidentiality, resilience to node compromises, reliability, and efficiency of storage and transmission. Our scheme exploits th…

Homomorphic secret sharingbusiness.industryComputer scienceNode (networking)Distributed data storeHomomorphic encryptionCryptographybusinessEncryptionSecret sharingWireless sensor networkComputer network2009 2nd IFIP Wireless Days (WD)
researchProduct

Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs

2013

Unattended Wireless Sensor Networks (UWSNs), characterized by the absence of real-time communication between sensors and sinks, impose sensors to retain data till the next visit of a mobile sink to off-load their data. In such networks, if a sensor is compromised, data accumulated in the sensor are exposed to attackers. In addition, by holding the secret key of the compromised sensor, attackers can also learn post-compromise data accumulated by the sensor. Furthermore, once sensors stop working due to, for instance, node crash or battery depletion, all the accumulated data will be lost. In this paper, we propose a secure and reliable data distribution scheme that addresses these challenges.…

Key distribution in wireless sensor networksComputer Networks and CommunicationsForward secrecybusiness.industryComputer scienceNode (networking)Distributed data storeProbabilistic logicKey (cryptography)businessWireless sensor networkComputer networkComputer Communications
researchProduct

A Monitoring and Management System for Energy Storage Integration in Smart Grids

2019

The integration of distributed storage systems (DSSs) at users and prosumers level can significantly contribute to energy efficiency and increase profits from renewable energy exploitation, thanks to suitable scheduling of charging and discharging periods. On the other hand, to preserve network stability and secure operation, Distribution Systems Operators (DSOs) are interested in DSSs control and cooperation with the grid. In this framework this work proposes a simple monitoring and management system for DSSs scheduling and its integration in a distributed measurement and control system architecture for smart grids. In the paper the proposed algorithm is tested on a simple case study at ho…

OptimizationEnergy storageSchedulingbusiness.industry020209 energyDistributed computing020208 electrical & electronic engineeringPSO02 engineering and technologyGridEnergy storageScheduling (computing)Distributed measurement systemSmart gridDistributed generationDistributed data storeManagement system0202 electrical engineering electronic engineering information engineeringMedicineDemande side responseDistributed generationbusinessSizingSettore ING-INF/07 - Misure Elettriche E ElettronicheEfficient energy use2019 IEEE International Instrumentation and Measurement Technology Conference (I2MTC)
researchProduct

Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks

2009

In In-networking storage Wireless Sensor Networks, sensed data are stored locally for a long term and retrieved on-demand instead of real-time. To maximize data survival, the sensed data are normally distributively stored at multiple nearby nodes. It arises a problem that how to check and grantee data integrity of distributed data storage in the context of resource constraints. In this paper, a technique called Two Granularity Linear Code (TGLC) that consists of Intra-codes and Inter-codes is presented. An efficient and lightweight data integrity check scheme based on TGLC is proposed. Data integrity can be checked by any one who holds short Inter-codes, and the checking credentials is shor…

Scheme (programming language)Distributed databasebusiness.industryComputer scienceDistributed computingContext (language use)Term (time)Data integrityDistributed data storeOverhead (computing)businessWireless sensor networkcomputerComputer networkcomputer.programming_language2009 IEEE International Symposium on Parallel and Distributed Processing with Applications
researchProduct

Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks

2010

Published version of an article from the journal : Science in China, Series F: Information Sciences. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11432-010-0096-7 In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical or digest data (e.g., average temperature in a day), instead of real-time data, are of interest. The data are not instantly forwarded to a central sink upon sensing, thereby saving communication energy for transmission. Such a paradigm can also improve data survivability by m…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551General Computer Sciencebusiness.industryComputer scienceSecret sharingData integrityComputer data storageDistributed data storeDependabilityVerifiable secret sharingbusinessWireless sensor networkByzantine fault toleranceComputer networkScience China Information Sciences
researchProduct