
Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Network
Abstract
Privacy and Integrity Preserving Top-k Query Processing
Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Network,Privacy and integrity have been the main road block to the applications of two-tiered sensor networks. The storage nodes, which act as a middle tier between the sensors and the sink, could be compromised and allow attackers to learn sensitive data and manipulate query results. Prior schemes on secure query processing are weak, because they reveal non-negligible information, and therefore, attackers can statistically estimate the data values using domain knowledge and the history of query results. In this paper, we propose the first top-k query processing scheme that protects the privacy of sensor data and the integrity of query results.
Disadvantages
- The storage nodes are more vulnerable to attack and compromise. Attackers can not only steal the sensitive information on the storage node, but also leverage the query processing functionality of the storage node to feed false information to the sink.
- The privacy protection of bucketing schemes is weak because attackers can statistically estimate the actual value of both the data items and the queries using domain knowledge and historical query results.
- The communication cost is high in these schemes because a query result includes many false positive data items. Reducing bucket sizes helps to reduce communication cost between storage nodes and the sink, but will increase communication between sensors and storage nodes.
- As sensors need to submit more empty buckets to storage nodes and as a result, this approach weakens privacy protection due to the number of buckets becoming closer to the data items.
Advantages
- Experimental results show that our scheme is efficient and scalable.
- Our scheme is secure under IND-CKA security model.
- Our experimental results on real-life data show that our approach is accurate and practical for large network sizes.