通信学报 ›› 2012, Vol. 33 ›› Issue (12): 58-68.doi: 10.3969/j.issn.1000-436x.2012.12.008

• 学术论文 • 上一篇    下一篇

两层传感器网络中一种高效的加密数据条件聚合协议研究

李睿,林亚平,李晋国   

  1. 湖南大学 信息科学与工程学院,湖南 长沙 410082
  • 出版日期:2012-12-25 发布日期:2017-07-15
  • 基金资助:
    湖南省自然科学基金资助项目;湖南省科技计划基金资助项目;国家自然科学基金资助项目;湖南大学“青年教师成长计划”基金资助项目

Efficient conditional aggregation of encrypted data in tiered sensor networks

Rui LI,Ya-ping LIN,Jin-guo LI   

  1. College of Information Science and Engineering,Hunan University,Changsha 410082,China
  • Online:2012-12-25 Published:2017-07-15
  • Supported by:
    The Natural Science Foundation of Hunan Provience;Hunan Provincial Scienc &Technology Plan Project;The National Natural Sciece Foundation of China;Young Teachers Growth Plans of Hunan University

摘要:

摘 要:提出了一种隐私保护的条件聚合协议,使存储节点在不知道数据真实值的情况下对满足条件的数据进行聚合,防止存储节点对敏感信息的泄漏。为了保护数据和查询条件的隐私性,提出了一种基于前缀成员确认和布鲁姆过滤器相结合的编码方法对数据和查询条件进行编码,实现存储节点在不知道数据真实值和查询条件真实值的情况下进行查询处理;为了对查询结果中的数据进行聚合而不暴露数据真实值,采用同态加密技术对数据进行加密,使数据在不解密的情况下能进行聚合运算。进一步,根据传感器采集数据的特点,提出了一种基于代码表的数据压缩表示及传输方法,有效减小了传感器节点和存储节点之间的通信开销。分析和实验结果验证了所提方案的有效性。

关键词: 两层结构传感器网络, 安全范围查询, 加密数据聚合, 条件聚合, 代码表

Abstract:

A privacy preserving conditional aggregation protocol was proposed that enabled storage nodes to aggregate the data items satisfied sink issued queries correctly while prevented them from revealing both sensor collected data and Sink issued queries.To protect privacy for sensor col data and sink issued queries,an encoding method based on prefix membership verification and bloom filters was proposed to encode both sensor collected data and sink issued queries,which allowed storage nodes process queries correctly without knowing their actually value.Homomorphism encryption method was adopted to encrypt sensor collected data,which enabled storage nodes to process aggregation on encrypted data items.To reduce corresponding energy consumption between sensors and storage nodes,a code table method was proposed to represent and transmit data items.Analysis and experime validate the efficacy and efficiency of the proposed protocol.

Key words: two-tiered sensor networks, secure range queries, encrypted data aggregation, conditional aggregation, code tables

No Suggested Reading articles found!