A secure Top-k query protocol in two-tiered sensor networks

被引:0
|
作者
Li, Rui [1 ]
Lin, Yaping [1 ]
Yi, Yeqing [1 ]
Xiong, Shuai [1 ]
Ye, Songtao [1 ]
机构
[1] College of Information Science and Engineering, Hunan University, Changsha 410082, China
关键词
Information retrieval - Network security - Digital storage - Sensor nodes - Functions;
D O I
暂无
中图分类号
学科分类号
摘要
In two-tiered sensor networks, a storage node not only collects data items from sensors, but also deals with the queries from the sink. In a hostile environment, storage nodes may be compromised by attackers and then instructed to reveal sensitive data collected by sensors and reply incomplete or forged query results to the sink. A secure Top-k query protocol, named SecTQ, is proposed in this paper. SecTQ enables storage nodes to process queries correctly while preventing them from leaking the sensitive data collected by sensors. To preserve privacy, the direct comparison of data items collected by different sensors is transformed into the comparison of the collected data items and query-comparison value provided by the sink. Moreover a polynomial function-based preserving scheme is proposed to encode for both the data items collected by sensors and the query-comparison values of the sink, which allows the storage nodes to perform queries without knowing the actual values of both the collected data and query-comparison values. To preserve integrity, a linking watermark technology is proposed, so as to effectively verify the integrity of query results.
引用
收藏
页码:1947 / 1958
相关论文
共 50 条
  • [1] Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks
    Zhou, Ting
    Lin, Yaping
    Zhang, Wei
    Xiao, Sheng
    Li, Jinguo
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 19 - 34
  • [2] SET: Secure and Efficient Top-k Query in Two-Tiered Wireless Sensor Networks
    Zhang, Xiaoying
    Peng, Hui
    Dong, Lei
    Chen, Hong
    Sun, Hui
    WEB AND BIG DATA, APWEB-WAIM 2017, PT I, 2017, 10366 : 495 - 510
  • [3] Securing top-k query processing in two-tiered sensor networks
    Kui, Xiaoyan
    Feng, Jiannan
    Zhou, Xinran
    Du, Huakun
    Deng, Xia
    Zhong, Ping
    Ma, Xingpo
    CONNECTION SCIENCE, 2021, 33 (01) : 62 - 80
  • [4] Verifiable privacy-preserving Top-k query protocol in two-tiered sensor networks
    Chen, H. (chong@ruc.edu.cn), 1600, Science Press (35):
  • [5] Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks
    Li, Rui
    Liu, Alex X.
    Xiao, Sheng
    Xu, Hongyue
    Bruhadeshwar, Bezawada
    Wang, Ann L.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (04) : 2334 - 2346
  • [6] Secure Top-k Query Processing in Unattended Tiered Sensor Networks
    Zhang, Rui
    Shi, Jing
    Zhang, Yanchao
    Huang, Xiaoxia
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (09) : 4681 - 4693
  • [7] Enable Privacy Preservation and Result Verification for Top-k Query in Two-tiered Sensor Networks
    Peng, Hui
    Zhang, Xiaoying
    Chen, Hong
    Wu, Yuncheng
    Wu, Yao
    Zeng, Juru
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 555 - 562
  • [8] Privacy-preserving top-k query processing in two-tiered wireless sensor networks
    Dai, H. (daihua@njupt.edu.cn), 1600, Science Press (50):
  • [9] EVTQ: An Efficient Verifiable Top-k Query Processing in Two-tiered Wireless Sensor Networks
    Hua, Dai
    Geng, Yang
    Fu, Xiao
    Qiang, Zhou
    2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 206 - 211
  • [10] An Efficient Top-k Query Processing with Result Integrity Verification in Two-Tiered Wireless Sensor Networks
    He, Ruiliang
    Dai, Hua
    Yang, Geng
    Wang, Taochun
    Bao, Jingjing
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015