{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:21:56Z","timestamp":1759134116827,"version":"3.41.0"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T00:00:00Z","timestamp":1482105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Australia India Strategic Research Grant titled \u201cInnovative Solutions for Big Data and Disaster Management Applications on Clouds (AISRF - 08140)\u201d from the Department of Industry, Australia"},{"name":"ARC","award":["LP140100816"],"award-info":[{"award-number":["LP140100816"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2017,5,31]]},"abstract":"<jats:p>\n            Applications in risk-critical domains such as emergency management and industrial control systems need near-real-time stream data processing in large-scale sensing networks. The key problem is how to ensure online end-to-end security (e.g., confidentiality, integrity, and authenticity) of data streams for such applications. We refer to this as an\n            <jats:italic>online security verification<\/jats:italic>\n            problem. Existing data security solutions cannot be applied in such applications as they cannot deal with data streams with high-volume and high-velocity data in real time. They introduce a significant buffering delay during security verification, resulting in a requirement for a large buffer size for the stream processing server. To address this problem, we propose a Dynamic Key-Length-Based Security Framework (DLSeF) based on a shared key derived from synchronized prime numbers; the key is dynamically updated at short intervals to thwart potential attacks to ensure end-to-end security. Theoretical analyses and experimental results of the DLSeF framework show that it can significantly improve the efficiency of processing stream data by reducing the security verification time and buffer usage without compromising security.\n          <\/jats:p>","DOI":"10.1145\/2937755","type":"journal-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T17:06:31Z","timestamp":1482167191000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["DLSeF"],"prefix":"10.1145","volume":"16","author":[{"given":"Deepak","family":"Puthal","sequence":"first","affiliation":[{"name":"University of Technology Sydney, Australia"}]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"CSIRO Data61, Australia"}]},{"given":"Rajiv","family":"Ranjan","sequence":"additional","affiliation":[{"name":"Newcastle University, UK and CSIRO Data61, Australia"}]},{"given":"Jinjun","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2016,12,19]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/839280.840533"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872854"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08254-7_13"},{"key":"e_1_2_1_4_1","first-page":"15","article-title":"Mining big data in real time","volume":"37","author":"Bifet Albert","year":"2013","journal-title":"Informatica"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/384264.379238"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45269-7_1"},{"key":"e_1_2_1_7_1","unstructured":"Cloudflare: Retrieved from https:\/\/www.cloudflare.com\/ (accessed on: 04.08.2014).  Cloudflare: Retrieved from https:\/\/www.cloudflare.com\/ (accessed on: 04.08.2014)."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287389"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872857"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090205"},{"key":"e_1_2_1_12_1","unstructured":"Contiki: The Open Source OS. Retrieved from http:\/\/www.contiki-os.org\/ (accessed on: 04.08.2014).  Contiki: The Open Source OS. Retrieved from http:\/\/www.contiki-os.org\/ (accessed on: 04.08.2014)."},{"key":"e_1_2_1_13_1","unstructured":"MATLAB\n  : Retrieved from http:\/\/www.mathworks.com\/products\/matlab.html (accessed on: 04.08.2014).  MATLAB: Retrieved from http:\/\/www.mathworks.com\/products\/matlab.html (accessed on: 04.08.2014)."},{"volume-title":"The Design of Rijndael","author":"Daemen Joan","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1561\/1900000001"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-013-7130-x"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.05.048"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.24"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(10)70006-4"},{"key":"e_1_2_1_21_1","first-page":"3751","article-title":"On formula to compute primes and the nth prime","volume":"6","author":"Kaddoura Issam","year":"2012","journal-title":"Applied Mathematical Science"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.84"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013715909417"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3426"},{"volume-title":"Byers","year":"2011","author":"Manyika James","key":"e_1_2_1_25_1"},{"key":"e_1_2_1_26_1","first-page":"61","article-title":"Big data. The Management Revolution","volume":"90","author":"McAfee Andrew","year":"2012","journal-title":"Harvard Business Review"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559972"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435383"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2011-75"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.36"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"volume-title":"Enterprise Java Security: Building Secure J2EE Applications","author":"Pistoia Marco","key":"e_1_2_1_32_1"},{"key":"e_1_2_1_33_1","first-page":"441","article-title":"Advanced encryption standard (AES)","volume":"197","author":"N. F.","year":"2001","journal-title":"Federal Information Processing Standards Publication"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.381"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26187-4_7"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CINE.2015.31"},{"key":"e_1_2_1_37_1","article-title":"A dynamic prime number based efficient security mechanism for big sensing data streams","author":"Puthal Deepak","year":"2016","journal-title":"Journal of Computer and System Sciences."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.22"},{"key":"e_1_2_1_39_1","unstructured":"Scyther: Security protocol analysis tools. Retrieved from http:\/\/www.cs.ox.ac.uk\/people\/cas.cremers\/scyther\/ (accessed on: 04.08.2014).  Scyther: Security protocol analysis tools. Retrieved from http:\/\/www.cs.ox.ac.uk\/people\/cas.cremers\/scyther\/ (accessed on: 04.08.2014)."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107499.1107504"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099595"},{"volume-title":"Proceedings of the 33rd International Conference on Very Large Data Bases. VLDB Endowment, 159--170","year":"2007","author":"Tatbul Nesime","key":"e_1_2_1_42_1"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11518-013-5219-4"},{"key":"e_1_2_1_44_1","first-page":"367","article-title":"Wireless sensor network security: A survey. Security in Distributed","volume":"1","author":"Walters John Paul","year":"2007","journal-title":"Grid, Mobile, and Pervasive Computing"},{"volume-title":"Proceedings of the IEEE INFOCOM. 2517--2525","year":"2013","author":"Wang Xinlei","key":"e_1_2_1_45_1"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2937755","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2937755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:38:20Z","timestamp":1750282700000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2937755"}},"subtitle":["A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream"],"short-title":[],"issued":{"date-parts":[[2016,12,19]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,5,31]]}},"alternative-id":["10.1145\/2937755"],"URL":"https:\/\/doi.org\/10.1145\/2937755","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2016,12,19]]},"assertion":[{"value":"2015-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-12-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}