SensorCloud

Sensor network technology is increasingly making its way to our everyday life. For example, sensors appear as smart objects in home automation systems, intelligent environmental and industrial systems, as well as a fundamental building block in smart grids, intelligent traffic systems and smart cities. However, while smart objects are highly capable of sensing and actuating, their computation and storage resources are scarce. In SensorCloud, we combined the advantages of smart objects with the strength of Cloud Computing – elastic computation and storage. Storing and computing sensed data in the cloud allows to efficiently utilize past data items in current situations.

A second aspect of SensorCloud was the availability of sensed data. Today’s applications of sensor networks mostly implement isolated networks. It is oftentimes neither possible to reuse information for different application scenarios nor to combine information from different networks in order to gain higher-value information. In stark contrast to such restricted data availability, the central and highly scalable platform of SensorCloud makes information accessible across application and network boundaries. Hence, SensorCloud allows to reuse sensed information for different kinds of applications and to correlate sensor data independent from the sensor location.

Sensed data may contain highly personal or otherwise critical information (especially in company settings). Hence, users currently refrain from storing critical information in cloud platforms such as Amazon EC2. When interconnecting smart objects with the cloud we observe that these scenarios typically involve a gateway in the trusted domain of the sensor data provider. While these gateways commonly provide connectivity with the Internet, we elevate them to trust points of the SensorCloud architecture. Specifically, trust points encrypt sensed data before storing it in the cloud and perform access control for the stored data. This ensures that the data provider remains in control over her data. Besides the actual design of the trust point-based architecture, SensorCloud research topics include efficient multi-party encryption and integrity protection, federated user management, and mechanisms to convey privacy implications to users and cloud providers.

SensorCloud, funded by the Germand Federal Ministry for Economic Affairs and Energy (BMWi) as part of the Trusted Cloud initiative, was a joined project with several partners from academia and industry that ran from 2012 to 2014. It was a research effort that aimed to provide synergies for two recent trends in networking: the Internet of Things and Cloud Computing. More information on this past project and our project partners can be found on www.sensorcloud.de.

Researchers

 

Students

  • Benjamin Assadsolimani
  • Sebastian Bereda
  • Dominik Chmiel
  • Theo Dreßen
  • Aivar Kripsaar
 

 

  • Roman Matzutt
  • Devran Ölcer
  • Marc Seebold
  • Benedikt Wolters
 

Contact

For questions and inquiries regarding the SensorCloud project, please contact:

Martin Henze
Head of Security and Privacy

E-Mail: martin.henze[[at]]comsys.rwth-aachen.de

SensorCloud Publications

References
10.
Network Security and Privacy for Cyber-Physical Systems
In Song, Houbing and Fink, Glenn A. and Jeschke, Sabina, editor, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
Chapter 2, page 25-56.
Publisher: Wiley-IEEE Press,
First edition
November 2017
ISBN: 978-1-119-22604-8
to be published
9.
Technical Report
Document number: AIB-2016-06
Report Number: arXiv:1607.03239 [cs.NI]
Department of Computer Science, RWTH Aachen University, Ahornstr. 55, 52074 Aachen, Germany
July 2016
8.
A Trust Point-based Security Architecture for Sensor Data in the Cloud
In Krcmar, Helmut and Reussner, Ralf and Rumpe, Bernhard, editor, Trusted Cloud Computing
page 77-106.
Publisher: Springer,
December 2014
ISBN: 978-3-319-12717-0
7.
Michael Eggert, Roger Häußling, Martin Henze, Lars Hermerschmidt, René Hummen, Daniel Kerpen, Antonio Navarro Pérez, Bernhard Rumpe, Dirk Thißen and Klaus Wehrle
In Krcmar, Helmut and Reussner, Ralf and Rumpe, Bernhard, editor, Trusted Cloud Computing
page 203-218.
Publisher: Springer,
December 2014
ISBN: 978-3-319-12717-0
6.
Martin Henze, Sebastian Bereda, René Hummen and Klaus Wehrle
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), Halifax, NS, Canada Volume 37 of Procedia Computer Science , page 370-375.
Publisher: Elsevier,
September 2014
5.
René Hummen, Hossein Shafagh, Shahid Raza, Thiemo Voigt and Klaus Wehrle
11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014) , page 284-292.
Publisher: IEEE,
June 2014
4. International Journal of Grid and High Performance Computing (IJGHPC), 5(4):97-112
December 2013
ISSN: 1938-0259
3.
Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2013), part of 2013 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA , page 18-22.
Publisher: IEEE,
May 2013
ISBN: 978-1-4799-0458-7
2.
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
Publisher: ACM,
April 2013
ISBN: 978-1-4503-1998-0
1.
René Hummen, Martin Henze, Daniel Catrein and Klaus Wehrle
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Taipei, Taiwan , page 232-240.
Publisher: IEEE,
December 2012
ISBN: 978-1-4673-4511-8
Export as:
BibTeX, XML