Survey on Sheltered Top-K Query to Intermittently Encrypted Signature in Tiered Sensor Networks

Authors(2) :-P. Ramya, Dr. C. Nalini

Storage nodes are predictable to be located as an intermediate tier of huge scale sensor networks for caching the composed sensor readings and responding to queries with benefits of influence and storage reduction for standard sensors. Nevertheless, an essential issue is that the compromised storage node may not only source the privacy problem, but also arrival fake/curtailed query results. We propose a graceful yet competent dummy reading based anonymization constitution, beneath which the query result steadfastness can be certain by our proposed verifiable top-k query (VQ) schemes. Compared with accessible machinery, the VQ schemes have a essentially different design attitude and realize the lower communication complexity at the cost of slight exposure capability degradation. Analytical studies, geometric simulations, and archetype implementations are conducted to exhibit the practicality of our proposed methods.

Authors and Affiliations

P. Ramya
Department of Computer Science & Engineering, Bharath University, Chennai, Tamil Nadu, India
Dr. C. Nalini
Department of Computer Science & Engineering, Bharath University, Chennai, Tamil Nadu, India

Sensor networks; Top-k query result completeness; VQ scheme.

  1. Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo§" Secure Multidimensional Queries in Tiered Sensor Networks" Taipei, [cs.NI] 16 dec 2009.
  2. Yi Dou, Jiutian Chen, Juan Feng, and Xiaolin Qin “Secure Query in Wireless Sensor Network Using Underground Parties" vol 7, No. 12, dec 2012.
  3. Xiaojing Liao, Jianzhong Li “Privacy-preserving and Secure Top-k Query in Two-tier Wireless Sensor Network"
  4. Dr.V.Palanisamy MCA., M.Tech., P.hD., #1, D.Gandhimathi*2 “Privacy and Integrity Preserving Range Queries in Wireless Sensor Networks" ijptt, vol.3, Issue 3, apr-2013.
  5. Xiaoying Zhang, Lei Dong, Hui Peng, Hong Chen *, Suyun Zhao and Cuiping Li," Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks" 2014, 14, 23905-23932.
  6. Yu, C., G. Ni, I. Chen, Erol Gelenbe, and S. Kuo. "Top-k Query Result Completeness Verification in Tiered Sensor Networks." (2014): 1-1. 
  7. Rui Zhang, Jing Shi, Yunzhong Liu, and Yanchao Zhang, “Verifiable Fine-Grained Top-k Queries in Tiered Sensor Networks" 
  8. Guruprasad, Prasanna G and Dr.Arun Biradar, “A Survey on an Epoch Based Secure Data Aggregation and Authentication Scheme for Range Query Result Evaluation" IJERT, vol. 2, Issue 3, march-2013.
  9. R. Zhang, Y. Zhang, and C. Zhang, “Secure top-k query processing via untrusted location-based service providers," inProc. 24th IEEE Conf. Comput. Commun., Mar. 2012, pp. 1170–1178.
  10. R. Zhang, Jinchao Sun, Y. Zhang, and C. Zhang," Secure Spatial Top-k Query processing via Untrusted Location-based Service Providers", 2013 IEEE.

Publication Details

Published in : Volume 1 | Issue 2 | March-April 2015
Date of Publication : 2015-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 519-524
Manuscript Number : IJSRSET1522136
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

P. Ramya, Dr. C. Nalini, " Survey on Sheltered Top-K Query to Intermittently Encrypted Signature in Tiered Sensor Networks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.519-524, March-April-2015.
Journal URL : http://ijsrset.com/IJSRSET1522136

Follow Us

Contact Us