• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Dai Hua, Yang Geng, Qin Xiaolin, Liu Liang. Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1239-1252.
Citation: Dai Hua, Yang Geng, Qin Xiaolin, Liu Liang. Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1239-1252.

Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks

More Information
  • Published Date: June 14, 2013
  • Privacy preservation in wireless sensor networks has attracted more and more attentions recently. Computing top-k query result while preserving data privacy is a challenge in wireless sensor networks. This paper proposes a prefix membership verification (PMV) based privacy-preserving top-k query processing in two-tiered wireless sensor networks, which is denoted as PPTQ. In PPTQ, each sensor node in the query aera firstly converts its collected data into encoded ones by using prefix encoding and hashed message authentication encoding mechanism, and encrypts all the collected data items, then submits the encoded data and the ciphertext to the corresponding storage node. According to the numerical comparison theory of PMV, the minimum candidate ciphertext sets containing the query result will be generated by the covered storage nodes, without knowing the actual values of the collected data items. Then, the storage nodes send the candidate ciphertext to sink, and the final top-k result will be computed by sink after decryption. To reduce the power consumption of sensor nodes, an energy optimization method based on a Hash function is proposed. The theoretical analysis and experimental results show that the PPTQ can ensure the privacy of the collected data and the query result, and it has better performance than the current work in query processing.
  • Related Articles

    [1]Huang Yicai, Yu Bin. Dynamic Searchable Symmetric Encryption Scheme for Conjunctive Queries Based on SHVE[J]. Journal of Computer Research and Development, 2024, 61(6): 1545-1558. DOI: 10.7544/issn1000-1239.202220924
    [2]Huang Yicai, Yu Bin, Li Sensen. A Searchable Symmetric Encryption Scheme Based on SRE[J]. Journal of Computer Research and Development, 2023, 60(12): 2725-2736. DOI: 10.7544/issn1000-1239.202220267
    [3]Yang Yaolin, He Hongjie, Chen Fan, Yuan Changqi. Reversible Data Hiding of Image Encryption Based on Prediction Error Adaptive Coding[J]. Journal of Computer Research and Development, 2021, 58(6): 1340-1350. DOI: 10.7544/issn1000-1239.2021.20200172
    [4]Zhao Liang, Wang Yongli, Du Zhongshu, Chen Guangsheng. HL-DAQ: A Dynamic Adaptive Quantization Coding for Hash Learning[J]. Journal of Computer Research and Development, 2018, 55(6): 1294-1307. DOI: 10.7544/issn1000-1239.2018.20170238
    [5]Wu Libing, Fan Jing, Wang Jing, Nie Lei, Wang Hao. Emergency Message Broadcast Method Based on Huffman-Like Coding[J]. Journal of Computer Research and Development, 2017, 54(11): 2475-2486. DOI: 10.7544/issn1000-1239.2017.20170368
    [6]Dai Hua, Yang Geng, Xiao Fu, Zhou Qiang, He Ruiliang. An Energy-Efficient and Privacy-Preserving Range Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(4): 983-993. DOI: 10.7544/issn1000-1239.2015.20140066
    [7]Chen Wei, Xu Ruomei, Li Yuling. A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing[J]. Journal of Computer Research and Development, 2014, 51(12): 2585-2592. DOI: 10.7544/issn1000-1239.2014.20140666
    [8]Dou Yi, Huang Haiping, Wang Ruchuan, Qin Xiaolin. Secure Range Query in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1253-1266.
    [9]Xu Jian, Zhou Fucai, Yang Muzhou, Li Fuxiang, Zhu Zhiliang. Hierarchical Hash List for Distributed Query Authentication[J]. Journal of Computer Research and Development, 2012, 49(7): 1533-1544.
    [10]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.

Catalog

    Article views (1020) PDF downloads (639) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return