Main Article Content

Abstract

—Resource constrained sensing devices are used to build and deploy self-organizing wireless sensor networks for a variety of critical applications such as smart cities, smart health, precision agriculture and industrial control systems. A Data Stream Manager at the server collects the data streams often called big data to perform real time analysis and decision-making for these critical applications. A malicious adversary may access or tamper with the data in transit. One of the challenging tasks in such applications is to assure the trustworthiness of the collected data so that any decisions are made on the processing of correct data. Frequent pattern/itemset mining is a fundamental problem for many domains, thus has a number of applications. In this paper, we proposed a novel scheme to secure a multihop network programming protocol through the use of multiple one-way hash chains and an index-based algorithm that addresses the challenge and provides the exact answer. The one way hash chains scheme is shown to be lower in computational, power consumption and communication costs yet still able to secure multihop propagation of program images. The bigdata objects in these applications are often generated in a streaming fashion. The CP-Graph approach, a hybrid index of graph and inverted file structures. The CP-Graph computes the count of a given pattern and updates the answer while pruning unnecessary patterns.

Article Details

How to Cite
Savitha S, Logeswaran K, Abinaya N, Dhinakaran R, Mahalakshmi S, & Dharamesh B. (2018). Enhanced Selective Encryption Method for Big Data Sensing Stream Using Hash Chain Algorithm . International Journal of Intellectual Advancements and Research in Engineering Computations, 6(2), 1763–1771. Retrieved from https://ijiarec.com/ijiarec/article/view/731