PCTopk: Privacy- and correctness-preserving functional top-k query on un-trusted data storage in two-tiered sensor networks

Yao Tung Tsou, Yung Li Hu, Yennun Huang, Sy Yen Kuo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

This paper proposes an efficient mechanism, called PCTopk, for functional top-k query with a combination of multiple conditions/dimensions in two-tiered sensor networks to simultaneously preserve data privacy and correctness (i.e., authenticity and integrity). PCTopk constructs a layered authentication tree, cooperated with an order-preserving symmetric encryption technique, for only permitting storage nodes to systematically process inquired data over encryption domain and enabling querists to efficiently verify the authentic and complete query results. To the best of our knowledge, this is the first research work on the issue of secure functional top-k query with a combination of multiple conditions in two-tiered sensor networks. The performance evaluation results show that PCTopk takes significantly less energy consumption and storage space than prior arts while preserving data privacy and correctness.

Original languageEnglish
Title of host publicationProceedings - 2014 IEEE 33rd International Symposium on Reliable Distributed Systems, SRDS 2014
PublisherIEEE Computer Society
Pages191-200
Number of pages10
ISBN (Electronic)9781479955848
DOIs
StatePublished - 2014
Externally publishedYes
Event33rd IEEE International Symposium on Reliable Distributed Systems, SRDS 2014 - Nara, Japan
Duration: 06 10 201409 10 2014

Publication series

NameProceedings of the IEEE Symposium on Reliable Distributed Systems
Volume2014-January
ISSN (Print)1060-9857

Conference

Conference33rd IEEE International Symposium on Reliable Distributed Systems, SRDS 2014
Country/TerritoryJapan
CityNara
Period06/10/1409/10/14

Bibliographical note

Publisher Copyright:
© 2014 IEEE.

Keywords

  • Correctness
  • Privacy
  • Query
  • Security
  • Sensor network

Fingerprint

Dive into the research topics of 'PCTopk: Privacy- and correctness-preserving functional top-k query on un-trusted data storage in two-tiered sensor networks'. Together they form a unique fingerprint.

Cite this