Secure Top-k query in edge-computing-assisted sensor-cloud systems

被引:1
作者
Min, Jie [1 ]
Kui, Xiaoyan [2 ]
Liang, Junbin [3 ]
Ma, Xingpo [4 ]
机构
[1] Xinyang Agr & Forestry Univ, Sch Informat Engn, Xinyang 464000, Henan, Peoples R China
[2] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[3] Guangxi Univ, Sch Comp & Elect Informat, Nanning 530004, Peoples R China
[4] Xinyang Normal Univ, Sch Comp & Informat Technol, 237 Nanhu Rd, Xinyang 464000, Henan, Peoples R China
关键词
Sensor-cloud system; Edge computing; Top-k query; Privacy preservation; Completeness verification; PRIVACY; VERIFICATION; SCHEME;
D O I
10.1016/j.sysarc.2021.102244
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Sensor cloud provides a new way for the owners of different WSNs (Wireless Sensor Networks) to share their data to other parties (users/organizations). The edge-computing-assisted sensor-cloud systems (EC-assisted SCSs) can even supply real-time services for different parties. However, both the edge servers and the cloud servers in the systems are prone to be attacked in insecure network environments, since they are the bridges connecting both the end users and the WSNs in EC-assisted SCSs and attacking the servers can bring much more benefits for the attackers than just compromising some sensor nodes. In this paper, the problem of secure Top-k query in EC-assisted SCSs was studied, considering that non-trusted edge servers and non-trusted cloud servers exist in the systems, and a novel scheme was proposed to solve the problem. To achieve privacy preservation of the sensed data items and their scores, a secure key distribution protocol was designed, and some dataprocessing or integrity verification algorithms were also developed in the proposed scheme to preserve the data integrity of the query results. Thorough security analyses and extensive simulations show that the proposed scheme is efficient and secure, and it is perfectly fit for Top-k query in EC-assisted SCSs.
引用
收藏
页数:12
相关论文
共 38 条
  • [1] Bala Kirti, 2020, 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), P579, DOI 10.1109/ICRITO48877.2020.9197963
  • [2] Cloud-Centric Multi-Level Authentication as a Service for Secure Public Safety Device Networks
    Butun, Ismail
    Erol-Kantarci, Melike
    Kantarci, Burak
    Song, Houbing
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (04) : 47 - 53
  • [3] Das G., 2006, Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB'06), P451, DOI 10.5555/1182635.1164167
  • [4] Privacy-Preserving Multi-Keyword Top-k Similarity Search Over Encrypted Data
    Ding, Xiaofeng
    Liu, Peng
    Jin, Hai
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (02) : 344 - 357
  • [5] A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-s-Composite
    Gandino, Filippo
    Ferrero, Renato
    Rebaudengo, Maurizio
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (01) : 34 - 47
  • [6] DDR-ESC: A Distributed and Data Reliability Model for Mobile Edge-Based Sensor-Cloud
    Haseeb, Khalid
    Din, Ikram Ud
    Almogren, Ahmad
    Jan, Zahoor
    Abbas, Naveed
    Adnan, Muhammad
    [J]. IEEE ACCESS, 2020, 8 : 185752 - 185760
  • [7] ICAS: Two-factor identity-concealed authentication scheme for remote-servers
    Hossain, Md Jakir
    Xu, Chunxiang
    Li, Chuang
    Mahmud, S. M. Hasan
    Zhang, Xiaojun
    Li, Wanpeng
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 117
  • [8] EVTQ: An Efficient Verifiable Top-k Query Processing in Two-tiered Wireless Sensor Networks
    Hua, Dai
    Geng, Yang
    Fu, Xiao
    Qiang, Zhou
    [J]. 2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 206 - 211
  • [9] Jun Zhou, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P2398, DOI 10.1109/INFOCOM.2015.7218628
  • [10] Khoury E, 2018, 2018 IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (MENACOMM), P25