EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs

Data privacy threat arises during providing top-k query processing in the wireless sensor networks. This article presents an efficient privacy-preserving and collusion-resisting top-k(EPCT) query processing protocol. A minimized candidate encrypted dataset determination model is first designed, whic...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Qian Zhou, Hua Dai, Jianguo Zhou, Rongqi Qi, Geng Yang, Xun Yi
Formato: article
Lenguaje:EN
Publicado: Hindawi-Wiley 2021
Materias:
Acceso en línea:https://doaj.org/article/dce200efd96f4d588c7dca2b299af686
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
Descripción
Sumario:Data privacy threat arises during providing top-k query processing in the wireless sensor networks. This article presents an efficient privacy-preserving and collusion-resisting top-k(EPCT) query processing protocol. A minimized candidate encrypted dataset determination model is first designed, which is the foundation of EPCT. The model guides the idea of query processing and guarantees the correctness of the protocol. The symmetric encryption with different private key in each sensor is deployed to protect the privacy of sensory data even a few sensors in the networks have been colluding with adversaries. Based on the above model and security setting, two phases of interactions between the interested sensors and the sink are designed to implement the secure query processing protocol. The security analysis shows that the proposed protocol is capable of providing secure top-k queries in the manner of privacy protection and anticollusion, whereas the experimental result indicates that the protocol outperforms the existing works on communication overhead.