EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs
Data privacy threat arises during providing top-k query processing in the wireless sensor networks. This article presents an efficient privacy-preserving and collusion-resisting top-k(EPCT) query processing protocol. A minimized candidate encrypted dataset determination model is first designed, whic...
Guardado en:
Autores principales: | , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Hindawi-Wiley
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/dce200efd96f4d588c7dca2b299af686 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:dce200efd96f4d588c7dca2b299af686 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:dce200efd96f4d588c7dca2b299af6862021-11-29T00:55:26ZEPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs1939-012210.1155/2021/6234409https://doaj.org/article/dce200efd96f4d588c7dca2b299af6862021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/6234409https://doaj.org/toc/1939-0122Data privacy threat arises during providing top-k query processing in the wireless sensor networks. This article presents an efficient privacy-preserving and collusion-resisting top-k(EPCT) query processing protocol. A minimized candidate encrypted dataset determination model is first designed, which is the foundation of EPCT. The model guides the idea of query processing and guarantees the correctness of the protocol. The symmetric encryption with different private key in each sensor is deployed to protect the privacy of sensory data even a few sensors in the networks have been colluding with adversaries. Based on the above model and security setting, two phases of interactions between the interested sensors and the sink are designed to implement the secure query processing protocol. The security analysis shows that the proposed protocol is capable of providing secure top-k queries in the manner of privacy protection and anticollusion, whereas the experimental result indicates that the protocol outperforms the existing works on communication overhead.Qian ZhouHua DaiJianguo ZhouRongqi QiGeng YangXun YiHindawi-WileyarticleTechnology (General)T1-995Science (General)Q1-390ENSecurity and Communication Networks, Vol 2021 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Technology (General) T1-995 Science (General) Q1-390 |
spellingShingle |
Technology (General) T1-995 Science (General) Q1-390 Qian Zhou Hua Dai Jianguo Zhou Rongqi Qi Geng Yang Xun Yi EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs |
description |
Data privacy threat arises during providing top-k query processing in the wireless sensor networks. This article presents an efficient privacy-preserving and collusion-resisting top-k(EPCT) query processing protocol. A minimized candidate encrypted dataset determination model is first designed, which is the foundation of EPCT. The model guides the idea of query processing and guarantees the correctness of the protocol. The symmetric encryption with different private key in each sensor is deployed to protect the privacy of sensory data even a few sensors in the networks have been colluding with adversaries. Based on the above model and security setting, two phases of interactions between the interested sensors and the sink are designed to implement the secure query processing protocol. The security analysis shows that the proposed protocol is capable of providing secure top-k queries in the manner of privacy protection and anticollusion, whereas the experimental result indicates that the protocol outperforms the existing works on communication overhead. |
format |
article |
author |
Qian Zhou Hua Dai Jianguo Zhou Rongqi Qi Geng Yang Xun Yi |
author_facet |
Qian Zhou Hua Dai Jianguo Zhou Rongqi Qi Geng Yang Xun Yi |
author_sort |
Qian Zhou |
title |
EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs |
title_short |
EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs |
title_full |
EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs |
title_fullStr |
EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs |
title_full_unstemmed |
EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top-k Query Processing in WSNs |
title_sort |
epct: an efficient privacy-preserving and collusion-resisting top-k query processing in wsns |
publisher |
Hindawi-Wiley |
publishDate |
2021 |
url |
https://doaj.org/article/dce200efd96f4d588c7dca2b299af686 |
work_keys_str_mv |
AT qianzhou epctanefficientprivacypreservingandcollusionresistingtopkqueryprocessinginwsns AT huadai epctanefficientprivacypreservingandcollusionresistingtopkqueryprocessinginwsns AT jianguozhou epctanefficientprivacypreservingandcollusionresistingtopkqueryprocessinginwsns AT rongqiqi epctanefficientprivacypreservingandcollusionresistingtopkqueryprocessinginwsns AT gengyang epctanefficientprivacypreservingandcollusionresistingtopkqueryprocessinginwsns AT xunyi epctanefficientprivacypreservingandcollusionresistingtopkqueryprocessinginwsns |
_version_ |
1718407802647478272 |