期刊文献+

无线体域网中隐私保护安全kNN查询协议 被引量:2

Privacy Preserving k NN Query Protocol for Wireless Body Sensor Networks
在线阅读 下载PDF
导出
摘要 针对无线体域网中的数据隐私问题,提出了一种适用于无线体域网的安全k NN查询协议,能够保护数据隐私与访问权限控制。该协议主要分3个部分,首先采用非对称矩阵向量积保值加密机制(ASPE)对数据和查询条件分别进行加密,从而保护数据的隐私;其次基于R树的桶划分索引结构BRtree,将数据划分到桶节点后采用剪枝策略去除不必要的查询来提高查询效率;最后基于数据层面的访问权限授予与回收机制,从ASPE加密密钥中分解出权限密钥,通过可信第三方实现了访问权限控制和访问权限迁移。并在真实移动健康数据集上验证了该方案的有效性。 For the data privacy in wireless body area network (WBAN), a secure privacy preserving k-nearest neighbor (kNN) query protocol for WBAN is proposed. This protocol can protect data privacy and access control by encrypting both data and queries with asymmetric scalar-product-preserving encryption (ASPE). To improving searching efficiency, we combine the technologies of R-tree and bucket partition and propose a data structure, named BRtree, for indexing data items. BRtree can significantly eliminate the unnecessary searching branches. In order to achieve access control, we separate an access key from the encryption key and introduce a trusted third authority to manage access rights and access rights transferring. The experimental results validate the efficiency of our scheme.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2017年第5期722-727,共6页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(61370226 61472130 61672156) 国家973项目(2012CB315805)
关键词 权限控制 矩阵加密 安全k邻近查询 无线体域网 access control matrix encryption secure k-nearest neighbor query WBAN
作者简介 张大方(1959-),男,博士,教授,主要从事网络安全、可信系统与网络、网络测试等方面的研究.
  • 相关文献

参考文献5

二级参考文献37

  • 1崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 2唐勇,周明天,张欣.无线传感器网络路由协议研究进展[J].软件学报,2006,17(3):410-421. 被引量:201
  • 3YANG Geng,RONG Chun-ming,VEIGNER Christian,WANG Jiang-tao,CHENG Hong-bing.Identity-based key agreement and encryption for wireless sensor networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(4):54-60. 被引量:10
  • 4DIFFIE W, HELLMAN M E. New directions in cryptography[J]. IEEE Transaction on Information Theory, 1976, 22(6): 44-654.
  • 5ATENIESE G, STEINER M, TSUDIK G. New multiparty authentication services and key agreement protocols[J]. IEEE Journal of Selected Areas in Communications, 2000, 18(4): 628-639.
  • 6BRESSON E, CHEVASSUT O, POINTCHEVAL D et al. Provably authenticated group diffie-Hellman key exchange[C]//8th Annual ACM Conference on Computer and Communications Security. New York: ACM Press, 2001 255-264.
  • 7BRESSON E, CHEVASSUT O, POINTCHEVAL D. Dynamic group diffie-hellman key exchange under standard Assumptions[C]//Eurocrypt 2002. Berlin: Springer-Verlag, 2002: 321-336.
  • 8TSENG Y M. A robust multi-party key agreement protocol resistant to malicious participants[J]. Computer Journal, 2005, 48(4): 480-487.
  • 9TSENG Y M. A secure authenticated group key agreement protocol for resource-limited mobile devices[J]. Computer Journal, 2007, 50(1): 41-52.
  • 10MANULIS M. Survey on security requirements and model for group key exchange[DB/OL]. [2007-08-18]. http: //eprint.iacr.org/2006/388.pdf.

共引文献24

同被引文献16

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部