Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks

被引:20
|
作者
Li, Rui [1 ]
Liu, Alex X. [1 ,2 ]
Xiao, Sheng [3 ]
Xu, Hongyue [4 ]
Bruhadeshwar, Bezawada [5 ]
Wang, Ann L. [2 ]
机构
[1] Dongguan Univ Technol, Coll Comp Sci & Network Secur, Dongguan 523808, Peoples R China
[2] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
[3] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[4] Tencent Technol, Shenzhen 518057, Peoples R China
[5] Mahindra Ecole Cent, Hyderabad 500043, Andhra Pradesh, India
基金
美国国家科学基金会; 中国博士后科学基金; 中国国家自然科学基金;
关键词
Two-tiered sensor networks; privacy preserving; top-k queries; ARCHITECTURE; STORAGE;
D O I
10.1109/TNET.2017.2693364
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy and integrity have been the main road block to the applications of two-tiered sensor networks. The storage nodes, which act as a middle tier between the sensors and the sink, could be compromised and allow attackers to learn sensitive data and manipulate query results. Prior schemes on secure query processing are weak, because they reveal non-negligible information, and therefore, attackers can statistically estimate the data values using domain knowledge and the history of query results. In this paper, we propose the first top-k query processing scheme that protects the privacy of sensor data and the integrity of query results. To preserve privacy, we build an index for each sensor collected data item using pseudo-random hash function and Bloom filters and transform top-k queries into top-range queries. To preserve integrity, we propose a data partition algorithm to partition each data item into an interval and attach the partition information with the data. The attached information ensures that the sink can verify the integrity of query results. We formally prove that our scheme is secure under IND-CKA security model. Our experimental results on real-life data show that our approach is accurate and practical for large network sizes.
引用
收藏
页码:2334 / 2346
页数:13
相关论文
共 50 条
  • [1] Privacy-preserving top-k query processing in two-tiered wireless sensor networks
    [J]. Dai, H. (daihua@njupt.edu.cn), 1600, Science Press (50):
  • [2] Securing top-k query processing in two-tiered sensor networks
    Kui, Xiaoyan
    Feng, Jiannan
    Zhou, Xinran
    Du, Huakun
    Deng, Xia
    Zhong, Ping
    Ma, Xingpo
    [J]. CONNECTION SCIENCE, 2021, 33 (01) : 62 - 80
  • [3] An Efficient Top-k Query Processing with Result Integrity Verification in Two-Tiered Wireless Sensor Networks
    He, Ruiliang
    Dai, Hua
    Yang, Geng
    Wang, Taochun
    Bao, Jingjing
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [4] A secure Top-k query protocol in two-tiered sensor networks
    Li, Rui
    Lin, Yaping
    Yi, Yeqing
    Xiong, Shuai
    Ye, Songtao
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (09): : 1947 - 1958
  • [5] Enable Privacy Preservation and Result Verification for Top-k Query in Two-tiered Sensor Networks
    Peng, Hui
    Zhang, Xiaoying
    Chen, Hong
    Wu, Yuncheng
    Wu, Yao
    Zeng, Juru
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 555 - 562
  • [6] Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks
    Zhou, Ting
    Lin, Yaping
    Zhang, Wei
    Xiao, Sheng
    Li, Jinguo
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 19 - 34
  • [7] EVTQ: An Efficient Verifiable Top-k Query Processing in Two-tiered Wireless Sensor Networks
    Hua, Dai
    Geng, Yang
    Fu, Xiao
    Qiang, Zhou
    [J]. 2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 206 - 211
  • [8] SET: Secure and Efficient Top-k Query in Two-Tiered Wireless Sensor Networks
    Zhang, Xiaoying
    Peng, Hui
    Dong, Lei
    Chen, Hong
    Sun, Hui
    [J]. WEB AND BIG DATA, APWEB-WAIM 2017, PT I, 2017, 10366 : 495 - 510
  • [9] Verifiable privacy-preserving range query in two-tiered sensor networks
    Sheng, Bo
    Li, Qun
    [J]. 27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 457 - 465
  • [10] PCTopk: Privacy- and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-tiered Sensor Networks
    Tsou, Yao-Tung
    Hu, Yung-Li
    Huang, Yennun
    Kuo, Sy-Yen
    [J]. 2014 IEEE 33RD INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2014, : 191 - 200