Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks - 2017


Privacy and integrity are the most road block to the applications of two-tiered sensor networks. The storage nodes, that act as a middle tier between the sensors and therefore the sink, might be compromised and allow attackers to be told sensitive data and manipulate question results. Previous schemes on secure question processing are weak, as a result of they reveal non-negligible data, and so, attackers will statistically estimate the data values using domain data and therefore the history of query results. In this paper, we have a tendency to propose the primary top-k question processing scheme that protects the privacy of sensor information and also the integrity of question results. To preserve privacy, we have a tendency to build an index for each sensor collected information item using pseudo-random hash perform and Bloom filters and transform prime-k queries into top-vary queries. To preserve integrity, we tend to propose a knowledge partition algorithm to partition each data item into an interval and fix the partition information with the data. The connected info ensures that the sink will verify the integrity of query results. We tend to formally prove that our scheme is secure below IND-CKA security model. Our experimental results on real-life data show that our approach is correct and sensible for massive network sizes.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries - 2018ABSTRACT:With the increasing popularity of location-based services (LBS), the way to preserve one's location
PROJECT TITLE :Characterizing Privacy Risks of Mobile Apps with Sensitivity Analysis - 2018ABSTRACT:Given the emerging concerns over app privacy-connected risks, major app distribution providers (e.g., Microsoft) are exploring
PROJECT TITLE :Towards Privacy Preserving Publishing of Set-Valued Data on Hybrid Cloud - 2018ABSTRACT:Storage as a service has become an necessary paradigm in cloud computing for its great flexibility and economic savings. But,
PROJECT TITLE :Assurance of Security and Privacy Requirements for Cloud Deployment Models - 2018ABSTRACT:Despite of the many benefits of migrating enterprise important assets to the cloud, there are challenges specifically related
PROJECT TITLE :Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment - 2018ABSTRACT:In cloud computing, it is usually assumed that cloud vendors are trusted; the guest

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry