Survey on Sheltered Top-K Query to Intermittently Encrypted Signature in Tiered Sensor Networks

Authors

  • P. Ramya  Department of Computer Science & Engineering, Bharath University, Chennai, Tamil Nadu, India
  • Dr. C. Nalini  Department of Computer Science & Engineering, Bharath University, Chennai, Tamil Nadu, India

Keywords:

Sensor networks; Top-k query result completeness; VQ scheme.

Abstract

Storage nodes are predictable to be located as an intermediate tier of huge scale sensor networks for caching the composed sensor readings and responding to queries with benefits of influence and storage reduction for standard sensors. Nevertheless, an essential issue is that the compromised storage node may not only source the privacy problem, but also arrival fake/curtailed query results. We propose a graceful yet competent dummy reading based anonymization constitution, beneath which the query result steadfastness can be certain by our proposed verifiable top-k query (VQ) schemes. Compared with accessible machinery, the VQ schemes have a essentially different design attitude and realize the lower communication complexity at the cost of slight exposure capability degradation. Analytical studies, geometric simulations, and archetype implementations are conducted to exhibit the practicality of our proposed methods.

References

  1. Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo§" Secure Multidimensional Queries in Tiered Sensor Networks" Taipei, [cs.NI] 16 dec 2009.
  2. Yi Dou, Jiutian Chen, Juan Feng, and Xiaolin Qin “Secure Query in Wireless Sensor Network Using Underground Parties" vol 7, No. 12, dec 2012.
  3. Xiaojing Liao, Jianzhong Li “Privacy-preserving and Secure Top-k Query in Two-tier Wireless Sensor Network"
  4. Dr.V.Palanisamy MCA., M.Tech., P.hD., #1, D.Gandhimathi*2 “Privacy and Integrity Preserving Range Queries in Wireless Sensor Networks" ijptt, vol.3, Issue 3, apr-2013.
  5. Xiaoying Zhang, Lei Dong, Hui Peng, Hong Chen *, Suyun Zhao and Cuiping Li," Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks" 2014, 14, 23905-23932.
  6. Yu, C., G. Ni, I. Chen, Erol Gelenbe, and S. Kuo. "Top-k Query Result Completeness Verification in Tiered Sensor Networks." (2014): 1-1. 
  7. Rui Zhang, Jing Shi, Yunzhong Liu, and Yanchao Zhang, “Verifiable Fine-Grained Top-k Queries in Tiered Sensor Networks" 
  8. Guruprasad, Prasanna G and Dr.Arun Biradar, “A Survey on an Epoch Based Secure Data Aggregation and Authentication Scheme for Range Query Result Evaluation" IJERT, vol. 2, Issue 3, march-2013.
  9. R. Zhang, Y. Zhang, and C. Zhang, “Secure top-k query processing via untrusted location-based service providers," inProc. 24th IEEE Conf. Comput. Commun., Mar. 2012, pp. 1170–1178.
  10. R. Zhang, Jinchao Sun, Y. Zhang, and C. Zhang," Secure Spatial Top-k Query processing via Untrusted Location-based Service Providers", 2013 IEEE.

Downloads

Published

2015-04-25

Issue

Section

Research Articles

How to Cite

[1]
P. Ramya, Dr. C. Nalini, " Survey on Sheltered Top-K Query to Intermittently Encrypted Signature in Tiered Sensor Networks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.519-524, March-April-2015.