ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2014, Vol. 51 ›› Issue (12): 2585-2592.doi: 10.7544/issn1000-1239.2014.20140666

• 信息安全 •    下一篇

基于隐私保护和完整性验证的Top-k查询方法

陈伟1,2,许若妹1,2,李玉岭3   

  1. 1(南京邮电大学计算机学院 南京 210023);2(江苏省无线传感网高技术研究重点实验室(南京邮电大学) 南京 210003);2(75576部队 海口 570236) (chenwei@njupt.edu.cn)
  • 出版日期: 2014-12-01
  • 基金资助: 
    基金项目:国家自然科学基金项目(61202353,61272084,61300240);江苏省高校自然科学研究项目(12KJB520008);江苏省普通高校研究生科研创新计划基金项目( CXLX13_464)

A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing

Chen Wei1,2, Xu Ruomei1,2, Li Yuling3   

  1. 1(College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210023); 2(Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks (Nanjing University of Posts and Telecommunications), Nanjing 210003); 3(Troop 75576, Haikou 570236)
  • Online: 2014-12-01

摘要: 2层无线传感器网络由于具有寿命长和易扩展的特点,已经成为当前的研究热点.Top-k查询是一种重要的查询类型,但是大多数的Top-k查询不能执行精确查询任务.提出了一种精确的Top-k查询算法PI-TQ(privacy-preserving integrity-verification Top-k query),同时提供了隐私保护和完整性验证功能.算法采用2次查询方法以减少数据通信量,利用基于干扰数的扰动算法实现隐私保护,并采用概率空间邻居验证模式实现完整性验证.仿真结果表明,PI-TQ算法与同类算法相比较,可以明显减少查询的通信量和计算代价,同时保证查询结果的正确性、隐私性和完整性.

关键词: 2层无线传感器网络, Top-k查询, 隐私保护, 完整性验证, 数据扰动

Abstract: The two-tiered wireless sensor networks have become the research hotspot because of its scalability and long lifetime. Top-k query is an important query type but most Top-k query technologies cannot perform precise query. A Top-k query asks for data items whose numeric attributes are among the k highest, where k is an application-dependent parameter. The privacy preservation is important for Top-k query in a hostile environment because sensitive information may leak from compromised nodes. The integrity and authenticity of the Top-k query results should be verified because the adversary can instruct a compromised master node to delete or modify data in response to Top-k queries. This paper presents a precise query algorithm called PI-TQ (privacy-preserving integrity-verification Top-k query) which provides both privacy preservation and integrity verification. The algorithm uses a two-step query method to reduce the communication traffic between nodes and sinks. To ensure the privacy and correctness of the query results, the perturbation algorithm is utilized to protect the privacy of sensitive data. The neighbor verification method achieves integrity verification by using probability space. The simulation results show that PI-TQ algorithm can greatly reduce the computational cost and traffic consumption compared with other algorithms. It can also guarantee accuracy, privacy and integrity of the query results.

Key words: two-tiered wireless sensor networks, Top-k query, privacy preserving, integrity verification, data perturbation

中图分类号: