期刊文献+

基于桶划分的两层传感网隐私保护Top-k查询 被引量:1

Bucket Partition Based Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks
原文传递
导出
摘要 提出了一种用于两层传感网的基于桶划分的隐私保护Top-k查询处理(BPTQ)方法.BPTQ通过引入桶划分策略和加密技术,能够确保感知数据在存储、通信及查询处理过程中的隐私安全性.理论分析和实验结果表明,该方法能够保护感知数据的隐私安全,且与现有方法相比具有更高的能耗效率. A bucket partition based privacy-preserving top-k query processing( BPTQ) in two-tiered wireless sensor networks was proposed. BPTQ can protect the privacy of sensing data during the storage,communication and query processing by introducing bucket partitioning scheme and encryption technique.Analysis and experiments show that BPTQ can preserve the privacy of the sensing data and query result,and it is more efficient in energy consumption than the existing work.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2015年第5期18-22,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(61300240 61572263 61402014 61472193 61202004 61373138) 江苏省自然科学基金面上项目(BK20151511) 江苏省高校自然科学研究项目(14KJB520027 11KJA520002) 中国博士后科研基金项目(2013M541703) 江苏省博士后科研资助计划项目(1301042B)
关键词 两层传感器网络 隐私保护 TOP-K查询 桶划分 two-tiered wireless sensor networks privacy preserving top-k query bucket partition
  • 相关文献

参考文献8

  • 1Gnawali 0,Jang K Y, Paek J, et al. The tenet architec-ture for tiered sensor networks[ C] //4th ACM Conferenceon Embedded Networked Sensor Systems, 2006 ACM.Colorado : ACM Press, 2006 : 153-166.
  • 2戴华,杨庚,秦小麟,刘亮.面向隐私保护的两层传感网Top-k查询处理方法[J].计算机研究与发展,2013,50(6):1239-1252. 被引量:15
  • 3Zhang Rui, Shi J,Liu Y, et al. Verifiable fine-grainedTop-A; queries in tiered sensor networks [ C] // 29th IEEEInternational Conference on Computer Communications(INFOCOM2010). San Diego: IEEE, 2010: 1199-1207.
  • 4Dai Hua, YangGeng, HuangHaiping, et al. Efficient ver-ifiable top-/c queries in two-tiered wireless sensor networks[J]. KSII Transactions on Internet and Information Sys-tems,2015, 9(6) ;2111-2131.
  • 5Yu Chiamu,Ni Guokai, Chen Ingyi, et al. Top-A: queryresult completeness verification in tiered sensor networks[J]. IEEE Transactions on Information Forensics and Se-curity, 2014,9(1) : 109-124.
  • 6Hacigumus H , Iyer B R, Li Chen, et al. Executing SQLover encrypted data in the database service provider model[C ] // 2002 ACM SIGMOD International Conference onManagement of Data. Wisconsin : ACM Press,2002 :216-227.
  • 7Das G, Gunopulos D, Koudas N, et al. Answering top-kqueries using views [ C ] //32 nd International Conference onVery Large Data Bases. Seoul,Korea: ACM Press,2006 : 451-462.
  • 8Bozovic V, Socek D,Steinwandt R, et al. Multi-authori-ty attribute-based encryption with honest-but-curious cen-tral authority [ J ]. International Journal of ComputerMathematics, 2012,89(3) : 268-283.

二级参考文献26

  • 1Gnawali O, Jang K Y, Pack J, et al. The tenet architecture for tiered sensor networks [C] //Proc of the ACM Conf on Embedded Networked Sensor Systems. New York: ACM, 2006:153-166.
  • 2Diao Y, Ganesan D, Mathur G, et al. Rethinking data management for storage-centric sensor networks [C] //Proc of the 3rd Biennial Conf on Innovative Data Systems Research. New York: ACM, 2007:22-32.
  • 3Sheng B, Li Q. Verifiable privacy-preserving range query in two-tiered sensor networks [C] //Proc of the 27th IEEE Int Conf on Computer Communications. Piscataway, NJ: IEEE, 2008:46-50.
  • 4Shi J, Zhang R, Zhang Y. Secure range queries in tiered sensor networks [C] //Proc of the 28th IEEE Int Conf on Computer Communications. Piscataway, NJ: 1EEE, 2009: 945-953.
  • 5Shi J, Zhang R, Zhang Y. A spatiotemporal approach for secure range queries in tiered sensor networks [J].IEEE Trans on Wireless Communications, 2011, 10(1) : 264-273.
  • 6Chen F, Liu A X. SafeQ: Secure and efficient query processing in sensor networks [C]//Proc of the 29th IEEE Int Conf on Computer Communications. Piscataway, NJ: IEEE, 2010:1-9.
  • 7Jerry C, Hao Y, Starsky H Y, et al. Design and implementation of cross-domain cooperative firewall [C] // Proc of the IEEE Int Conf on Network Protocols. Piscataway, NJ : IEEE, 2007 : 284-293.
  • 8Liu A X, Chen F. Collaborative enforcement of firewal policies in virtual private networks [C] //Proe of the 27th Annual ACM Syrup on Principles of Distributed Computing. New York: ACM, 2008:95-104.
  • 9Krawczyk H, Canetti R, Bellare M. HMAC: Keyed-hashing for message authentication, RFC 2104 [R]. Reston: lnternet Society, 1997.
  • 10Wu M, Xu J, Tang X, et al. Top-k monitoring in wireless sensor networks [J]. IEEE Trans on Knowledge and Data Engeneering, 2007, 19(7): 962-976.

共引文献14

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部