1 / 9

data privacy-preserving

data privacy-preserving. Nguyen Dinh Thuc University of Science, HCMC ndthuc@fit.hcmus.edu.vn. Query. Storage node. Reply. Sink. Query. Let D: domain of data N: number of sensor nodes. Reply. Storage node. two-tiered model. Divide by partition D into multiple buckets

eryk
Download Presentation

data privacy-preserving

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. data privacy-preserving Nguyen DinhThuc University of Science, HCMC ndthuc@fit.hcmus.edu.vn

  2. Query Storage node Reply Sink Query Let D: domain of data N: number of sensor nodes Reply Storage node two-tiered model

  3. Divide by partition D into multiple buckets • Sensor si Storage node: i,t,{T1,{d1,d2,…}ki,t},{T2,num(i,2,t)},… • A user query {t,[a,b]} is translated into a lists of tags: iTagi  [a,b], by Sink • Sink  Storage node: t,{Tag1,Tag2,…} • Storage node will look up all the data generated in each epoch t and returns those whose tags are listed in the query • The limitation of this scheme is the fixed buckets and their explicit identification scheme of Sheng-Li

  4. Using searchable encryption for tag Id privacy-preserving • Sensor si Storage node: i,t,{TEKS(Apub,T1),{d1,d2,…}ki,t}, {TEKS(Apub,T2),num(i,2,t)},… • Sink  Storage node: t,{Trapdoor(Apriv,Tag1), Trapdoor(Apriv,Tag1),…} • Storage node will look up all the data generated in each epoch t and returns those that Test(TEKS,Trapdoor)=true of tags are listed in the query improving scheme

  5. Sensor node si and Sink havea same pre-shared master key ki,0and ki,0kj,0, ij • Sink maintains a list of secret master keys of eachsensor node • Sensor node knows Sink’s public key Apub which is a pair of matrices (XY,X+XY) Ski Apub=(XY,X+XY) Skj Apub=(XY,X+XY) deploment … Ski Skj … Apub Apriv

  6. Let ki,t=hash(ki,t-1) be secret key of sensor si at epoch t • Let mit={mit1,mit2,…} be list of data of sensor note si at epoch t and T={T1,T2,…} list of corresponding tags • Let T1j=<UXYQ,X+XYQ>/X,Y are pseudo-invertible matrices; Q is a random non-singular matrix; U: a non-singular matrix generated usingtag T1jT • siStoragenode: i,t,{< T11,{m11,m12,…}ki,t>, {< T12 ,{m21,m22,… }ki,t>,…}, where mjpmit  mjpRange(Tj), TjT privacy-preserving storage

  7. Let {t,[a,b]} be a user query. • Let T={T1,T2,…} be smallest list of tags whose corresponding ranges cover [a,b] • Let Tt2={<H2(H1(Ti)R)U-1,H2(H1(Ti)R)X>/ R: random non-singular matrix, U: non-singular generated using H1(Ti), TiT, and X: Sink’s secret key} • Sink  Storage node: t,Tt2 querying

  8. Let QueyryAtStorage=[t,Tt2] be received query at storage nodes • Let S be the set encrypted data at epoch t, and let Response=, • For each sS Do { Temp=; For each <ED,SE>s.EncryptedData, Do { let SE=<A,B>; If <C,D>Tt2 such that CA=DB Then Temp=Temp{ED} } //End for <ED,SE> Response=Response{<i,Temp>} } //End for s • Returns Response replying

  9. Let {t,[a,b]} be the user query • Let Response={<i,ED>} be the result returned from Storage nodes • Let Result= • For each <i,ED>Response, Result=Result{EDki,t-1} • Returns Result final results

More Related