EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs

Data privacy threat arises during providing top-k query processing in the wireless sensor networks. This article presents an efficient privacy-preserving and collusion-resisting top-k(EPCT) query processing protocol. A minimized candidate encrypted dataset determination model is first designed, whic...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Qian Zhou, Hua Dai, Jianguo Zhou, Rongqi Qi, Geng Yang, Xun Yi
Formato: article
Lenguaje:EN
Publicado: Hindawi-Wiley 2021
Materias:
Acceso en línea:https://doaj.org/article/dce200efd96f4d588c7dca2b299af686
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:dce200efd96f4d588c7dca2b299af686
record_format dspace
spelling oai:doaj.org-article:dce200efd96f4d588c7dca2b299af6862021-11-29T00:55:26ZEPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs1939-012210.1155/2021/6234409https://doaj.org/article/dce200efd96f4d588c7dca2b299af6862021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/6234409https://doaj.org/toc/1939-0122Data privacy threat arises during providing top-k query processing in the wireless sensor networks. This article presents an efficient privacy-preserving and collusion-resisting top-k(EPCT) query processing protocol. A minimized candidate encrypted dataset determination model is first designed, which is the foundation of EPCT. The model guides the idea of query processing and guarantees the correctness of the protocol. The symmetric encryption with different private key in each sensor is deployed to protect the privacy of sensory data even a few sensors in the networks have been colluding with adversaries. Based on the above model and security setting, two phases of interactions between the interested sensors and the sink are designed to implement the secure query processing protocol. The security analysis shows that the proposed protocol is capable of providing secure top-k queries in the manner of privacy protection and anticollusion, whereas the experimental result indicates that the protocol outperforms the existing works on communication overhead.Qian ZhouHua DaiJianguo ZhouRongqi QiGeng YangXun YiHindawi-WileyarticleTechnology (General)T1-995Science (General)Q1-390ENSecurity and Communication Networks, Vol 2021 (2021)
institution DOAJ
collection DOAJ
language EN
topic Technology (General)
T1-995
Science (General)
Q1-390
spellingShingle Technology (General)
T1-995
Science (General)
Q1-390
Qian Zhou
Hua Dai
Jianguo Zhou
Rongqi Qi
Geng Yang
Xun Yi
EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs
description Data privacy threat arises during providing top-k query processing in the wireless sensor networks. This article presents an efficient privacy-preserving and collusion-resisting top-k(EPCT) query processing protocol. A minimized candidate encrypted dataset determination model is first designed, which is the foundation of EPCT. The model guides the idea of query processing and guarantees the correctness of the protocol. The symmetric encryption with different private key in each sensor is deployed to protect the privacy of sensory data even a few sensors in the networks have been colluding with adversaries. Based on the above model and security setting, two phases of interactions between the interested sensors and the sink are designed to implement the secure query processing protocol. The security analysis shows that the proposed protocol is capable of providing secure top-k queries in the manner of privacy protection and anticollusion, whereas the experimental result indicates that the protocol outperforms the existing works on communication overhead.
format article
author Qian Zhou
Hua Dai
Jianguo Zhou
Rongqi Qi
Geng Yang
Xun Yi
author_facet Qian Zhou
Hua Dai
Jianguo Zhou
Rongqi Qi
Geng Yang
Xun Yi
author_sort Qian Zhou
title EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs
title_short EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs
title_full EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs
title_fullStr EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs
title_full_unstemmed EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs
title_sort epct: an efficient privacy-preserving and collusion-resisting top-k query processing in wsns
publisher Hindawi-Wiley
publishDate 2021
url https://doaj.org/article/dce200efd96f4d588c7dca2b299af686
work_keys_str_mv AT qianzhou epctanefficientprivacypreservingandcollusionresistingtopkqueryprocessinginwsns
AT huadai epctanefficientprivacypreservingandcollusionresistingtopkqueryprocessinginwsns
AT jianguozhou epctanefficientprivacypreservingandcollusionresistingtopkqueryprocessinginwsns
AT rongqiqi epctanefficientprivacypreservingandcollusionresistingtopkqueryprocessinginwsns
AT gengyang epctanefficientprivacypreservingandcollusionresistingtopkqueryprocessinginwsns
AT xunyi epctanefficientprivacypreservingandcollusionresistingtopkqueryprocessinginwsns
_version_ 1718407802647478272