Scattered Access Control with Seclusion Support in Wireless Sensor Networks by SecureQ Protocol
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
A wireless sensor Network consists of spatially dispersed self-directed sensors to monitor the environment conditions. This work supports in-network top-k query process over uncertain data in a distributed wireless sensor network. We develop the notion of necessary Set for efficient in-network pruning of uncertain data in a distributed setting. Based on the necessary sets, we propose, necessary setbased, algorithm for in-network processing of PT-Topk queries in a two-tier hierarchical sensor network. For providing privacy proposing locked Q protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries.
Authors and Affiliations
N_V_R_D Swathi, K Naga Bhargavi
Preventing Information Lose and Membership Disclosure on Highdimensional Data
The existing methods generalization and bucketization could not give a satisfactory result for privacy preserving on microdata. It results loss of information and some does not prevent the membership disclosure. In t...
Preserving Confidentiality through Public Auditing In Secure Cloud Storage
Now a day users no longer have physical presence of the outsourced data which makes the data security stronger. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about th...
Applications of MVS on Hierarchical Clustering Algorithms
Clustering is a valuable method that arranges a large quantity of unordered text documents into a small number of expressive and coherent clusters, thereby offering a basis for instinctive and informative steering an...
Performance Analysis of AODV and DSR Routing Protocols in MANET’S
Mobile ad-hoc networks (MANETS) are formed by a collection of mobile nodes that have the ability to form a communication network without the help of any fixed infrastructure. Because of the nature of these networks,...
An Alternate Way Of Implementing Heuristic Searching Technique
This work was carried out to explore the use of different data structure for heuristic search algorithm which can result in better performance with respect to time. The commonly used data structure Generalized Link Li...