• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Wei, Xu Ruomei, Li Yuling. A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing[J]. Journal of Computer Research and Development, 2014, 51(12): 2585-2592. DOI: 10.7544/issn1000-1239.2014.20140666
Citation: Chen Wei, Xu Ruomei, Li Yuling. A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing[J]. Journal of Computer Research and Development, 2014, 51(12): 2585-2592. DOI: 10.7544/issn1000-1239.2014.20140666

A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing

More Information
  • Published Date: November 30, 2014
  • The two-tiered wireless sensor networks have become the research hotspot because of its scalability and long lifetime. Top-k query is an important query type but most Top-k query technologies cannot perform precise query. A Top-k query asks for data items whose numeric attributes are among the k highest, where k is an application-dependent parameter. The privacy preservation is important for Top-k query in a hostile environment because sensitive information may leak from compromised nodes. The integrity and authenticity of the Top-k query results should be verified because the adversary can instruct a compromised master node to delete or modify data in response to Top-k queries. This paper presents a precise query algorithm called PI-TQ (privacy-preserving integrity-verification Top-k query) which provides both privacy preservation and integrity verification. The algorithm uses a two-step query method to reduce the communication traffic between nodes and sinks. To ensure the privacy and correctness of the query results, the perturbation algorithm is utilized to protect the privacy of sensitive data. The neighbor verification method achieves integrity verification by using probability space. The simulation results show that PI-TQ algorithm can greatly reduce the computational cost and traffic consumption compared with other algorithms. It can also guarantee accuracy, privacy and integrity of the query results.
  • Related Articles

    [1]Zhao Anning, Xu Nuo, Liu Kang, Luo Li, Pan Bingzheng, Bo Ziyi, Tan Chenghao. The Synthesis of Multiple Stateful Logic Gates for In-memory Computing with Low Wear[J]. Journal of Computer Research and Development, 2025, 62(3): 620-632. DOI: 10.7544/issn1000-1239.202440627
    [2]Xu Lijuan, Wang Bailing, Yang Meihong, Zhao Dawei, Han Jideng. Multi-Mode Attack Detection and Evaluation of Abnormal States for Industrial Control Network[J]. Journal of Computer Research and Development, 2021, 58(11): 2333-2349. DOI: 10.7544/issn1000-1239.2021.20210598
    [3]Li Yin. Test Suite Generating for Stateful Web Services Using Interface Contract[J]. Journal of Computer Research and Development, 2017, 54(3): 609-622. DOI: 10.7544/issn1000-1239.2017.20151045
    [4]Yi Maoxiang, Yu Chenglin, Fang Xiangsheng, Huang Zhengfeng, Ouyang Yiming, Liang Huaguo. State Vector Selective Generation of Parallel Folding Counters[J]. Journal of Computer Research and Development, 2015, 52(11): 2468-2475. DOI: 10.7544/issn1000-1239.2015.20140591
    [5]Zhao Ze, Shang Pengfei, Liu Qiang, Cui Li. Identification of Communication State for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2014, 51(11): 2382-2392. DOI: 10.7544/issn1000-1239.2014.20131079
    [6]Li Zhetao, Wang Zhiqiang, Zhu Gengming, Li Renfa. A Data Gathering MAC Protocol Based on State Translation and Grouping for WSN[J]. Journal of Computer Research and Development, 2014, 51(6): 1167-1175.
    [7]Xie Zhengwei, Zhai Ying, Deng Peimin, Yi Zhong. Algebraic Properties of Probabilistic Finite State Automata[J]. Journal of Computer Research and Development, 2013, 50(12): 2691-2698.
    [8]Yu Wanjun, Liu Dayou, Liu Quan, Yang Bo. An Approach to Monitoring and Controlling Workflow Systems Based on the Instance State[J]. Journal of Computer Research and Development, 2006, 43(8): 1345-1353.
    [9]Zhang Shichao, Xu Yinjun, Gu Ning, Shi Baile. A Norm-Driven Grid Workflow State Machine Model[J]. Journal of Computer Research and Development, 2006, 43(2): 307-313.
    [10]Huang Kui, Wu Yichuan, Zheng Jianping, Wu Zhimei. Forwarding State Reduction Scheme Based on Interface Format for Sparse Mode Multicast[J]. Journal of Computer Research and Development, 2005, 42(9): 1564-1570.

Catalog

    Article views (1709) PDF downloads (1008) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return