Privacypreserving range query processing in wireless sensor networks
-
摘要: 对无线传感器网络隐私保护范围查询处理技术的研究现状与进展进行了综述. 首先介绍研究模型,包括网络模型、攻击模型和性能评价模型. 接着,按照桶技术、前缀成员验证技术、保序加密技术等隐私保护技术对现有研究成果进行分类,详细阐述代表性协议的核心技术. 对各协议性能的分析比较表明:现有技术均未较好地实现隐私性、完整性、高效性和精确性四者之间的均衡. 最后,对未来研究方向进行了展望. Abstract: This paper provides a stateoftheart survey of privacypreserving range query processing techniques in Wireless Sensor Networks (WSNs). We first introduce the research models, including network models, adversary models and performance evaluation models. Then, we classify existing related work into several types according to privacy preservation techniques, such as Bucketing Scheme, Prefix Membership Verification, and Orderpreserving Encryption. We further elaborate the key mechanisms of typical protocols. Performance analysis and comparison show that existing work cannot balance privacy, integrity, efficiency and accuracy. Finally, we provide some suggestions for future research.
-
[1] [1]SHENG B, LI Q. Verifiable privacypreserving range query in twotiered sensor networks[C]//INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 2008.[2]ROBERT S, ANDRAS F. Energy implication of network sensor designs[J]. (20080401)[20150630]. http://www. cs. berkeley. edu/zewczyk/cs252/paper.pdf.[3]GNAWALI O, JANG K Y, PAEK J, et al. The tenet architecture for tiered sensor networks[C]//Proceedings of the 4th international conference on Embedded networked sensor systems. ACM, 2006: 153166.[4]HACIGMSH, IYER B, LI C, et al. Executing SQL over encrypted data in the databaseserviceprovider model[C]//Proceedings of the 2002 ACM SIGMOD international conference on Management of data. ACM, 2002: 216227.[5]HORE B, MEHROTRA S, TSUDIK G. A privacypreserving index for range queries[C]//Proceedings of the Thirtieth international conference on Very large data basesVolume 30. VLDB Endowment, 2004: 720731.[6]SHENG B, LI Q. Verifiable privacypreserving sensor network storage for range query[J]. Mobile Computing IEEE Transactions on, 2011, 10(9): 13121326.[7]SHI J, ZHANG Y. Secure range queries in tiered sensor networks[C]//INFOCOM 2009, IEEE. IEEE, 2009: 945953.[8]SHI J, ZHANG R, ZHANG Y. A spatiotemporal approach for secure range queries in tiered sensor networks[J]. IEEE transactions on wireless communications, 2011, 10(1): 264273.[9]ZHANG R, SHI J, ZHANG Y. Secure multidimensional range queries in sensor networks[C]//Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing. ACM, 2009: 197206.[10]CHENG J, YANG H, WONG S H Y, et al. Design and implementation of crossdomain cooperative firewall[C]//Network Protocols, ICNP 2007. IEEE International Conference on, 2007: 284293.[11]LIU A X, CHEN F. Collaborative enforcement of firewall policies in virtual private networks[C]//Proceedings of the twentyseventh ACM symposium on Principles of distributed computing. ACM, 2008: 95104.[12]CHEN F, LIU A X. SafeQ: Secure and efficient query processing in sensor networks[C]//INFOCOM, 2010 Proceedings IEEE. IEEE, 2010: 19.[13]CHEN F, LIU A X. Privacyand integritypreserving range queries in sensor networks[J]. Networking, IEEE/ACM Transactions on, 2012, 20(6): 17741787.[14]BOLDYREVA A, CHENETTE N, LEE Y, et al. Orderpreserving symmetric encryption[M]//Advances in CryptologyEUROCRYPT 2009. Berlin Heidelberg: Springer, 2009: 224241.[15]MERKLE R C. A certified digital signature[C]//Advances in Cryptology-CRYPTO'89 Proceedings. New York: Springer, 1990: 218238.[16]AGRAWAL R, KIERNAN J, SRIKANT R, et al. Order preserving encryption for numeric data[C]//Proceedings of the 2004 ACM SIGMOD international conference on Management of data. ACM, 2004: 563574.[17]BU J, YIN M, HE D, et al. SEF: a secure, efficient, and flexible range query scheme in twotiered sensor networks[J]. International Journal of Distributed Sensor Networks, 2011(3): 876879.[18]TSOU Y T, LU C S, KUO S Y. Privacyand integritypreserving range query in wireless sensor networks[C]//Global Communications Conference (GLOBECOM), 2012 IEEE. IEEE, 2012: 328334.[19]NGUYEN T D, BUI T V, DANG V H, et al. Efficiently preserving data privacy range queries in twotiered wireless sensor networks[C]//Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on. IEEE, 2012: 973978.[20]LI R, LIN Y, YI Y, et al. A privacy and integrity preserving range query protocol in twotiered sensor networks[J]. Chin J Comput, 2013, 36: 11941209.[21]YI Y, LI R, CHEN F, et al. A digital watermarking approach to secure and precise range query processing in sensor networks[C]//INFOCOM, 2013 Proceedings IEEE. IEEE, 2013: 19501958.[22]DOU Y, HUANG H, WANG R, et al. Secure range query in twotiered wireless sensor networks[J].Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(6):12531266.[23]LIN H Y, TZENG W G. An efficient solution to the millionaires' problem based on homomorphic encryption[C]//Applied Cryptography and Network Security. Berlin Heidelberg: Springer, 2005: 456466.[24]ZHANG X, DONG L, PENG H, et al. Achieving efficient and secure range query in twotiered wireless sensor networks[C]//Proceedings of the IEEE/ACM International Symposium on Quality of Service, Hong Kong, China. IEEE, 2014: 2627.[25]BLOOM B H. Space/time tradeoffs in hash coding with allowable errors[J]. Communications of the ACM, 1970, 13(7): 422426.[26]ZHANG X, DONG L, PENG H, et al. Collusionaware privacypreserving range query in tiered wireless sensor networks[J]. Sensors, 2014, 14(12): 2390523932.[27]DONG L, ZHU J, ZHANG X, et al. SEMR: Secure and Efficient MultiDimensional Range Query Processing in Twotiered Wireless Sensor Networks[M]//WebAge Information Management. [S.l.]: Springer International Publishing, 2015: 520524.
点击查看大图
计量
- 文章访问数: 760
- HTML全文浏览量: 30
- PDF下载量: 1383
- 被引次数: 0