Top-k Queries for Two-Tiered Sensor Networks
Privacy and integrity have been the main road block to the applications of two-tiered sensor networks. The storage nodes, which act as a middle tier between sensors and the sink, could be compromised and allow attackers to learn sensitive data and manipul
- PDF / 11,590,617 Bytes
- 412 Pages / 439.43 x 683.15 pts Page_size
- 111 Downloads / 165 Views
lgorithms for Data and Computation Privacy
Algorithms for Data and Computation Privacy
Alex X. Liu • Rui Li
Algorithms for Data and Computation Privacy
Alex X. Liu Chief Scientist Ant Group Hangzhou, Zhejiang, China
Rui Li School of Cyberspace Security Dongguan University of Technology Dongguan, Guangdong, China
ISBN 978-3-030-58895-3 ISBN 978-3-030-58896-0 (eBook) https://doi.org/10.1007/978-3-030-58896-0 © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Dedicated with love and respect to my parents Yuhai Liu (God rest his soul) and Shuxiang Wang, to my wife Chenyang Li, to my twin sons Max Boyang and Louis Boyang, to whom I owe all that I am and all that I have accomplished. – Alex X. Liu
To my dearest wife Jian Zhou, my son Zixuan Li, and my parents Jixiang Li and Yuqiong Li. Thanks for your support and understanding. –Rui Li
Contents
Part I Privacy Preserving Queries 1
Range Queries over Encrypted Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.1 Background and Motivation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.2 Threat Model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.3 Security Model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.4 Summary and Limitation of Prior Art . . . . . . . . . . . . . . . . . . . . . 1.1.5 Proposed Approach . . . . . . .
Data Loading...